Hi all
I have a number of Alcatel phones authenticating to UAC with 802.1X, using EAP-TLS. This works fine if I disable certificate checking on the user realm and role. However, if I enable certificate checking, client certificates are rejected, even though I have installed the root certificate (provided by Alcatel) into the Trusted Client CA. Have I missed something?
Here is the installed Trusted Client CA page:
The root-level CA in the tree above looks like this in detail on the IC6500:
Issued To: Alcatel Enterprise Solutions CN: Alcatel Enterprise Solutions OU: PKI Authority O: Alcatel C: FR Issued By: Alcatel Enterprise Solutions CN: Alcatel Enterprise Solutions OU: PKI Authority O: Alcatel C: FR Valid Dates: Sep 28 10:03:42 2005 GMT - Sep 28 10:11:08 2055 GMT Details: Other Certificate Details Version: 3 Serial: 4d:04:21:18:6d:70:a1:8b:42:b0:cc:df:37:da:51:c8 Signature Algorithm: sha1WithRSAEncryption Public Key Algorithm: rsaEncryption Public Key Type: RSA Public Key Bits: 2048 Public Key: Modulus (2048 bit): 00:a8:5b:e4:6d:08:25:78:6d:51:72:6a:34:64:1d: 7e:a6:72:2d:96:fe:f9:05:a9:8c:b4:39:93:85:28: ef:3a:21:b4:ab:a3:a8:97:5e:26:3c:0a:70:46:0b: a6:14:3e:0e:4e:b0:1a:b0:41:c2:85:ae:95:fb:83: 17:77:eb:20:c6:8e:7e:e8:78:85:87:7b:a4:98:8f: e2:c9:37:87:59:c2:ba:2e:b7:6c:7a:3f:78:20:a5: 80:88:c5:22:67:eb:53:aa:65:56:e5:b7:c5:05:71: dd:b7:88:be:08:4e:81:e0:c7:33:d4:46:1f:8a:48: 7c:0c:e2:f9:9f:2f:cf:4f:a3:b1:86:a8:2c:29:77: 33:ff:48:03:28:ec:c6:c5:b0:b4:b5:60:ed:4e:10: 9a:7d:c7:f2:d1:25:8e:fa:03:42:a0:6b:b6:50:02: 8c:8c:e3:dd:b2:96:6c:76:01:b3:84:9c:8c:a9:2f: fa:3c:45:81:fc:04:71:60:09:f7:82:c1:dc:2c:0e: 0a:47:dc:50:2a:e2:27:0b:7e:2e:30:c3:e1:2b:9c: 11:c4:96:4a:47:40:86:69:ef:6b:01:0e:2b:30:83: 73:02:bf:25:6b:81:f8:7b:9b:18:73:25:c6:0d:2a: c5:12:df:1e:66:83:d1:a2:9e:f3:a5:bb:2a:3c:4e: 90:8d Exponent: 65537 (0x10001) Key Usage: Certificate Sign, CRL Sign Basic Constraints: CA:TRUE Subject Key Identifier: B7:1F:4E:45:B5:00D:F3:C7:9A:97:62:04:08
1:9A:4C:BA:4A:0D 1.3.6.1.4.1.311.21.1: Certificate Policies: Policy: 1.3.12.2.1006.73.0.0.1 User Notice: Explicit Text: Thumbprint Algorithm: SHA1 Thumbprint: FA:40:F1:F2:03:AA:7C:40:35:69:4F:24:69:84:50:3C:6D:35:1
And here is the certificate received from the 802.1X supplicant, as seen in Wireshark:
Hi,
We need to see the radius troubleshooting logs under monitoring section and user access logs in IC to see why the
authentication is rejected. This will help us to way forward.
Regards,
Kannan
Hi Kalagesan
I attach three radius log files for you. The difference is in the realm...authentication...certificate configuration. Hopefully, the file titles help idetify which is which, but if you need me to explain, let me know.
Many thanks for taking an interest!
Hi,
Thanks for providing the logs.
Iwill have a look on this today and get back soon with my findings
Regards,
Kannan
Hi,
I had looked in to the uploaded logs where we see authentication failing with both EAP-TLS and EAP-MD5
with certficate restriction enabled.
Based on my findings I suspect that the EAP authentication based on certificate is failing due to
the certficates and the way you are using it.
Please follow the below 2 KB's and see if that helps.IF this doesn't help please provide IC User access and
IC event logs as well.
http://support.microsoft.com/kb/814394
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)Could not set the auth anchor from SbrAuth
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)EAP MD5-Challenge sub-protocol received response
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)Authenticating user ALCIPT with authentication method EAP-MD5-Challenge
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)Request::Authenticate called. Username is ALCIPT
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)Client supplies CHAP password
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)ChapRequest::ForwardCredentials
minor - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)Missing or invalid client certificate
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)User ALCIPT firmly rejected by EAP-MD5-Challenge auth method
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)Incorrect answer to EAP MD5 challenge ... password must have been specified incorrectly
point method .
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)-----------------------------------------------------------
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)Authentication Response (reject)
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)Packet : Code = 0x3 ID = 0xee
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)Vector =
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)000: 5f7ea434 c2c65725 4e099858 63f61a7c |_~.4..W%N..Xc..||
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)EAP-Message (Failure, id=2) : Value =
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)000: 04020004
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)Could not set the auth anchor from SbrAuth
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)EAP-TLS authentication succeeded
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)EAP-TLS performing secondary authorization for user 00809F5B68DC
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)Authenticating user 00809F5B68DC with authentication method EAP-TLS
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)EAP-TLS: Asked to begin authenticating user 00809F5B68DC
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)EAP-TLS: Credential type must be EAP
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)Authenticating user 00809F5B68DC with authentication method EAP-TLS Secondary Auth
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)Request::Authenticate called. Username is 00809F5B68DC
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)Client supplies NONE password
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)ClientCertRequest::ForwardCredentials
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)User 00809F5B68DC firmly rejected by EAP-TLS Secondary Auth auth method
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)EAP-TLS protocol succeeded, but no authentication method claimed ALCIPT user
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)User ALCIPT ultimately failed challenge sequence
info - [127.0.0.1] - System()[] - 2012/08/29 12:45:16 - node1 - (afdc7250)User ALCIPT being passed to Auth-Final-Response
NOTE:
Please mark this post as 'accepted solution' if this answers your question that way it might help others as well, a kudo would be a bonus thanks!!
Regards,
Kannan
I was able to get the root and IP Touch certs from Alcatel but having a hard time finding the wired phones cert. When downloading from Alcatel's website it redirects to a blank page. How did you get yours?
My customer requested them through their Alcatel account. If it helps, I attach the file I received.
Yes this might help
Regards,
Kannan