02-26-2023 04:16 PM - edited 02-27-2023 04:02 AM
According to this bug, it stated: When user authentication initiates from ISE, ISE will connect and send the encryption types that are supported (RC4, AES128, and AES256). This enhancement is for AD tuning to only send AES 256
This is exactly what I am seeing between my Cisco ISE version 3.1 patch-5 (latest patch) and Microsoft Windows Active Directory (AD). My Cisco ISE is integrated with AD for user authentication. In other words, the ISE has to communicate with AD for username and password. When I capture the traffic on the ISE, I can clearly see the ISE sent RC4 to AD and AD responded back with RC4 with the RPC_Netlogon protocol, as seen below:
Cisco ISE to AD request:
Auth Info: NETLOGON Secure Channel, Packet privacy, AuthContextId(186703)
Auth type: NETLOGON Secure Channel (68)
Auth level: Packet privacy (6)
Auth pad len: 4
Auth Rsrvd: 0
Auth Context ID: 186703
Secure Channel Verifier
Sign algorithm: HMAC-MD5 (0x0077)
Seal algorithm: RC4 (0x007a)
Flags: 0000
This is the response from Active Directory:
Auth Info: NETLOGON Secure Channel, Packet privacy, AuthContextId(186703)
Auth type: NETLOGON Secure Channel (68)
Auth level: Packet privacy (6)
Auth pad len: 0
Auth Rsrvd: 0
Auth Context ID: 186703
Secure Channel Verifier
Sign algorithm: HMAC-MD5 (0x0077)
Seal algorithm: RC4 (0x007a)
Flags: 0000
The problem is that come April 2023, Microsoft will release a patch, AD CVE-2022-38023 patch, to start removing RC4 from Active Directory. Does it mean the communication between Cisco ISE and Microsoft Active Directory will be broken?
The Cisco bug ID CSCvo604 listed the following Known Affected Releases Cisco ISE versions:
Solved! Go to Solution.
01-02-2024 04:35 PM
@hslai: Why does Cisco use AES-128 and not AES-256?
01-02-2024 07:06 PM
@adamscottmaster2013 AES-256 is not an option here.
[MS-NRPC]: Netlogon Remote Protocol / 2.2.1.3.3 NL_AUTH_SHA2_SIGNATURE says,
...
SealAlgorithm (2 bytes): A 16-bit little-endian integer that identifies the algorithm used for encryption. The only supported encryption algorithm is AES-128 [FIPS197]. The SealAlgorithm field MUST contain one of the following values.
...
Value
Meaning
0xFFFF
The packet is not encrypted.
0x001A
The packet is encrypted using AES-128.
01-03-2024 12:58 PM
ISE 3.2 Patch-3 was released in July '23 and Patch-4 was released in Oct '23 so I assume that Patch-5 will be released at the end of Jan '24.
02-28-2024 12:27 PM - edited 02-28-2024 12:28 PM
ISE 3.2 Patch 5 was released 15-Feb-2024
02-28-2024 02:37 PM
@jasonm002: I tested it in my QA environment and confirmed patch-5 fixed this issue. Will roll it out in production in about a month.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide