Security

last person joined: 10 hours ago 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

No RADIUS requests from controller. No validate certificate prompt.

This thread has been viewed 3 times
  • 1.  No RADIUS requests from controller. No validate certificate prompt.

    Posted Jan 11, 2019 12:41 AM

    I'm a bit puzzled on this one, and I don't even have a good hunch on this one.

     

    I've got an internal-CA-signed server certificate. It includes the server certificate, the intermediate and the root chain on both clearpass VMs (in a cluster).

     

    While most people want to get rid of the "windows cannot verify the server's identity." I'm at the point where I want to see it. Packet capture on clearpass on a non-domain windows laptop has data coming from the aruba controller (no alert on the machine, just spins.) If there's packets I see the events in the access tracker.

     

    My Mac OS X eventually popped up the radius certificate in which I accepted. It authenticates with peap mschapv2 just fine.

     

    However, on smartphones, and a domain-joined laptop (with a computer and user certificate installed) there is nothing that shows up in CPPM. No access tracker events, no RADIUS frames.  I assume it is because the iphone can't validate the certificate, but why don't I get a prompt? Is there a way to understand what is failing here?

     

    TAC brushed it off saying it was likely the controller. Controller is a 7205 on 8.3.0.5 code.



  • 2.  RE: No RADIUS requests from controller. No validate certificate prompt.
    Best Answer

    EMPLOYEE
    Posted Jan 11, 2019 03:16 AM

    The certificate is presented in the first few authentication frames. That means that in order to get the client pop up, or even the client to decide not to continue authentication, there must have been some radius communication.

     

    Clients that don't trust the certificate typically show up either as REJECT or TIMEOUT in the access tracker and you should see RADIUS traffic.

     

    Do you see the client to attempt authentication if you run a 'show auth-tracebuf' on the controller? Most times if you run a Wireshark or other packet capture tool from the client, you should see EAPOL frames in the capture that indicate there is authentication attempted. Do you see those on the problem clients?

     

    Good that you installed client certs, as MSCHAPv2 authentication should be avoided for security reasons unless you have full control and management over the clients that authenticate that way. 



  • 3.  RE: No RADIUS requests from controller. No validate certificate prompt.

    Posted Jan 11, 2019 02:08 PM

    Thanks for the responses everyone.

     

    I just wanted to follow up that I believe I hit a bug with the mobility master in which the controllers ended up with radius servers as a 127.0.0.1 loopback interface. Once that was manually overriden on each controller the show auth-trace-buf started to populate and we began seeing radius packets on the clearpass server.

     

    I'm not sure why one device seemed to work over the other. Maybe that was a flaw in our testing.