Hey everyone,
I recently attempted to set up Dial-Up VPN authentication using TOTPRadius in combination with an LDAP server and TOTP (Time-Based One-Time Password). TOTPRadius acts as a Proxy-RADIUS server and integrates LDAP authentication with TOTP for two-factor authentication.
The setup process was based on the information provided by Token2's guide, which primarily explains how to configure TOTPRadius for admin login but does not explicitly mention VPN authentication. The Test Authentication worked, but when in combination with VPN it doesn't.
The Problem:
When trying to authenticate a Dial-Up VPN client using FortiGate and TOTPRadius, the authentication fails with the following error message from the TOTPRadius Server shown in Wireshark:
Initial login not allowed; Empty password provided for user <blank-user>; Terminating process with Reject message
This suggests that the FortiGate did not transmit the user’s password when performing VPN RADIUS authentication.
Solved! Go to Solution.
IKEv2 does not allow for PAP authentication by design...
I wish I had done my research before this post, but as the above says, IKEv2 does not allow for PAP authentication. Since TOTPRadius uses PAP as a Proxy-RADIUS to simply cut the password part and the TOTP part, for the authentication. Which means you either use IKEv1 (which has been deemed depreacted and unsafe since 2019 from the IETF https://datatracker.ietf.org/doc/rfc9395/ ) or just don't.
The VPN does work when I use a normal RADIUS server such as NPS (Microsoft's own RADIUS).
NPS works with one step authentication, but TOTPRadius needs to decode the password to extract OTP from it .
Try with authentication type set as PAP
As TOTPradius needs to split the password, other methods may not work
Yeah, only PAP or "Default" works. Other authentication methods don't work.
Thanks Hev, actually I don't know TOTPradius, but you seem to know it well and what you said makes sense.
So if I understand well with this PAP config you just need to concatenate your TOTP with the password, and it should work well.
Exactly
IKEv2 does not allow for PAP authentication by design...
I wish I had done my research before this post, but as the above says, IKEv2 does not allow for PAP authentication. Since TOTPRadius uses PAP as a Proxy-RADIUS to simply cut the password part and the TOTP part, for the authentication. Which means you either use IKEv1 (which has been deemed depreacted and unsafe since 2019 from the IETF https://datatracker.ietf.org/doc/rfc9395/ ) or just don't.
If you don't have FortiAuthenticator then you can try FreeRadius. It is a very powerful RADIUS server and as far as I know it supports MS-CHAP-v2.
Hi AEK,
I wanted an authentication method using YubiKey without having to purchase an appliance for just 5–10 users. At first, TOTPRadius seemed like a great option, but it no longer does.
On the bright side, I finally figured out how to use certificate authentication with smartcards on FortiGate and LDAPS behind the scenes. So at least I have an alternative solution for my other issue. I guess I was too fixated on LANCOM’s VPN client not being able to read smartcards like the YubiKey, whereas FortiClient works perfectly.
User | Count |
---|---|
2546 | |
1354 | |
795 | |
643 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.