FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
yangw
Staff
Staff
Article Id 212445
Description This article describes the SSL-VPN authentication with FortiOS version 5.6 sometimes results in dead sessions in the RADIUS authentication process fnbamd.
Scope FortiGate V5.6, FortiAuthenticator V5.4.
Solution

The FortiAuthenticator debug log:

 

The same log keeps coming every 10 seconds. The RADIUS authentication requests looping is sent from the FortiGate (RADIUS Client) repeatedly, IP address of 172.20.110.33 is the FortiGate.

2020-09-10T15:45:15.198354+08:00 FortiAuthenticator radiusd[840]: ===>NAS IP:172.20.110.33
2020-09-10T15:45:15.198360+08:00 FortiAuthenticator radiusd[840]: ===>Username:aceraeb
2020-09-10T15:45:15.198365+08:00 FortiAuthenticator radiusd[840]: ===>Timestamp:1599723915.198110, age:0ms
2020-09-10T15:45:15.198372+08:00 FortiAuthenticator radiusd[840]: Found NAS from preloaded collections for 172.20.110.33: FGVM (172.20.110.33)
2020-09-10T15:45:15.199042+08:00 FortiAuthenticator radiusd[840]: Found NAS profile for client, NAS: 172.20.110.33 profile: Default
2020-09-10T15:45:15.199382+08:00 FortiAuthenticator radiusd[840]: Setting 'Auth-Type := FACAUTH'
2020-09-10T15:45:15.199394+08:00 FortiAuthenticator radiusd[840]: [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
2020-09-10T15:45:15.199400+08:00 FortiAuthenticator radiusd[840]: # Executing group from file /usr/etc/raddb/sites-enabled/default
2020-09-10T15:45:15.199406+08:00 FortiAuthenticator radiusd[840]: This is a response to Access-Challenge
2020-09-10T15:45:15.199411+08:00 FortiAuthenticator radiusd[840]: ERROR: partial auth user not found
2020-09-10T15:45:15.199424+08:00 FortiAuthenticator radiusd[840]: Updated auth log 'aceraeb': user authentication error: user not partially authenticated
...
2020-09-10T15:45:21.199947+08:00 FortiAuthenticator radiusd[840]: Ready to process requests.
2020-09-10T15:45:25.218347+08:00 FortiAuthenticator radiusd[840]: # Executing section authorize from file /usr/etc/raddb/sites-enabled/default
2020-09-10T15:45:25.218367+08:00 FortiAuthenticator radiusd[840]: ===>NAS IP:172.20.110.33
2020-09-10T15:45:25.218373+08:00 FortiAuthenticator radiusd[840]: ===>Username:aceraeb
2020-09-10T15:45:25.218379+08:00 FortiAuthenticator radiusd[840]: ===>Timestamp:1599723925.218100, age:0ms
2020-09-10T15:45:25.218385+08:00 FortiAuthenticator radiusd[840]: Found NAS from preloaded collections for 172.20.110.33: FGVM (172.20.110.33)
2020-09-10T15:45:25.219135+08:00 FortiAuthenticator radiusd[840]: Found NAS profile for client, NAS: 172.20.110.33 profile: Default
2020-09-10T15:45:25.219489+08:00 FortiAuthenticator radiusd[840]: Setting 'Auth-Type := FACAUTH'
2020-09-10T15:45:25.219501+08:00 FortiAuthenticator radiusd[840]: [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
2020-09-10T15:45:25.219507+08:00 FortiAuthenticator radiusd[840]: # Executing group from file /usr/etc/raddb/sites-enabled/default
2020-09-10T15:45:25.219513+08:00 FortiAuthenticator radiusd[840]: This is a response to Access-Challenge
2020-09-10T15:45:25.219518+08:00 FortiAuthenticator radiusd[840]: ERROR: partial auth user not found
2020-09-10T15:45:25.219532+08:00 FortiAuthenticator radiusd[840]: Updated auth log 'aceraeb': user authentication error: user not partially authenticated

 

The debug log continuously appears on FortiGate/FortiAuthenticator.


FortiGate:

 

# diag debug application sslvpn -1
# diag debug application fnbamd -1
# diag debug enable
[1280] __fnbamd_rad_send-Sent radius req to server 'FAC': fd=13, IP=172.20.110.34(172.20.110.34:1812) code=1 id=33 len=126 user="aceraeb" using PAP
[62] handle_rad_timeout-Timer of rad 'FAC' is added
[46] handle_rad_timeout-rad 'FAC' 172.20.110.34 timed out, resend request.
[1280] __fnbamd_rad_send-Sent radius req to server 'FAC': fd=13, IP=172.20.110.34(172.20.110.34:1812) code=1 id=33 len=126 user="aceraeb" using PAP
[62] handle_rad_timeout-Timer of rad 'FAC' is added


FortiAuthenticator:

 

Logging -> Log Access -> Logs -> Debug Report (button).


FortiAuthenticator radiusd[840]: ===>NAS IP:172.20.110.33
FortiAuthenticator radiusd[840]: ===>Username:aceraeb
FortiAuthenticator radiusd[840]: ===>Timestamp:1599723915.198110, age:0ms
FortiAuthenticator radiusd[840]: Found NAS from preloaded collections for 172.20.110.33: FGVM (172.20.110.33)
FortiAuthenticator radiusd[840]: Found NAS profile for client, NAS: 172.20.110.33 profile: Default
FortiAuthenticator radiusd[840]: Setting 'Auth-Type := FACAUTH'
FortiAuthenticator radiusd[840]: [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
FortiAuthenticator radiusd[840]: # Executing group from file /usr/etc/raddb/sites-enabled/default
FortiAuthenticator radiusd[840]: This is a response to Access-Challenge
FortiAuthenticator radiusd[840]: ERROR: partial auth user not found
FortiAuthenticator radiusd[840]: Updated auth log 'aceraeb': user authentication error: user not partially authenticated


Running the commands below shows authenticate failed.


#diag test authserver radius FAC_RADUIS pap aceraeb Password


After restarting the fnbamd process, the error messages do not appear anymore.
Verifying the SSL-VPN login is working now.

- The FortiGate V5.6 bug was fixed in 6.0.1 GA with the bugID: 0489409 and it is a FortiGate bug.

- Basically, the SSL-VPN authentication sometimes results in dead sessions in RADIUS authentication process which is fnbamd, that is the reason have to restart the process then the issue is gone.

It occurred when there is more than one firewall policy that matched with the same remote FortiAuthenticator (for the case) when a user tries to login with an invalid password or key in a wrong password.

Contributors