Bug 1655784
Summary: | Unknown form ID 'frmTotpToken' | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Modestas <modestukasai> |
Component: | openconnect | Assignee: | David Woodhouse <dwmw2> |
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | urgent | Docs Contact: | |
Priority: | unspecified | ||
Version: | 29 | CC: | dwmw2, nmavrogi |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openconnect-8.01-1.fc29 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-01-11 04:34:02 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Modestas
2018-12-03 22:06:58 UTC
POST https://pulse.xxxcompany.com/dana-na/auth/xxxxxx/login.cgi SSL negotiation with pulse.xxxcompany.com Connected to HTTPS on pulse.xxxcompany.com Unknown form ID 'frmTotpToken' Dumping unknown HTML form: <form id="frmTotpToken_5" name="frmTotpToken" action="login.cgi" method="POST" autocomplete="off" onsubmit="return SubmitClicked();"> <input id="key_29" type="hidden" name="key" value="state_4979155412183b637158714cc5964527"> <table id="TABLE_TotpToken_2" border="0" cellpadding="2" cellspacing="0"> <tr> <td width="75%"> <table id="TABLE_TotpToken_3" border="0" cellpadding="2" cellspacing="0" width="100%"> <tr> <td nowrap><b>Welcome to</b></td> </tr> <tr> <td nowrap><span class="cssLarge"><b>Pulse Connect Secure</b></span></td> </tr> <tr> <td> <br> <table id="TABLE_TotpToken_4" border="0" cellspacing="0" width="100%" bgcolor="#CCCC99"> <tr> <td> <table id="TABLE_TotpToken_5" border="0" cellspacing="0" cellpadding="0"> <tr> <td colspan="2"> <b>Two-Factor Authentication</b> </td> </tr> </table> </td> </tr> <tr> <td> <table id="TABLE_TotpToken_6" border="0" cellpadding="6" cellspacing="0" width="100%" bgcolor="#FFFFCC"> <tr> <td>Open the two-factor authentication app on your device to view your authentication code and verify your identity . <p>Currently if you do not have access to your device, use one of the backup codes saved previously.</p> <table id="TABLE_TotpToken_7" border="0" cellspacing="0" cellpadding="2"> <tr> <td>Authentication code: </td> <td> <input id="passwordSecondary" type="password" name="password#2" size="20"> </td> </tr> <tr> <td colspan="2"> </td> </tr> <tr> <td> </td> <td> <input id="totpactionEnter_3" type="submit" value="Sign In" name="totpactionEnter"> </td> </tr> <tr> <td colspan="2"> </td> </tr> </table> </td> </tr> </table> </td> </tr> </table> </td> </tr> </table> </td> </tr> </table> </form>Failed to obtain WebVPN cookie openconnect-8.01-1.fc29 has been submitted as an update to Fedora 29. https://bodhi.fedoraproject.org/updates/FEDORA-2019-267b29539a openconnect-8.01-1.fc29 has been pushed to the Fedora 29 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2019-267b29539a openconnect-8.01-1.fc29 has been pushed to the Fedora 29 stable repository. If problems still persist, please make note of it in this bug report. |