cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5166
Views
6
Helpful
12
Replies

ISE 2.0+ EAP-FASTv2 & OSX High Sierra Incompatible?

ciscobacon
Level 1
Level 1

I'm using this as a last-ditch effort to understand what may be happening with this issue, as I have already reached out to TAC at least twice to follow-up on this while watching bug notifications and anything I can find on the web (which isn't much). 

I have been running EAP-FASTv2 with our fleet of OSX devices for about 2 years now, however upon upgrading a test machine to High Sierra, EAP-FASTv2 authentications are broken, making the protocol unusable. I have watched two Cisco bug IDs go from Open to Fixed and yet haven't seen a fix applied in a patch for ISE. When I reach out to TAC, they say that the tickets say "waiting for Apple developers", yet no information regarding this is in the bug notifications and they have no ETA.

Considering High Sierra has been released for over 3 months now and that Cisco and Apple announced publicly they were in partnership to work on making their tech agree with each other last June, what happened here? Three months of this protocol being completely broken and no real feedback or communication from either side on who will fix and when is absolutely unacceptable taking into consideration the partnership between companies and that both of these tickets are marked as Closed/Fixed.

Any insight is greatly appreciated.

Here are the most recent bug IDs for this issue:

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg73639

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf96030

1 Accepted Solution

Accepted Solutions

Attached is a profile I created using Apple Configurator 2 and tested ok with the dCloud lab Cisco ISE Mobility Deep Dive. It seems the key is to use 1.0 as the TLS Max Version.

Screen Shot 2018-01-27 at 3.59.55 PM.png

View solution in original post

12 Replies 12

hslai
Cisco Employee
Cisco Employee

CSCvg73639 is a doc bug.

CSCvf96030 is addressed and verified in ISE 2.3 Patch 1. It seems a change in SPW.

Which ISE release is your deployment on? I will check with our team and see whether we may validate it.

I am running ISE 2.3 without any patches at the moment. It appears that sometimes the upgraded (10.13) laptops will respond with the prompt saying that "this wifi network could not be joined" and when that happens I don't even see a failed authentication attempt in ISE. I will be able to get more test data on Monday.

Thanks for looking into this issue - the help is greatly appreciated with how frustrating this has been

Alright! Finally was able to get more information on this issue - My OSX 10.13 (High Sierra) test machine reaches ISE when attempting to authenticate and gets the following errors in the authentication report:

Event5411 Supplicant stopped responding to ISE
Failure Reason12118 EAP-FAST cryptobinding verification failed
ResolutionVerify that the client's supplicant is properly configured.
Root causeEAP-FAST cryptobinding verification failed.

Our 10.12 (Sierra) laptops have been fine.  Any insight into if this corresponds with an open bug ID or anything I can test to get more information for this?

What is the SPW version you used? Our engineering team said the fix in the latest SPW for macOS.

I have not had to use SPW ( I believe this is used to configure dot1x profiles for devices? ) - our laptops would just connect with 10.12 to the network without further configuration.  Is that something I should check out? I didn't see the download for OS X under the ISE images page.

Please download mac-spw-dmg-2.3.0.43-isebundle.zip under ISE 2.3.0.

Screen Shot 2018-01-25 at 7.20.47 PM.png

Thanks for that! I found the installer and downloaded it - however I was unable to find documentation for it. Will this help me create a dot1x profile that I can then deploy to other machines?  At the moment, SPW starts up and proclaims it cannot find ISE, so any information to troubleshoot myself would be very much appreciated.

This SPW is for ISE BYOD.

Please take a look of the following:

Attached is a profile I created using Apple Configurator 2 and tested ok with the dCloud lab Cisco ISE Mobility Deep Dive. It seems the key is to use 1.0 as the TLS Max Version.

Screen Shot 2018-01-27 at 3.59.55 PM.png

hslai
Cisco Employee
Cisco Employee

After some discussions, it turns out SPW for macOS version 2.3.0.43 was a temporary solution and we are planning to post 2.2.1.43, which has full support for macOS 10.13.x.

If you do not use ISE BYOD for macOS, please do try the info I posted in with Apple Configurator 2.

Well, I'll be. Had some time to test this today and after trying pretty much everything, once we set TLS to 1.0, the OSX 10.13. laptops were able to connect without issue. Yay! Final question then is, is this is a missing TLS1.2 cipher issue and if so, is this on ISE or OSX?  

Anyhow, thanks so much for digging into this hslai, you have been amazing at uncovering the answers to the questions I've had and are the true expert of this forum.

The issue is that there are ciphers in the EAP-FAST RFC that Apple has disabled.

For EAP-FAST to work the ciphers below need to be enabled for authenticated/anonymous PAC provisioning.

TLS_RSA_WITH_RC4_128_SHA

TLS_RSA_WITH_AES_128_CBC_SHA

TLS_DHE_RSA_WITH_AES_128_CBC_SHA

For authenticated PAC provisioning

TLS_DH_anon_WITH_AES_128_CBC_SHA

For Anonymous PAC Provisioning

Apparently, macOS 10.13.x allows these ciphers with TLS 1.0.

You are welcome and thanks a lot for your nice words.