You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

IOS 5 wifi wpa2 enterprise problem (bug?)

Hello,

I just upgraded some of our devices to IOS 5 and wifi stopped working. We are using WPA2 Enterprise with EAP-TLS and all the devices with IOS 4 still work fine.

Is anyone experiencing this kind of problem?

Thanks

Andrea


PS: This is the server log:


Fri Oct 14 10:07:13 2011 : Error: TLS Alert read:warning:close notify

Fri Oct 14 10:07:13 2011 : Error: TLS_accept: failed in SSLv3 read client certificate A

Fri Oct 14 10:07:13 2011 : Error: rlm_eap: SSL error error:140940E5:SSL routines:SSL3_READ_BYTES:ssl handshake failure

Fri Oct 14 10:07:13 2011 : Error: SSL: SSL_read failed in a system call (-1), TLS session fails.

iOS 5

Posted on Oct 14, 2011 3:14 AM

Reply
36 replies

Jun 12, 2012 9:23 AM in response to andreafrompesaro

We too have this issue in our environment; IOS devices only have issues connecting to wireless. While not an answer to the actual issue, here is some more detail on what we saw and how we provided a workaround.


The wireless is WPA2 Enterprise with EAP-TLS. It uses AP's that point to a RADIUS server for authentication. There are 4 sites with many AP's within each site. At one of the sites, there are no issues connecting at all. Moving to a secondary site, devices could not connect.


Using the iPhone Configuration Utility to make testing consistent, we created two Configuration Profiles.


  • CERT ONLY - This contains the certificate for ONLY user (User certificate)
  • CERTS ONLY - This contains the certificates for each object within the certificate chain for the user certifcate (Root CA, Policy CA, Issuing CA and User certificate)
  • SSID with CERTS - This contains the certificates for each object within the certificate chain for the user certifcate (Root CA, Policy CA, Issuing CA and User certificate). Adding the WiFi connection information to include Service Set Identifier (SSID), Security Type (Any Enterprise), Protocol (TLS; This is EAP-TLS as selected within the iOS.) and Identification Certificate (selecting the User certificate).


Testing (Each time deleting all Profiles, deleting the WiFi connection, and disabling and re-enabling WiFi to clear settings):


Apply CERT ONLY Configuration Profile to an iPhone. The device was not able to connect in the secondary site.

Apply SSID with CERTS Configuration Profile to an iPhone. The device was able to connect in the secondary site.

Apply CERTS ONLY Configuration Profile to an iPhone. The device was prompted to accept the certificate for the RADIUS server it was authenticating to. Accepting the certificate, the device was able to connect in the secondary site.


For us, the issue appears to be iOS and certificate related.

Jun 12, 2012 10:04 AM in response to TenOf11

Hello,


Just wanted to inform you that unfortunately i have not received any updates or answer to the ticket i raised with apple back in march regarding this issue even though at the beginning they were working hard at it. Not sure if they are resolving it on their new iOS 6 but i think it wouldnt hurt for anyone experiencing the same issue to raise a bug report ticket with Apple :) maybe if they get enought tickets theyll see how many ppl are being affected :). Their site for reporting issues is bugreport.apple.com


Please update us here if anyone is able to get a solution thanks

Jan 31, 2013 12:46 PM in response to MaikelLachapel

Hello,


I know that this is an old thread, but I stumbled across it while looking for something else. I just wanted to say that Apple dropping support for MD5-signed certificates is not a bug; it's sensible. MD5 is a hashing algorithm that was broken years ago. Using MD5 for security is equivalent to using no security at all. SHA-1 is a much more secure algorithm that has not been broken.


Similarly, you should never "downgrade" from WPA2 to WPA or WEP, as both of those older security schemes have been broken as well. Stick with WPA2 and you will be much safer.


- Steve

IOS 5 wifi wpa2 enterprise problem (bug?)

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.