mirror of
https://github.com/abbas-gheydi/radotp.git
synced 2026-04-26 19:45:55 +03:00
[GH-ISSUE #14] Fortigate 7.4.6 Compatibility with Solution for Fortigate 7.4.3: Configuration or Patches Needed? #10
Labels
No labels
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/radotp#10
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ramiabdallah1512 on GitHub (Jan 9, 2025).
Original GitHub issue: https://github.com/abbas-gheydi/radotp/issues/14
My firewall is running Fortigate 7.4.6, while the solution is compatible with Fortigate 7.4.3. Is there a solution or additional configuration to add, or any patches to apply? Thank you
@abbas-gheydi commented on GitHub (Jan 14, 2025):
Dear @ramiabdallah1512 ,
Thank you for commenting and reaching out. I plan to add RadSec support to RadOTP in the next release. but for now you can search for and use a RadSec proxy to fix the FortiGate issue.
@Ctere1 commented on GitHub (Jan 24, 2025):
Hi @abbas-gheydi, @ramiabdallah1512
Regarding your statement about Fortigate compatibility, when you refer to Fortigate compatible, are you referring to the Message-Authenticator attribute?
I’ve already added the necessary attribute in the project and ensured all the dependencies are updated accordingly. I wanted to share the updates with you here for your consideration.
Here’s the code I have updated:
I hope this helps! Maybe I can fork the project and open a PR. Let me know if I can help further.
Thank you for your work on this project.
@abbas-gheydi commented on GitHub (Jan 24, 2025):
Dear @Ctere1 , thank you very much for your attention and the time you spent. Please send the PR so we can merge it and other users can benefit from these changes. Thank you.
@Ctere1 commented on GitHub (Jan 24, 2025):
I have just created the PR. Please take a look, and once everything looks good, we can proceed with merging it. Thanks again!
I would like to point out that I renamed the following tables for consistency with the project naming conventions:
@Ctere1 commented on GitHub (Jan 24, 2025):
@abbas-gheydi
Additionally, as per the draft-ietf-radext-deprecating-radius, security tracking for RADIUS can be performed by ensuring the proper handling of the
Message-Authenticatorattribute. This is particularly important in the context of Section 5.3.6. Server Responses to Access-Request, where the correct validation of this attribute is crucial for ensuring secure communication.Currently, the server does not validate the
Message-Authenticatorin the incoming packets, which may expose security vulnerabilities. In this PR, I have added theMessage-Authenticatorattribute to the RADIUS package as the first step to address this issue.It is important to note that while this PR addresses the Fortigate connection issue by adding the
Message-Authenticatorattribute, further security measures should still be considered to ensure comprehensive protection.@abbas-gheydi commented on GitHub (Feb 13, 2025):
Dear @ramiabdallah1512 ,
The issue you mentioned has been resolved in version 2.4.0, which has been released.
To enable this new feature, you can set
EnableMessageAuthenticatorto true in theradiusd.conffile.A special thanks to @Ctere1 for help in fixing this issue!
Thank you,
@ramiabdallah1512 commented on GitHub (Mar 11, 2025):
Hello Team, @abbas-gheydi @Ctere1
I would like to extend my heartfelt thanks for your prompt assistance and dedicated efforts. I have just tested the new solution, and I can confirm that it is fully functional with this version.
Thank you so much for your support!
Best regards,
@Profaustine commented on GitHub (Apr 19, 2025):
Is there a step by step guide to deploy this as a newbie?
@iamshekoni commented on GitHub (May 6, 2025):
Hello @abbas-gheydi @Ctere1
Thank you for your assistance so far. just installed the 2.4.0 on my test environment successfully but connecting to FortiGate v7.4.7 is giving me "Invalid secret for the server" after inputting correct secret and EnableMessageAuthenticator = true
Please advice on what other change that needs to be made.
Thanks in advance
@iamshekoni commented on GitHub (May 6, 2025):
what did you do to make it work. i will appreciate your response
@iamshekoni commented on GitHub (May 7, 2025):
@abbas-gheydi @Ctere1
Hi, I have downgraded to Fortigate 7.4.6 am still experiencing the same issue "Invalid secret for the server" i have also change the EnableMessageAuthenticator = true in the
radiusd.conffile@Ctere1 commented on GitHub (May 7, 2025):
@iamshekoni,
Please make sure to specify the authentication method as PAP on the FortiGate . This error can sometimes occur if the authentication method is not properly aligned. Also, ensure that the shared secret configured on both devices matches exactly.
Additionally, try deleting the existing RADIUS user and create a new one from scratch, making sure to re-enter the Secret key carefully.
If the issue persists, check the FortiGate CLI and enable debug logs to get more detailed output for troubleshooting. Fortinet documentation
@iamshekoni commented on GitHub (May 7, 2025):
@Ctere1
Thank you for the response. Changed it to PAP as advised and ensured the secret is same on both sides, I have also recreated too, Blow is the image
@Ctere1 commented on GitHub (May 7, 2025):
You might also want to try replacing 0.0.0.0 with the actual IP address of the RADIUS server in the listen configuration.
While 0.0.0.0 allows the server to listen on all interfaces, explicitly binding to the server’s real IP can improve stability—especially if FortiGate is configured to connect to a specific IP. This helps avoid any ambiguity and ensures the RADIUS service is reachable on the correct interface.
@abbas-gheydi commented on GitHub (May 7, 2025):
Also, I recommend restarting the
radotpcontainer after applying configuration changes to ensure they take effect@iamshekoni commented on GitHub (May 7, 2025):
@Ctere1
Appreciate your prompt response after changing the 0.0.0.0 on the actual server IP address of the RADIUS radotp config file and restarting the server
the docker container refuse to start
once change back to 0.0.0.0:1812
The docker service runs
@ramiabdallah1512 commented on GitHub (May 7, 2025):
Hello, can you share the RADIUS configuration?
Le mer. 7 mai 2025, 16:47, iamshekoni @.***> a écrit :
@iamshekoni commented on GitHub (May 7, 2025):
@abbas-gheydi commented on GitHub (May 7, 2025):
According to the screenshot, you are using version 2.3.0. Please upgrade the
radotpimage to version 2.4.0@iamshekoni commented on GitHub (May 7, 2025):
Thanks @abbas-gheydi i downloaded it from the below page
@iamshekoni commented on GitHub (May 7, 2025):
@abbas-gheydi please how can i upgrade the image to 2.4
@abbas-gheydi commented on GitHub (May 7, 2025):
In the docker-compose.yaml file, please ensure this line is set to version 2.4.0:
After making this change, run the following commands:
docker-compose pull
docker-compose down
docker-compose up -d
or maybe
docker-compose up -d --force-recreate radotp
@iamshekoni commented on GitHub (May 7, 2025):
@abbas-gheydi Thanks it worked