Created on 07-12-2022 09:33 AM Edited on 07-12-2022 09:34 AM By Anonymous
| Description |
This article describes how can OCSP response verify failure, check_ocsp_resp returns -1 0, be fixed when OCSP verification is enabled. |
| Scope | FortiGate v6.x, v7.x. |
| Solution |
The error will cause the strict-ocsp-check to fail, which in turn will cause the authentication to fail. # config vpn certificate setting #set ocsp-status enable #end
The output below is an excerpt of the following debug:
#diag debug console timestamp enable *** [2782] handle_req-Rcvd auth_cert req id=554231458, len=1048 recv returned: 0 - indicated that the certificate is good, it passed the check on the OCSP server. Packet Capture:
127 2022-07-01 12:43:34.191167 0.000062 2022-07-01 12:43:34.191167 fortiauth.local 64 1352 10.5.23.113 OCSP Response 00:78:65:6e:58:01 1418
responses: 1 item But still, the client/firewall returns an error and auth fails, fnbamd_comm_send_result-Sending result 1.
This indicates that the issue might be on the firewall/ocsp client, and it is very likely to be caused by a mismatching root CA as follows: 1) The root CA cert that issued ocsp-test is missing from the firewall.
Upload that to the firewall.
2) The root CA cert might exist on the firewall, CN matching, but is simply a different cert from ocsp-test's issuer.
Get hold of the correct root CA cert and upload it to the firewall.
Compare the root CA certs by looking at the SN.
3) If there are multiple CA authorities in the organization, then the client might be using a cert issued by another authority, different from what is expected on the OCSP server and OCSP client.
Make sure the correct client cert is used. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.