<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EAP-TLS: TLS Alert read:fatal:unknown CA in ExtremeCloud A3</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-a3/eap-tls-tls-alert-read-fatal-unknown-ca/m-p/70863#M52</link>
    <description>Is this a private CA with no intermediate CAs? Did the root CA sign both the RADIUS server certificate used by A3 and the client certificates used by clients? Or was the RADIUS SERVER cert signed by the root but the ISSUE-CA cert signed clients?&lt;BR /&gt;&lt;BR /&gt;The general order:&lt;BR /&gt;&lt;BR /&gt;The Certificate field will contain the CERT of the RADIUS SERVER certificate.&lt;BR /&gt;&lt;BR /&gt;The Certificate Authority certificate(s) field will contain, in order, the ROOT certificate that *signed* the RADIUS SERVER certificate followed by any other client certificate signing authorities in any order.&lt;BR /&gt;&lt;BR /&gt;The Intermediates will only be populated if there are intermediates in the chain for the RADIUS SERVER (i.e. Root -&amp;gt; Intermediate 1 -&amp;gt; Intermediate 2 -&amp;gt; Server -&amp;gt; Client). So if jnet-ADCS-ISSUE-CA signed the RADIUS SERVER cert it will be listed here. If the RADIUS SERVER cert was signed by a different CA it would be listed here. If the RADIUS SERVER cert was signed by the root, then it would be listed here.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;See https://extremeportal.force.com/ExtrArticleDetail?an=000098912 for some more information.</description>
    <pubDate>Fri, 25 Feb 2022 18:15:01 GMT</pubDate>
    <dc:creator>Robert_Haynes</dc:creator>
    <dc:date>2022-02-25T18:15:01Z</dc:date>
    <item>
      <title>EAP-TLS: TLS Alert read:fatal:unknown CA</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-a3/eap-tls-tls-alert-read-fatal-unknown-ca/m-p/70862#M51</link>
      <description>I'm testing EAP-TLS wireless cert-authentication this time. The radius debug log shows the following errors. &lt;BR /&gt;I have both private CA certs added to the RADIUS certificate section (Configuration --&amp;gt;System Config--&amp;gt;SSL Certs---Radius)&lt;BR /&gt;The certificate order is Root-CA first, Issuer/Intermediate CA second..screenshot below. The android phone also includes both CA certificates. My connection profile is set for the SecureSSID with a EAP-TLS source. The EAP-TLS source has no conditional matches and acts as a catch-all.&lt;BR /&gt;&lt;BR /&gt;
&lt;DIV style="color: #ffffff; background-color: #002451; font-family: Consolas, &amp;quot;Courier New&amp;quot;, monospace; font-weight: normal; font-size: 14px; line-height: 19px; white-space: pre"&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;Debug&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;Peer sent packet with method EAP TLS (13)&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;Debug&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;Calling submodule eap_tls to process data&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;Debug&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap_tls&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;Continuing EAP-TLS&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;Debug&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap_tls&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: [&lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;eaptls verify&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;] &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;= ok&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;Debug&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap_tls&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;Done initial handshake&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;ERROR&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap_tls&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;TLS Alert read:fatal:unknown CA&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;ERROR&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap_tls&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;TLS_accept&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;Failed in error&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;ERROR&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap_tls&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;Failed in __FUNCTION__ (SSL_read)&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;ERROR&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap_tls&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;ERROR&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap_tls&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;error:140940E5:SSL routines:ssl3_read_bytes:ssl handshake failure&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;ERROR&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap_tls&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;System call (I/O) error (-1)&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;ERROR&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap_tls&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;TLS receive handshake failed during operation&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;ERROR&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap_tls&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: [&lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;eaptls process&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;] &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;= fail&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;ERROR&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;Failed continuing EAP TLS (13) session. &amp;nbsp;EAP sub-module failed&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;Debug&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;Sending EAP Failure (code 4) ID 212 length 4&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="color: #ff9da4"&gt;Debug&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #ff9da4"&gt;eap&lt;/SPAN&gt;&lt;SPAN style="color: #ffffff"&gt;: &lt;/SPAN&gt;&lt;SPAN style="color: #d1f1a9"&gt;Failed in EAP select&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="9548d1539c9f4c85bc5830d354a7cf2e.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4411iFB52EC895DA574B2/image-size/large?v=v2&amp;amp;px=999" role="button" title="9548d1539c9f4c85bc5830d354a7cf2e.png" alt="9548d1539c9f4c85bc5830d354a7cf2e.png" /&gt;&lt;/span&gt;</description>
      <pubDate>Thu, 24 Feb 2022 22:23:56 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-a3/eap-tls-tls-alert-read-fatal-unknown-ca/m-p/70862#M51</guid>
      <dc:creator>MLD</dc:creator>
      <dc:date>2022-02-24T22:23:56Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS: TLS Alert read:fatal:unknown CA</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-a3/eap-tls-tls-alert-read-fatal-unknown-ca/m-p/70863#M52</link>
      <description>Is this a private CA with no intermediate CAs? Did the root CA sign both the RADIUS server certificate used by A3 and the client certificates used by clients? Or was the RADIUS SERVER cert signed by the root but the ISSUE-CA cert signed clients?&lt;BR /&gt;&lt;BR /&gt;The general order:&lt;BR /&gt;&lt;BR /&gt;The Certificate field will contain the CERT of the RADIUS SERVER certificate.&lt;BR /&gt;&lt;BR /&gt;The Certificate Authority certificate(s) field will contain, in order, the ROOT certificate that *signed* the RADIUS SERVER certificate followed by any other client certificate signing authorities in any order.&lt;BR /&gt;&lt;BR /&gt;The Intermediates will only be populated if there are intermediates in the chain for the RADIUS SERVER (i.e. Root -&amp;gt; Intermediate 1 -&amp;gt; Intermediate 2 -&amp;gt; Server -&amp;gt; Client). So if jnet-ADCS-ISSUE-CA signed the RADIUS SERVER cert it will be listed here. If the RADIUS SERVER cert was signed by a different CA it would be listed here. If the RADIUS SERVER cert was signed by the root, then it would be listed here.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;See https://extremeportal.force.com/ExtrArticleDetail?an=000098912 for some more information.</description>
      <pubDate>Fri, 25 Feb 2022 18:15:01 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-a3/eap-tls-tls-alert-read-fatal-unknown-ca/m-p/70863#M52</guid>
      <dc:creator>Robert_Haynes</dc:creator>
      <dc:date>2022-02-25T18:15:01Z</dc:date>
    </item>
  </channel>
</rss>

