cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5734
Views
0
Helpful
12
Replies

Android Wireless Devices Not Prompted To Trust Certificate

s1nsp4wn
Level 1
Level 1

Hello,

I'm running into an issue where when joining our Cisco Wireless network, iPhones are presented with the option to trust/untrust our server-side certificate which is great.  The problem is we never get asked this for Android devices.  The only way to get around this is to not require CA certificate validation so then only username/password is needed but that is not the solution we want to go with.  Has anyone experienced this issue with Android before and is there anything I can do to troubleshoot on the Cisco end to check?

Cisco 5508 WLC

Latest Android IOS (but happens on all)

Server is an ACS Box that hosts the certificate passed to clients

 

2 Accepted Solutions

Accepted Solutions

Ric Beeching
Level 7
Level 7
This has always been an issue as far as I'm aware, iOS will prompt you but Android either ignores the certificate warning and ploughs right on, or doesn't tell you and will silently drop it.

Easiest solution to cater for most BYOD devices (and avoid the prompt) would be to purchase a trusted public CA signed certificate that both android and iOS devices support. Be careful as some 'trusted' CAs aren't supported by both..

Cheers,
Ric
-----------------------------
Please rate helpful / correct posts

View solution in original post

patoberli
VIP Alumni
VIP Alumni
This is completely normal on android. The only way to avoid it, is to use either an MDM or an App that installs the configuration file including the trusted certificate (plus intermediate and root).
Worse is, if you use PEAP + MS CHAPv2, it doesn't default to that (unlike Windows or Apple OS'). You always first need to manually select it, before you're able to connect.

View solution in original post

12 Replies 12

Y C
Level 1
Level 1

It's been a while since I've worked with an android device. But all the ones I've dealt with in the past default to "ignore certificate" or something to that affect by default. This is a client based decision that essentially leads to automatically trusting everything. I guess that does leave it more vulnerable to MITM type attacks. But truth be told, does an average user actually check certificate thumbprints / sn#s, etc? Or are you using an MDM to pre deliver the root certs?

 

Funny story. We had an issue with apple devices complaining about certs after we updated our PEAP cert in ISE because it was about to expire. We were scratching our heads why it only affected apple and not android. That's how we came to find out about the way android does things.

I'll get back to you as to what options the client is presented with, but we have something on our network capable of assigning profiles with certs to mobile devices.  i'm starting to wonder if maybe also Android needs the full chain and perhaps is not seeing the intermediate.

The cert isn't being pushed it seems.  Will need MDM admin to help with that.

Ric Beeching
Level 7
Level 7
This has always been an issue as far as I'm aware, iOS will prompt you but Android either ignores the certificate warning and ploughs right on, or doesn't tell you and will silently drop it.

Easiest solution to cater for most BYOD devices (and avoid the prompt) would be to purchase a trusted public CA signed certificate that both android and iOS devices support. Be careful as some 'trusted' CAs aren't supported by both..

Cheers,
Ric
-----------------------------
Please rate helpful / correct posts

My understanding of certificates/pki is limited, but the cert is by Digicert and is valid for a long time.  Am I correct in guessing that just cus the CA is trusted by iPhone doesn't necessarily mean this particular cert is for Android since the serial, expiration, sha strength is different?

 

I took a look at certs iPhone trusts out of the box and they offer great detail.  Android, from what I found, is a mess I have to scour though:

https://support.apple.com/en-us/HT208125

 

https://android.googlesource.com/platform/system/ca-certificates/+/master/files/


@s1nsp4wn wrote:

 Am I correct in guessing that just cus the CA is trusted by iPhone doesn't necessarily mean this particular cert is for Android since the serial, expiration, sha strength is different?


Not exactly. I'm far from an expert either but learned enough through trial by fire. If a cert is expired, nothing will trust it automatically (unless of course as established the device ignores it all together). If a device has a minimum requirement for certain sha levels, and your cert falls below that requirement, then the cert will be rejected and not even processed. This has nothing to do with apple vs android necessarily.

 

If getting rid of the popup on apple is the only goal then yes a public cert would do it. But is it worth it ? This popup is only a one time deal, once the client trusts it on the initial connection it will continue to trust it on subsequent attempts (unless the user manually goes back into the memorized wifi networks and chooses "forget this network")

It's Digicert SHA2 and i've been unsuccessful in seeing if Android has a problem with that SHA.  But the prompt is important for two reasons for us: 1. We want more than usn/psw to be necessary for access 2. We plan to eventually move to an EAP-TLS model where both server and client need a cert, so if PEAP is a problem EAP-TLS is gonna be a no-go.

So you want the device to prompt to trust the cert, and to prompt for an ID/pw. Unless there's a misunderstanding, there seems to be a conflict in what you want.

 

First, as mentioned... android ignores certs by default. If you want to change this you need to have a pre-delivered or manually created profile. Unless something changed in the last 6months - 1 yr I've dealt with this. If it's pre-deployed, there is no prompt.

 

Second - If you're using a cert from a public / trusted CA, and valid (as far as SHA etc goes) then there will be no prompt, not even the initial one.

 

The general goal is to avoid cert prompts while still maintaining integrity of the connection. Not to artificially introduce prompts.

So Android ignores by default and I'm still trying to figure out why when we select join on Android nothing happens UNLESS you tell the phone to ignore CA validation in which case you can then enter login creds.  As for one, the other, both that was just out of my ignorance since iPhone asks for user creds AND if you want to trust the cert.  Seems like I can start leaning towards pressing Google/Android and looking into EAP-TLS alternatives.

Public Certificate will get rid of the popup to accept or ignore the certificate warning.

Android does this by default.

 

*****Help out other by using the rating system and marking answered questions as "Answered"*****
*** Please rate helpful posts ***

patoberli
VIP Alumni
VIP Alumni
This is completely normal on android. The only way to avoid it, is to use either an MDM or an App that installs the configuration file including the trusted certificate (plus intermediate and root).
Worse is, if you use PEAP + MS CHAPv2, it doesn't default to that (unlike Windows or Apple OS'). You always first need to manually select it, before you're able to connect.

Thanks!
Review Cisco Networking for a $25 gift card