| Summary: | Unable to connect to Fortinet based VPN using openconnect when SSO is required | ||
|---|---|---|---|
| Product: | [Applications] systemsettings | Reporter: | Niels <nvaert1986> |
| Component: | kcm_networkmanagement | Assignee: | Plasma Bugs List <plasma-bugs-null> |
| Status: | REPORTED --- | ||
| Severity: | normal | CC: | jgrulich, smart2128vr |
| Priority: | NOR | ||
| Version First Reported In: | unspecified | ||
| Target Milestone: | --- | ||
| Platform: | Gentoo Packages | ||
| OS: | Linux | ||
| Latest Commit: | Version Fixed/Implemented In: | ||
| Sentry Crash Report: | |||
|
Description
Niels
2024-03-01 15:36:07 UTC
I just updated to 6.1.4 and the issue still persists (figured I'd update it, since this is a major upgrade) I hoped it would have been fully integrated in Plasma 6.2, based on some webauth patches I had recently seen. Looking at the debug log, it seems that it isn't able to retrieve the required cookie. GET https://<VPN_ENDPOINT>/ Attempting to connect to server VPN_ENDPOINT:443 Connected to VPN_ENDPOINT:443 SSL negotiation with VPN_ENDPOINT Server certificate verify failed: signer not found Connected to HTTPS on VPN_ENDPOINT with ciphersuite (TLS1.2)-(ECDHE-SECP384R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) Got HTTP response: HTTP/1.1 200 OK Date: Fri, 11 Oct 2024 08:42:46 GMT ETag: "83-65bac8f5" Accept-Ranges: bytes Content-Length: 131 Content-Type: text/html X-Frame-Options: SAMEORIGIN Content-Security-Policy: frame-ancestors 'self'; object-src 'self'; script-src 'self' https: 'unsafe-eval' 'unsafe-inline' blob:; X-XSS-Protection: 1; mode=block X-Content-Type-Options: nosniff Strict-Transport-Security: max-age=31536000 HTTP body length: (131) POST https:/VPN_ENDPOINT/remote/logincheck Got HTTP response: HTTP/1.1 200 OK Date: Fri, 11 Oct 2024 08:43:01 GMT Set-Cookie: SVPNCOOKIE=; path=/; expires=Sun, 11 Mar 1984 12:00:00 GMT; secure; httponly; SameSite=Strict; Set-Cookie: SVPNNETWORKCOOKIE=; path=/remote/network; expires=Sun, 11 Mar 1984 12:00:00 GMT; secure; httponly; SameSite=Strict X-UA-Compatible: requiresActiveX=true Transfer-Encoding: chunked Content-Type: text/html; charset=utf-8 X-Frame-Options: SAMEORIGIN Content-Security-Policy: frame-ancestors 'self'; object-src 'self'; script-src 'self' https: 'unsafe-eval' 'unsafe-inline' blob:; X-XSS-Protection: 1; mode=block X-Content-Type-Options: nosniff Strict-Transport-Security: max-age=31536000 HTTP body chunked (-2) Using openconnect, you can retrieve it with openfortivpn-webview: openconnect --protocol=fortinet -C "$(openfortivpn-webview VPN_ENDPOINT)" VPN_ENDPOINT |