Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
eby
New Contributor

Strange RSSO issue in FortiOS 5.0.7 onwards.

Freeradius server is configured to send Radius accounting packets to our firewall running 5.0.7. Wireless users get network access thru Radius authentication. We use user email address as the username, and email address contain up to 55 characters. And on Fortigate, RSSO endpoint-attribute is set to user-name, so to display usernames in the logs and reports. This Setup was working fine up until November 2016. Somewhere in November, none of the RSSO users are able to access internet or other networks. Troubleshooting RSSO revealed "Parse error: Carrier Endpoint". When RSSO endpoint-attribute is unset, the users are able to access relevant networks and the Parse error vanished. Setting RSSO endpoint-attribute to User-name would work for few minutes and stop RSSO with the same "Parse error".

 

To resolve the issue, we have rebooted the firewall and finally upgraded to 5.2, the same problem persist ever after upgrading. Now the firewall logs/reports only show the client mac-address. Fortigate TAC team confirmed this as a bug after one month of followups and they have escalated to the engineering team. Till now no resolution. Have anyone here experienced this problem and know any workarounds for this ?. I need user names in firewall logs and reports. Thanks.

5 REPLIES 5
xsilver_FTNT
Staff
Staff

Hi eby,

that might be relevant to the old (FOS 5.0.0 mid 2012) engineering bug #174693 we have seen a long time ago, which turned to not-a-bug but technological limitation of what RADIUS daemon inside the FortiOS can handle as endpoint attribute.

Limit was claimed as to be 48 bytes. I'm not sure that limit stayed the same but it is highly probable.

Those data are stored in memory, so limiting their volume to necessary minimum is good, as in result it will either use less memory or allow higher amount of the logged on users within same amount of memory consumed.

 

Therefore as a workaround I'd suggest to shorten User-Name or use another AVP as endpoint attribute.

Something which can still perfectly identify user or his workstation as source of the data, but is also considerably shorter.

 

Best regards,

Tomas

Tomas Stribrny - NASDAQ:FTNT - Fortinet Inc. - TAC Staff Engineer
AAA, MFA, VoIP and other Fortinet stuff

eby

Hi Tomas, Many thanks for the insights, do you work for Fortinet ?.

Shortening User-Name is not possible. If that 48byte user-name limitation is still there, any idea what other AVP supports at least 56byte length to be set as endpoint attribute ?. On Fortigate 5.2, the following can be set for rsso-endpoint-attribute, and for sso-attribute, i'm using "Class" to pass the user_group_name to Fortigate.

User-Name
User-Password
CHAP-Password
NAS-IP-Address
NAS-Port
Service-Type
Framed-Protocol
Framed-IP-Address
Framed-IP-Netmask
Framed-Routing
Filter-Id
Framed-MTU
Framed-Compression
Login-IP-Host
Login-Service
Login-TCP-Port
Reply-Message
Callback-Number
Callback-Id
Framed-Route
Framed-IPX-Network
State
Class
Session-Timeout
Idle-Timeout
Termination-Action
Called-Station-Id
Calling-Station-Id
NAS-Identifier
Proxy-State
Login-LAT-Service
Login-LAT-Node
Login-LAT-Group
Framed-AppleTalk-Link
Framed-AppleTalk-Network
Framed-AppleTalk-Zone
Acct-Status-Type
Acct-Delay-Time
Acct-Input-Octets
Acct-Output-Octets
Acct-Session-Id
Acct-Authentic
Acct-Session-Time
Acct-Input-Packets
Acct-Output-Packets
Acct-Terminate-Cause
Acct-Multi-Session-Id
Acct-Link-Count
CHAP-Challenge
NAS-Port-Type
Port-Limit
Login-LAT-Port
Thanks, Eby

xsilver_FTNT

Hi eby,

 

Q: do you work for Fortinet ?

A: yes, on TAC support center.

Therefore I have no direct access to the code to know the lengths of all possible attributes.

My previous idea was NOT to shorted username, or use another attribute which can hold that loooong username. Idea was to use another of user attributes, like email address or UserPrincipalName (UPN) or just anything which do serve both purposes:

- is short enough to be <48 bit long

- is unique user identifier

 

Therefore you'll be able to uniquely identify user who committed actions but without the limit hit.

 

Your other option is to contact our sales team and with their help open NFR (New Feature Request). Which is basically code change request which is not a bug but modification to enhance feature set or particular feature.

 

Best regards,

Tomas

Tomas Stribrny - NASDAQ:FTNT - Fortinet Inc. - TAC Staff Engineer
AAA, MFA, VoIP and other Fortinet stuff

eby

Hi Tomas, I was thinking of passing real names in some RADIUS "reply attribute" that fortigate understand. We can configure RADIUS server to pass real names to fortigate in some reply attribute like email or UserFullName, but the problem is fortigate do not know how to process those attributes other than the list i have mentioned earlier and I don't know of any FortiOS 5.2 attribute that support long STRING in "rsso-endpoint-attribute" section. Can you provide a link/info on STRING "type" attributes that can be set in rsso-endpoint ?. Thanks, Eby

xsilver_FTNT

Hi Eby,

have a look into base RFC: https://tools.ietf.org/html/rfc2865

there are two possible types, text and string, see pg.24

So you can use multitude of default attributes (for example Filter-Id),

or one of few AVP from Fortinet RADIUS Dictionary.

http://kb.fortinet.com/kb/documentLink.do?externalID=FD30830

 

Best regards,

Tomas

Tomas Stribrny - NASDAQ:FTNT - Fortinet Inc. - TAC Staff Engineer
AAA, MFA, VoIP and other Fortinet stuff

Labels
Top Kudoed Authors