FortiSASE
FortiSASE delivers both a consistent security posture and an optimal user experience for users working from anywhere. Secure your hybrid workforce by closing security gaps, plus simplify operations.
RBA
Staff
Staff
Article Id 350373
Description This article describes how to fix the FortiSASE VPN connection issue with FortiAuthenticator used as authentication server.
Scope FortiSASE.
Solution

VPN connection gets stuck at 45% and the following log will be present under Analytics -> Events.


Screenshot 2024-10-17 132644.png

 

FortiAuthenticator is used as a RADIUS server and the sniffer on the FortiSASE instance would show the message-authenticator attribute being sent in Access-request however the authentication would fail with the debug log.

 Radius Attribute.png

 

The following logs can be noticed in the debug which shows the server is responding without the Message-Authenticator attribute.

 

2024-10-17 09:25:09 [1522] fnbamd_auth_handle_radius_result-Timer of rad 'FortiAuthenticator' is deleted
2024-10-17 09:25:09 [220] check_response_authenticator-No Message Authenticator
2024-10-17 09:25:09 [1905] fnbamd_radius_auth_validate_pkt-Invalid digest
2024-10-17 09:25:09 [1539] fnbamd_auth_handle_radius_result-Error validating radius rsp
2024-10-17 09:25:09 [2765] handle_auth_rsp-Continue pending for req 1439542714

 

Also, the RADIUS config under FortiSASE would show 'Invalid secret' while performing Test Connection. The secret change would not help in this scenario.

The behavior change is due to mitigating RADIUS Protocol CVE-2024-3596. Refer CVE-2024-3596. 

The solution would be to upgrade FortiAuthenticator to 6.4.10, 6.5.6, 6.6.2, or 7.0.0. FortiAuthenticator 6.6.2 is currently released, and the rest are expected to be released shortly.
Post upgrade, the 'Require client to send Message-Authenticator attribute' option has to be enabled. 

 

Contributors