Hello,
I have a strange problem with radius authentication from the PaloAlto GlobalProtect. Usually it works fine, but sometimes we have failed authentication with a reason wrong OTP. I am sure that the OTP is correct. Also, the failcount is not increasing in this case. If I put really wrong OTP then failcount increases.
In radius logs I can see that there are two radius requests from the PaloAlto with the same username and password - I guess this is because one request is sent for globalprotect portal and the second one for the globalprotect gateway. And the first request receives authentication accept, the second one receives authentication rejected. Time interval between these two requests is 4 seconds. Below is an example:
Thu Apr 1 10:36:07 2021 : Info: rlm_perl: state sent to privacyidea:
Thu Apr 1 10:36:07 2021 : rlm_perl: urlparam pass = mypin044399
Thu Apr 1 10:36:07 2021 : rlm_perl: urlparam user = myusername
Thu Apr 1 10:36:07 2021 : rlm_perl: urlparam client = 192.168.25.10
Thu Apr 1 10:36:07 2021 : Info: rlm_perl: Request timeout: 10
Thu Apr 1 10:36:07 2021 : Info: rlm_perl: Not verifying SSL certificate!
Thu Apr 1 10:36:08 2021 : Info: rlm_perl: elapsed time for privacyidea call: 6.335049
Thu Apr 1 10:36:08 2021 : rlm_perl: Content {“detail”: {“message”: “matching 1 tokens”, “otplen”: 6, “serial”: “TOTP000038DE”, “threadid”: 140067579815360, “type”: “totp”, "
Thu Apr 1 10:36:09 2021 : Info: rlm_perl: privacyIDEA access granted
Thu Apr 1 10:36:11 2021 : Info: rlm_perl: state sent to privacyidea:
Thu Apr 1 10:36:11 2021 : rlm_perl: urlparam pass = mypin044399
Thu Apr 1 10:36:11 2021 : rlm_perl: urlparam user = myusername
Thu Apr 1 10:36:11 2021 : rlm_perl: urlparam client = 192.168.25.10
Thu Apr 1 10:36:12 2021 : Info: rlm_perl: Request timeout: 10
Thu Apr 1 10:36:12 2021 : Info: rlm_perl: Not verifying SSL certificate!
Thu Apr 1 10:36:12 2021 : Info: rlm_perl: elapsed time for privacyidea call: 5.849115
Thu Apr 1 10:36:12 2021 : rlm_perl: Content {“detail”: {“message”: “wrong otp value”, “otplen”: 6, “serial”: “TOTP000038DE”, “threadid”: 140067579815360, “type”: “totp”}, “id”: 1, “jsonrpc”: “2.0”, “result”: {“status”: true, “value”: false}, “time”: 1617266172.7674997, “version”: “privacyIDEA 3.5.1”, “versionnumber”: “3.5.1”, “signature”:
Thu Apr 1 10:36:12 2021 : Info: rlm_perl: privacyIDEA Result status is true!
Thu Apr 1 10:36:12 2021 : Info: rlm_perl: privacyIDEA access denied
Thu Apr 1 10:36:12 2021 : Info: rlm_perl: return RLM_MODULE_REJECT
Thu Apr 1 10:36:21 2021 : Info: rlm_perl: elapsed time for privacyidea call: 9.401188
Thu Apr 1 10:36:21 2021 : rlm_perl: Content {“detail”: {“message”: “wrong otp value”, “otplen”: 6, “serial”: “TOTP000038DE”, “threadid”: 140067579815360, “type”: “totp”}, “id”: 1, “jsonrpc”: “2.0”, “result”: {“status”: true, “value”: false},
Thu Apr 1 10:36:21 2021 : Info: rlm_perl: privacyIDEA Result status is true!
Thu Apr 1 10:36:21 2021 : Info: rlm_perl: privacyIDEA access denied
Thu Apr 1 10:36:21 2021 : Info: rlm_perl: return RLM_MODULE_REJECT
So, first of all it is strange that for the same username/password the privacyidea responds with accept and reject during the 4 second interval, is it a feature and can be configured somehow?
And the second question is about why privacyidea doesn’t increase fail count for such rejects.