_("Server reports that reconnect-after-drop is allowed within %d seconds, %s\n"),
dropped_session_cleanup,
check_ip_src ? _("but only from the same source IP address") : _("even if source IP address changes"));
- } else if (reconnect_after_drop == 0)
+ } else
vpn_progress(vpninfo, PRG_ERR,
_("Server reports that reconnect-after-drop is not allowed. OpenConnect will not\n"
"be able to reconnect if dead peer is detected. If reconnection DOES work,\n"
if (!xmlnode_get_prop(xml_node, "minor", &s)) p+=snprintf(p, e-p, ".%s", s);
if (!xmlnode_get_prop(xml_node, "patch", &s)) p+=snprintf(p, e-p, ".%s", s);
if (!xmlnode_get_prop(xml_node, "build", &s)) p+=snprintf(p, e-p, " build %s", s);
- if (!xmlnode_get_prop(xml_node, "branch", &s)) snprintf(p, e-p, " branch %s", s);
+ if (!xmlnode_get_prop(xml_node, "branch", &s)) p+=snprintf(p, e-p, " branch %s", s);
+ if (!xmlnode_get_prop(xml_node, "mr_num", &s)) snprintf(p, e-p, " mr_num %s", s);
vpn_progress(vpninfo, PRG_INFO,
_("Reported platform is %s\n"), platform);
}
}
}
+ if (reconnect_after_drop < 0) {
+ vpn_progress(vpninfo, PRG_ERR,
+ _("WARNING: Fortinet server does not specifically enable or disable reconnection\n"
+ " without reauthentication. If automatic reconnection does work, please\n"
+ " report results to <openconnect-devel@lists.infradead.org>\n"));
+ }
+
if (reconnect_after_drop == -1)
vpn_progress(vpninfo, PRG_ERR,
_("Server did not send <auth-ses tun-connect-without-reauth=\"0/1\"/>. OpenConnect will\n"
<dtls-config heartbeat-interval="10" heartbeat-fail-count="10" heartbeat-idle-timeout="10" client-hello-timeout="10"/>
<tunnel-method value="ppp"/>
<tunnel-method value="tun"/>
- <fos platform="FakeFortigate" major="1" minor="2" patch="3" build="4567" branch="4567"/>
+ <fos platform="FakeFortigate" major="1" minor="2" patch="3" build="4567" branch="4567" mr_num="??"/>
+ <auth-ses tun-connect-without-reauth="1" check-src-ip="0" tun-user-ses-timeout="240"/>
<ipv4>
<dns ip="1.1.1.1"/>
<dns ip="8.8.8.8" domain="foo.com"/>
<h2>Quirks and Issues</h2>
-<p>Prior to server version FortiOS 6.2.1, the Fortinet protocol appears <i>not</i> to allow its
+<p>FortiGate server versions prior to v6.2.1 do <i>not</i> allow the
post-authentication cookie (as output by <tt>--authenticate</tt>) to
be used to reestablish a dropped connection. This means that if the
client loses its connection to the gateway (for example, due to a