This article describes how to determine if there are issues with RADIUS authentication, specifically MS-CHAPv2, due to running firmware version 6.6.x, and provides a few methods for resolution.
FortiAuthenticator v6.6.0-6.6.2.
FortiAuthenticator 6.6.x introduced an issue with MS-CHAPv2 (ID 1026189), including firmware version 6.6.2, which itself contains a fix for the widely-reported Blast-RADIUS vulnerability.
In particular, this issue can cause MS-CHAPv2 authentication to fail, with this error:
Windows AD administrator authentication from x.x.x.x (mschap) with FortiToken failed: AD auth error: The attempted logon is invalid. This is either due to a bad username or authentication information. (0xc000006d)
This may happen even if the password is correct.
This happens if all of the following conditions are met:
There are three possible solutions:
The issue will be fixed in firmware version 6.6.3.
There is also a special build available upon request. A request can be submitted via a ticket with Technical Support.
The issue only occurs if NTLMv1 is disabled on whatever domain controller FortiAuthenticator communicates with.
Enabling NTLMv1 should ensure that the error no longer occurs.
However, NTLMv1 is generally disabled as it is deemed insecure.
Switching away from MS-CHAPv2 also resolves the issue, as no Windows AD authentication (and thus NTLM) is required.
However, with remote users, CHAP is not a possibility, leaving PAP.
This usually means a cleartext password is sent from the RADIUS client to FortiAuthenticator.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.