We have now seen this issue again, but this time with Windows 11.
On the workstation we found (in the EapHost/Operational logs) Event ID: 2086. EapHostPeerGetResult returned a failure. Reason code 2148074244. Root Cause String: The Local Security Authority cannot be contacted.
Amending the setting in ClearPass to disable the RSA-PSS setting resolved (at least temporarily to confirm this is the root cause of the issue).
The TPM in question is running the known problem version (TMP 2.0 sub-version 1.16).
Hope this helps as the logs in ClearPass were considerably different to other occasions we have seen this issue.------------------------------
________________________________________
Best Regards
Daniel Davis
If you find my answer useful, consider giving kudos and/or mark as solution
_____________________________________________________________
------------------------------
Original Message:
Sent: Feb 05, 2024 05:11 AM
From: DDTechie
Subject: Clients affected by CP‑49353 in ClearPass 6.11 from Windows 10
Good Morning,
We have seen this issue a couple of times with different customers on upgrade to 6.11.x, with all showing the last octet invalid logs, and the RSA-PSA setting has resolved these.
We are in the process of upgrading another customer to 6.11 (6.11.7) and in initial testing we found that we got constant timeouts with a test client (ClearPass logs the usual Error 9002 - Client did not complete EAP transaction).
If we pointed the test SSID back to the existing 6.10.x ClearPass it authenticated perfectly.
After testing extensively we have identified that changing just the RSA-PSS setting to disable clients then authenticate perfectly again (repeated enable/disable twice again to rule out any other factors).
Hope this helps others... we will continue to look at the client device as this is probably where the issue is originating from.
------------------------------
________________________________________
Best Regards
Daniel Davis
If you find my answer useful, consider giving kudos and/or mark as solution
_____________________________________________________________
Original Message:
Sent: May 11, 2023 02:31 AM
From: jonas.hammarback
Subject: Clients affected by CP‑49353 in ClearPass 6.11 from Windows 10
Hi
Timeouts are often a result of a mismatch in the client configuration in relation to the ClearPass server certificate.
The client settings must allow the client to accept the Radius certificate.
The issue described seems to be another issue maybe better for a separate thread, or a TAC case.
------------------------------
Best Regards
Jonas Hammarbäck
MVP 2023, ACCX #1335, ACX-Network Security, Aruba SME, ACMP, ACDP , ACEP, ACSA
Aranya AB
If you find my answer useful, consider giving kudos and/or mark as solution
Original Message:
Sent: May 10, 2023 03:00 PM
From: AH71
Subject: Clients affected by CP‑49353 in ClearPass 6.11 from Windows 10
Unfortunatelly no, Only "Timeouts" in Reauthentication
Original Message:
Sent: May 03, 2023 10:16 AM
From: jonas.hammarback
Subject: Clients affected by CP‑49353 in ClearPass 6.11 from Windows 10
Hi
I don't know if it's an issue in PEAP with EAP-TLS as inner method as well, but I guess so.
Do you get any error message related to the timeouts?
------------------------------
Best Regards
Jonas Hammarbäck
MVP 2023, ACCX #1335, ACX-Network Security, Aruba SME, ACMP, ACDP , ACEP, ACSA
Aranya AB
If you find my answer useful, consider giving kudos and/or mark as solution
Original Message:
Sent: May 02, 2023 04:44 PM
From: AH71
Subject: Clients affected by CP‑49353 in ClearPass 6.11 from Windows 10
Does it also appear with PEAP + EAP-TLS Method? We get all the time timeouts and don´t know why since 6.11
Original Message:
Sent: Apr 25, 2023 11:03 AM
From: jonas.hammarback
Subject: Clients affected by CP‑49353 in ClearPass 6.11 from Windows 10
An update for anyone running into the same issue and need a quick guide how to solve the issue for the clients.
We implemented a fix by removing the PSS RSA algorithm for the customer with clients with this issue by pushing a GPO removing the keys below.
The values that need to be removed are found under:
Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Cryptography\Configuration\Local\SSL\00010003
Remove the following values:
RSAE-PSS/SHA256
RSAE-PSS/SHA384
RSAE-PSS/SHA512

For clients that was already in a state where they could not authenticate we had to work around that by either allowing MAC authentication or in some cases manually disable the authentication on the switch port for some time to allow the client to retrieve the new settings in the GPO.
------------------------------
Best Regards
Jonas Hammarbäck
MVP 2023, ACCX #1335, ACX-Network Security, Aruba SME, ACMP, ACDP , ACEP, ACSA
Aranya AB
If you find my answer useful, consider giving kudos and/or mark as solution
Original Message:
Sent: Apr 21, 2023 03:58 AM
From: jonas.hammarback
Subject: Clients affected by CP‑49353 in ClearPass 6.11 from Windows 10
Hi
I have a customer affected by CP‑49353 in all 6.11.x versions (found in Policy manager section under Known Issues for 6.11.0 in the Release Notes) and got the information from the TAC that it's a client issue. The Windows client sends 256 zeroes instead of the sha256 hash.
Have anyone else encountered this issue and are able to tell if the it's works good to disable RSA PSS algorithm on the Windows client, any other issues arising?
I would also like to know is someone can explain why this is happening only when the clients connect to ClearPass 6.11.x and not earlier versions, like 6.10.x.
Is there a change in the lowest possible algorithm in 6.11 and this forces the client to negotiate a an algorithm that is poorly implemented on the Windows side?
The error message seen in Access Tracker is:
Error Code:
|
215
|
Error Category:
|
Authentication failure
|
Error Message:
|
TLS session error
|
Alerts for this Request
RADIUS
|
EAP-TLS: fatal alert by server - decrypt_error TLS Handshake failed in SSL_read with error:0407E086:rsa routines:RSA_verify_PKCS1_PSS_mgf1:last octet invalid eap-tls: Error in establishing TLS session
|
|

------------------------------
Best Regards
Jonas Hammarbäck
MVP 2023, ACCX #1335, ACX-Network Security, Aruba SME, ACMP, ACDP , ACEP, ACSA
Aranya AB
If you find my answer useful, consider giving kudos and/or mark as solution
------------------------------