This article describes an issue where SSL VPN users with certificate-based authentication are unable to connect and see FortiClient disconnect at 48% progress.
FortiGate.
This issue will be observed, once the Firmware is upgraded from version 7.0.14 to 7.2.5 or above as lower encryption sha-1 certificates are used for certificate-based authentication for SSL VPN. Lower Signature user-based certificates that use SHA-1 are no longer supported on 7.2.5 and above.
Debug logs:
The collected debug logs for SSL VPN shows as below:
[347:root:2563]allocSSLConn:310 sconn 0x7f26b8e55800 (0:root)
[347:root:2563]SSL state:before SSL initialization (x.x.x.)
[347:root:2563]SSL state:fatal decode error (x.x.x.x)
[347:root:2563]SSL state:error:(null)(x.x.x.x)
[347:root:2563]SSL_accept failed, 1:unexpected eof while reading
[347:root:2563]Destroy sconn 0x7f26b8e55800, connSize=0. (root)
[344:root:2566]allocSSLConn:310 sconn 0x7f26b8e55800 (0:root)
[344:root:2566]SSL state:before SSL initialization (x.x.x.x)
[344:root:2566]SSL state:before SSL initialization (x.x.x.x)
[344:root:2566]got SNI server name: y.y.y.y (null)
[344:root:2566]client cert requirement: yes
[344:root:2566]SSL state:fatal handshake failure (x.x.x.x)
[344:root:2566]SSL state:error:(null)(x.x.x.x)
[344:root:2566]SSL_accept failed, 1:no suitable signature algorithm
[344:root:2566]Destroy sconn 0x7f26b8e55800, connSize=0. (root)
Debug Logs Observation:
Fatal handshake failure due to "no shared cipher" or "no suitable signature algorithm."
To resolve the issue, the following steps must be taken for the user's PC to use the newly signed certificate for the user with signature algorithm sha256 or above, as SHA-1 is no longer supported on 7.2.5.
After updating the certificate on the user's PC, try to initiate the connection for SSL VPN again and now the connection is established successfully without any errors.
To adjust the SSL/TLS version and cipher suites for SSL VPN, refer to Technical Tip: How to control the SSL version and cipher suite for SSL VPN.
SSL VPN debug command.
Use the following diagnose commands to identify SSL VPN issues.
These commands enable debugging of SSL VPN with a debug level of -1 for detailed results.
diagnose debug application sslvpn -1
diagnose debug enable
To disable the debug:
diagnose debug disable
diagnose debug reset
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.