I THOUGHT this would be simple enough - enable authentication in the UTM SOCKS options, add some users / groups, press apply. At least, that's what I did. Alas, it's not working.
Trying to get the good ol' Skype running using SOCKS. It works OK without authentication (i.e. if the auth is disabled on the UTM). If it's enabled, this is what I get in the log files:
2018:01:31-09:53:06 webadmin sockd[32496]: info: block(1): tcp/accept ]: 10.150.4.16.2307 10.150.1.34.1080: error after having read 21 bytes: access denied by AUA
2018:01:31-09:53:05 webadmin aua[32736]: id="3006" severity="info" sys="System" sub="auth" name="Trying 10.150.1.11 (radius)" 2018:01:31-09:53:05 webadmin aua[32736]: id="3006" severity="info" sys="System" sub="auth" name="Trying 10.150.1.16 (adirectory)" 2018:01:31-09:53:06 webadmin aua[32736]: id="3005" severity="warn" sys="System" sub="auth" name="Authentication failed" srcip="10.150.4.16" host="" user="admin" caller="socks" reason="DENIED"
Note that in the above example I'm trying to log in as the "admin" user, which was explicitly added as an allowed user to the SOCKS settings. I've also tried using AD groups, without success.
Any suggestions on what's going on?
EDIT:
I think this question is a duplicate of this topic: https://community.sophos.com/products/unified-threat-management/f/network-protection-firewall-nat-qos-ips/78491/strange-skype-and-socks5-behavior
At least, the same SOCKS authentication issue is described there. It seems it's a bug in Skype? Well, who would have known. :|
This thread was automatically locked due to age.