<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=5&amp;t=377" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2009-08-10T21:18:41+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=5&amp;t=377</id>
<entry>
<author><name><![CDATA[mlindgren]]></name></author>
<updated>2009-08-10T21:18:41+01:00</updated>
<published>2009-08-10T21:18:41+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=377&amp;p=1656#p1656</id>
<link href="https://forum.yubico.com/viewtopic.php?t=377&amp;p=1656#p1656"/>
<title type="html"><![CDATA[Working 2-factor-authentication with Cisco ASA (IPSec, SSL)]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=377&amp;p=1656#p1656"><![CDATA[
I configured 2 factor authentication using the Yubikey and a system password to authenticate against a Cisco VPN.  FWIW, here's a quick run-down of the settings I used.  I have an ASA 5505 running 8.2.1 and am using a Fedora Core 8 box to authenticate against.<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent"># cat /etc/pam.d/radiusd<br />#%PAM-1.0<br />auth required /usr/local/lib/security/pam_yubico.so authfile=/etc/raddb/yubikey.map id=16 debug<br />auth include system-auth<br />account required pam_nologin.so<br />account include system-auth<br />password include system-auth<br />session include system-auth<br /></div><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent"># cat /etc/raddb/yubikey.map<br />mlindgren:abcdefgkijkl &#91;use the first twelve characters of your yubikey's OTP&#93;<br /></div><br /><br />For /etc/raddb/radiusd.conf and users, I used the settings from the how-to:<br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />1. Edit the radiusd configuration file “/etc/raddb/radiusd.conf” to make following changes:<br />          * Change user and group to “root” to provide the root privileges to radiusd demon so that it can call and use pam modules for authentication. NOTE: Generally, it is not a good security practice to assign root privileges to a user for a demon. However, since use of PAM requires root privileges, this is a mandatory step here.<br />          * In “authenticate” section uncomment pam to direct radiusd demon to use pam module for authentication <br />   2. Edit the client configuration file “/etc/raddb/clients.conf” to add sample client for testing<br />   3. Edit the user configuration file “/etc/raddb/users” to make following change:<br />          * Change &quot;DEFAULT Auth-Type = System&quot; to &quot;DEFAULT Auth-Type = pam&quot; for using pam modules for user authentication<br /></div><br />I also added the following section at the bottom of clients.conf<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">client x.x.x.x {<br />        secret = somepassword<br />        shortname = ASA<br />}<br /></div><br /><br />Over on the ASA:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">aaa-server TEST protocol radius<br />aaa-server TEST (inside) host x.x.x.x<br />key somepassword<br /> authentication-port 1812<br /> accounting-port 1813<br />!<br /></div><br /><br />The last thing I had to do was disable iptables, or add a firewall rule for freeradius, I decided to disable iptables<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">#/etc/init.d/iptables stop<br /></div><br /><br />Didn't specifically see this posted anywhere, so I thought I'd contribute.  We are thinking about implementing this at our company for our remote users.<br /><br />Regards,<br /><br />Mattias<br /><br />EDIT: feel free to move the post to a different board, I realize now this may not be the right area to post in.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=775">mlindgren</a> — Mon Aug 10, 2009 9:18 pm</p><hr />
]]></content>
</entry>
</feed>