<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=5&amp;t=647" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2011-03-18T17:19:17+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=5&amp;t=647</id>
<entry>
<author><name><![CDATA[geoffb]]></name></author>
<updated>2011-03-18T17:19:17+01:00</updated>
<published>2011-03-18T17:19:17+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=647&amp;p=2619#p2619</id>
<link href="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2619#p2619"/>
<title type="html"><![CDATA[Re: Yubico-pam with Freeradius]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2619#p2619"><![CDATA[
Ok, found a similar post here <!-- m --><a class="postlink" href="http://forum.yubico.com/viewtopic.php?f=5&amp;t=132">http://forum.yubico.com/viewtopic.php?f=5&amp;t=132</a><!-- m --><br /><br />Also working for me if I set  LD_PRELOAD=/lib/libpam.so.0<br />I'll play around some more, but it's pretty much working now.<br />Thanks again for your help.<br /><br />geoff.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1568">geoffb</a> — Fri Mar 18, 2011 5:19 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[geoffb]]></name></author>
<updated>2011-03-18T16:54:23+01:00</updated>
<published>2011-03-18T16:54:23+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=647&amp;p=2618#p2618</id>
<link href="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2618#p2618"/>
<title type="html"><![CDATA[Re: Yubico-pam with Freeradius]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2618#p2618"><![CDATA[
Samir,<br />Many thanks for that, I seem to be getting somewhere now. The default password on it's own is now failing, and it seems to be using the PAM module, but I get this in /var/log/auth<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">nslu2:/etc/pam.d# tail /var/log/auth.log<br />Mar 18 15:49:50 nslu2 freeradius: PAM unable to dlopen(/lib/security/pam_yubico.so): /lib/security/pam_yubico.so: undefined symbol: pam_set_data<br />Mar 18 15:49:50 nslu2 freeradius: PAM adding faulty module: /lib/security/pam_yubico.so<br />Mar 18 15:49:59 nslu2 freeradius: PAM unable to dlopen(/lib/security/pam_yubico.so): /lib/security/pam_yubico.so: undefined symbol: pam_set_data<br />Mar 18 15:49:59 nslu2 freeradius: PAM adding faulty module: /lib/security/pam_yubico.so<br />Mar 18 15:49:59 nslu2 freeradius: pam_unix(radiusd:auth): authentication failure; logname=root uid=0 euid=0 tty= ruser= rhost=  user=admin<br />Mar 18 15:50:39 nslu2 freeradius: PAM unable to dlopen(/lib/security/pam_yubico.so): /lib/security/pam_yubico.so: undefined symbol: pam_set_data<br />Mar 18 15:50:39 nslu2 freeradius: PAM adding faulty module: /lib/security/pam_yubico.so<br />Mar 18 15:50:46 nslu2 freeradius: PAM unable to dlopen(/lib/security/pam_yubico.so): /lib/security/pam_yubico.so: undefined symbol: pam_set_data<br />Mar 18 15:50:46 nslu2 freeradius: PAM adding faulty module: /lib/security/pam_yubico.so<br />Mar 18 15:50:47 nslu2 freeradius: pam_unix(radiusd:auth): authentication failure; logname=root uid=0 euid=0 tty= ruser= rhost=  user=root<br />nslu2:/etc/pam.d#</div><br /><br />Freeradius -X returns this:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">rlm_pap: Found existing Auth-Type, not changing it.<br />++&#91;pap&#93; returns noop<br />  rad_check_password:  Found Auth-Type pam<br />auth: type &quot;PAM&quot;<br />+- entering group authenticate<br />pam_pass: using pamauth string &lt;radiusd&gt; for pam.conf lookup<br />pam_pass: function pam_authenticate FAILED for &lt;admin&gt;. Reason: Module is unknown<br />++&#91;pam&#93; returns reject<br />auth: Failed to validate the user.<br />Login incorrect: &#91;admin/&lt;removed plaintext password&gt;cccccccjfcevcdukrucdhtedgivcurvkltgufkhkbduc&#93; (from client localhost port 0)<br />  Found Post-Auth-Type Reject<br />+- entering group REJECT<br />        expand: %{User-Name} -&gt; admin<br /> attr_filter: Matched entry DEFAULT at line 11<br />++&#91;attr_filter.access_reject&#93; returns updated<br />Sending Access-Reject of id 144 to 127.0.0.1 port 48841<br />Finished request 4.<br />Going to the next request<br />Waking up in 4.9 seconds.<br />Cleaning up request 4 ID 144 with timestamp +197<br />Ready to process requests.</div><br /><br />But looking a lot closer now!<br />Thanks,<br />geoff.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1568">geoffb</a> — Fri Mar 18, 2011 4:54 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[samir]]></name></author>
<updated>2011-03-18T14:35:55+01:00</updated>
<published>2011-03-18T14:35:55+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=647&amp;p=2617#p2617</id>
<link href="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2617#p2617"/>
<title type="html"><![CDATA[Re: Yubico-pam with Freeradius]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2617#p2617"><![CDATA[
Please make sure, we have made following changes to FreeRADIUS server user configuration file “/etc/raddb/users”:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">Change &quot;DEFAULT Auth-Type = System&quot; to &quot;DEFAULT Auth-Type = pam&quot; for using  PAM modules for user authentication<br /></div><br /><br />and try again!<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1076">samir</a> — Fri Mar 18, 2011 2:35 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[geoffb]]></name></author>
<updated>2011-03-17T08:33:51+01:00</updated>
<published>2011-03-17T08:33:51+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=647&amp;p=2616#p2616</id>
<link href="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2616#p2616"/>
<title type="html"><![CDATA[Re: Yubico-pam with Freeradius]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2616#p2616"><![CDATA[
Ok, here's the output from radtest<br />First using just the password matching /etc/shadow:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">nslu2:~# radtest admin &lt;plaintext password removed&gt; 127.0.0.1 0 testing123<br />Sending Access-Request of id 238 to 127.0.0.1 port 1812<br />        User-Name = &quot;admin&quot;<br />        User-Password = &quot;&lt;plaintext password removed&gt;&quot;<br />        NAS-IP-Address = 192.168.3.77<br />        NAS-Port = 0<br />rad_recv: Access-Accept packet from host 127.0.0.1 port 1812, id=238, length=26<br />        Service-Type = NAS-Prompt-User<br />nslu2:~#</div><br /><br />Then, appending with yubikey OTP:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">nslu2:~# radtest admin &lt;plaintext password removed&gt;cccccccjfcevejkdklbbrfcrurvbireggknbcckevgvf 127.0.0.1 0 testing123<br />Sending Access-Request of id 17 to 127.0.0.1 port 1812<br />        User-Name = &quot;admin&quot;<br />        User-Password = &quot;&lt;plaintext password removed&gt;cccccccjfcevejkdklbbrfcrurvbireggknbcckevgvf&quot;<br />        NAS-IP-Address = 192.168.3.77<br />        NAS-Port = 0<br />rad_recv: Access-Reject packet from host 127.0.0.1 port 1812, id=17, length=20<br />nslu2:~#</div><br /><br />Here's the output from Freeradius -X<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">FreeRADIUS Version 2.0.4, for host arm-unknown-linux-gnueabi, built on Sep  8 2008 at 02:43:37<br />Copyright (C) 1999-2008 The FreeRADIUS server project and contributors.<br />There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A<br />PARTICULAR PURPOSE.<br />You may redistribute copies of FreeRADIUS under the terms of the<br />GNU General Public License.<br />Starting - reading configuration files ...<br />including configuration file /etc/freeradius/radiusd.conf<br />including configuration file /etc/freeradius/proxy.conf<br />including configuration file /etc/freeradius/clients.conf<br />including configuration file /etc/freeradius/snmp.conf<br />including configuration file /etc/freeradius/eap.conf<br />including configuration file /etc/freeradius/policy.conf<br />including files in directory /etc/freeradius/sites-enabled/<br />including configuration file /etc/freeradius/sites-enabled/default<br />including configuration file /etc/freeradius/sites-enabled/inner-tunnel<br />including dictionary file /etc/freeradius/dictionary<br />main {<br />        prefix = &quot;/usr&quot;<br />        localstatedir = &quot;/var&quot;<br />        logdir = &quot;/var/log/freeradius&quot;<br />        libdir = &quot;/usr/lib/freeradius&quot;<br />        radacctdir = &quot;/var/log/freeradius/radacct&quot;<br />        hostname_lookups = no<br />        max_request_time = 30<br />        cleanup_delay = 5<br />        max_requests = 1024<br />        allow_core_dumps = no<br />        pidfile = &quot;/var/run/freeradius/freeradius.pid&quot;<br />        user = &quot;root&quot;<br />        group = &quot;root&quot;<br />        checkrad = &quot;/usr/sbin/checkrad&quot;<br />        debug_level = 0<br />        proxy_requests = yes<br /> security {<br />        max_attributes = 200<br />        reject_delay = 1<br />        status_server = yes<br /> }<br />}<br /> client localhost {<br />        ipaddr = 127.0.0.1<br />        require_message_authenticator = no<br />        secret = &quot;testing123&quot;<br />        nastype = &quot;other&quot;<br /> }<br />radiusd: #### Loading Realms and Home Servers ####<br /> proxy server {<br />        retry_delay = 5<br />        retry_count = 3<br />        default_fallback = no<br />        dead_time = 120<br />        wake_all_if_all_dead = no<br /> }<br /> home_server localhost {<br />        ipaddr = 127.0.0.1<br />        port = 1812<br />        type = &quot;auth&quot;<br />        secret = &quot;testing123&quot;<br />        response_window = 20<br />        max_outstanding = 65536<br />        zombie_period = 40<br />        status_check = &quot;status-server&quot;<br />        ping_check = &quot;none&quot;<br />        ping_interval = 30<br />        check_interval = 30<br />        num_answers_to_alive = 3<br />        num_pings_to_alive = 3<br />        revive_interval = 120<br />        status_check_timeout = 4<br /> }<br /> home_server_pool my_auth_failover {<br />        type = fail-over<br />        home_server = localhost<br /> }<br /> realm example.com {<br />        auth_pool = my_auth_failover<br /> }<br /> realm LOCAL {<br /> }<br />radiusd: #### Instantiating modules ####<br /> instantiate {<br /> Module: Linked to module rlm_exec<br /> Module: Instantiating exec<br />  exec {<br />        wait = yes<br />        input_pairs = &quot;request&quot;<br />        shell_escape = yes<br />  }<br /> Module: Linked to module rlm_expr<br /> Module: Instantiating expr<br /> Module: Linked to module rlm_expiration<br /> Module: Instantiating expiration<br />  expiration {<br />        reply-message = &quot;Password Has Expired  &quot;<br />  }<br /> Module: Linked to module rlm_logintime<br /> Module: Instantiating logintime<br />  logintime {<br />        reply-message = &quot;You are calling outside your allowed timespan  &quot;<br />        minimum-timeout = 60<br />  }<br /> }<br />radiusd: #### Loading Virtual Servers ####<br />server inner-tunnel {<br /> modules {<br /> Module: Checking authenticate {...} for more modules to load<br /> Module: Linked to module rlm_pap<br /> Module: Instantiating pap<br />  pap {<br />        encryption_scheme = &quot;auto&quot;<br />        auto_header = no<br />  }<br /> Module: Linked to module rlm_chap<br /> Module: Instantiating chap<br /> Module: Linked to module rlm_mschap<br /> Module: Instantiating mschap<br />  mschap {<br />        use_mppe = yes<br />        require_encryption = no<br />        require_strong = no<br />        with_ntdomain_hack = no<br />  }<br /> Module: Linked to module rlm_unix<br /> Module: Instantiating unix<br />  unix {<br />        radwtmp = &quot;/var/log/freeradius/radwtmp&quot;<br />  }<br /> Module: Linked to module rlm_eap<br /> Module: Instantiating eap<br />  eap {<br />        default_eap_type = &quot;md5&quot;<br />        timer_expire = 60<br />        ignore_unknown_eap_types = no<br />        cisco_accounting_username_bug = no<br />  }<br /> Module: Linked to sub-module rlm_eap_md5<br /> Module: Instantiating eap-md5<br /> Module: Linked to sub-module rlm_eap_leap<br /> Module: Instantiating eap-leap<br /> Module: Linked to sub-module rlm_eap_gtc<br /> Module: Instantiating eap-gtc<br />   gtc {<br />        challenge = &quot;Password: &quot;<br />        auth_type = &quot;PAP&quot;<br />   }<br />rlm_eap: Ignoring EAP-Type/tls because we do not have OpenSSL support.<br />rlm_eap: Ignoring EAP-Type/ttls because we do not have OpenSSL support.<br />rlm_eap: Ignoring EAP-Type/peap because we do not have OpenSSL support.<br /> Module: Linked to sub-module rlm_eap_mschapv2<br /> Module: Instantiating eap-mschapv2<br />   mschapv2 {<br />        with_ntdomain_hack = no<br />   }<br /> Module: Checking authorize {...} for more modules to load<br /> Module: Linked to module rlm_realm<br /> Module: Instantiating suffix<br />  realm suffix {<br />        format = &quot;suffix&quot;<br />        delimiter = &quot;@&quot;<br />        ignore_default = no<br />        ignore_null = no<br />  }<br /> Module: Linked to module rlm_files<br /> Module: Instantiating files<br />  files {<br />        usersfile = &quot;/etc/freeradius/users&quot;<br />        acctusersfile = &quot;/etc/freeradius/acct_users&quot;<br />        preproxy_usersfile = &quot;/etc/freeradius/preproxy_users&quot;<br />        compat = &quot;no&quot;<br />  }<br /> Module: Checking session {...} for more modules to load<br /> Module: Linked to module rlm_radutmp<br /> Module: Instantiating radutmp<br />  radutmp {<br />        filename = &quot;/var/log/freeradius/radutmp&quot;<br />        username = &quot;%{User-Name}&quot;<br />        case_sensitive = yes<br />        check_with_nas = yes<br />        perm = 384<br />        callerid = yes<br />  }<br /> Module: Checking post-proxy {...} for more modules to load<br /> Module: Checking post-auth {...} for more modules to load<br /> Module: Linked to module rlm_attr_filter<br /> Module: Instantiating attr_filter.access_reject<br />  attr_filter attr_filter.access_reject {<br />        attrsfile = &quot;/etc/freeradius/attrs.access_reject&quot;<br />        key = &quot;%{User-Name}&quot;<br />  }<br /> }<br />}<br />server {<br /> modules {<br /> Module: Checking authenticate {...} for more modules to load<br /> Module: Linked to module rlm_pam<br /> Module: Instantiating pam<br />  pam {<br />        pam_auth = &quot;radiusd&quot;<br />  }<br /> Module: Checking authorize {...} for more modules to load<br /> Module: Linked to module rlm_preprocess<br /> Module: Instantiating preprocess<br />  preprocess {<br />        huntgroups = &quot;/etc/freeradius/huntgroups&quot;<br />        hints = &quot;/etc/freeradius/hints&quot;<br />        with_ascend_hack = no<br />        ascend_channels_per_line = 23<br />        with_ntdomain_hack = no<br />        with_specialix_jetstream_hack = no<br />        with_cisco_vsa_hack = no<br />        with_alvarion_vsa_hack = no<br />  }<br /> Module: Checking preacct {...} for more modules to load<br /> Module: Linked to module rlm_acct_unique<br /> Module: Instantiating acct_unique<br />  acct_unique {<br />        key = &quot;User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port&quot;<br />  }<br /> Module: Checking accounting {...} for more modules to load<br /> Module: Linked to module rlm_detail<br /> Module: Instantiating detail<br />  detail {<br />        detailfile = &quot;/var/log/freeradius/radacct/%{Client-IP-Address}/detail-%Y%m%d&quot;<br />        header = &quot;%t&quot;<br />        detailperm = 384<br />        dirperm = 493<br />        locking = no<br />        log_packet_header = no<br />  }<br /> Module: Instantiating attr_filter.accounting_response<br />  attr_filter attr_filter.accounting_response {<br />        attrsfile = &quot;/etc/freeradius/attrs.accounting_response&quot;<br />        key = &quot;%{User-Name}&quot;<br />  }<br /> Module: Checking session {...} for more modules to load<br /> Module: Checking post-proxy {...} for more modules to load<br /> Module: Checking post-auth {...} for more modules to load<br /> }<br />}<br />radiusd: #### Opening IP addresses and Ports ####<br />listen {<br />        type = &quot;auth&quot;<br />        ipaddr = *<br />        port = 0<br />}<br />listen {<br />        type = &quot;acct&quot;<br />        ipaddr = *<br />        port = 0<br />}<br />main {<br />        snmp = no<br />        smux_password = &quot;&quot;<br />        snmp_write_access = no<br />}<br />Listening on authentication address * port 1812<br />Listening on accounting address * port 1813<br />Listening on proxy address * port 1814<br />Ready to process requests.<br />rad_recv: Access-Request packet from host 127.0.0.1 port 56228, id=238, length=57<br />        User-Name = &quot;admin&quot;<br />        User-Password = &quot;&lt;plaintext password removed&gt;&quot;<br />        NAS-IP-Address = 192.168.3.77<br />        NAS-Port = 0<br />+- entering group authorize<br />++&#91;preprocess&#93; returns ok<br />++&#91;chap&#93; returns noop<br />++&#91;mschap&#93; returns noop<br />    rlm_realm: No '@' in User-Name = &quot;admin&quot;, looking up realm NULL<br />    rlm_realm: No such realm &quot;NULL&quot;<br />++&#91;suffix&#93; returns noop<br />  rlm_eap: No EAP-Message, not doing EAP<br />++&#91;eap&#93; returns noop<br />++&#91;unix&#93; returns updated<br />    users: Matched entry admin at line 52<br />++&#91;files&#93; returns ok<br />++&#91;expiration&#93; returns noop<br />++&#91;logintime&#93; returns noop<br />++&#91;pap&#93; returns updated<br />  rad_check_password:  Found Auth-Type<br />auth: type &quot;PAP&quot;<br />+- entering group PAP<br />rlm_pap: login attempt with password &quot;&lt;plaintext password removed&gt;&quot;<br />rlm_pap: Using CRYPT encryption.<br />rlm_pap: User authenticated successfully<br />++&#91;pap&#93; returns ok<br />Login OK: &#91;admin/&lt;plaintext password removed&gt;&#93; (from client localhost port 0)<br />+- entering group post-auth<br />++&#91;exec&#93; returns noop<br />Sending Access-Accept of id 238 to 127.0.0.1 port 56228<br />        Service-Type = NAS-Prompt-User<br />Finished request 0.<br />Going to the next request<br />Waking up in 4.9 seconds.<br />Cleaning up request 0 ID 238 with timestamp +26<br />Ready to process requests.<br />rad_recv: Access-Request packet from host 127.0.0.1 port 39305, id=17, length=105<br />        User-Name = &quot;admin&quot;<br />        User-Password = &quot;&lt;plaintext password removed&gt;cccccccjfcevejkdklbbrfcrurvbireggknbcckevgvf&quot;<br />        NAS-IP-Address = 192.168.3.77<br />        NAS-Port = 0<br />+- entering group authorize<br />++&#91;preprocess&#93; returns ok<br />++&#91;chap&#93; returns noop<br />++&#91;mschap&#93; returns noop<br />    rlm_realm: No '@' in User-Name = &quot;admin&quot;, looking up realm NULL<br />    rlm_realm: No such realm &quot;NULL&quot;<br />++&#91;suffix&#93; returns noop<br />  rlm_eap: No EAP-Message, not doing EAP<br />++&#91;eap&#93; returns noop<br />++&#91;unix&#93; returns updated<br />    users: Matched entry admin at line 52<br />++&#91;files&#93; returns ok<br />++&#91;expiration&#93; returns noop<br />++&#91;logintime&#93; returns noop<br />++&#91;pap&#93; returns updated<br />  rad_check_password:  Found Auth-Type<br />auth: type &quot;PAP&quot;<br />+- entering group PAP<br />rlm_pap: login attempt with password &quot;&lt;plaintext password removed&gt;cccccccjfcevejkdklbbrfcrurvbireggknbcckevgvf&quot;<br />rlm_pap: Using CRYPT encryption.<br />rlm_pap: Passwords don't match<br />++&#91;pap&#93; returns reject<br />auth: Failed to validate the user.<br />Login incorrect (rlm_pap: CRYPT password check failed): &#91;admin/&lt;plaintext password removed&gt;cccccccjfcevejkdklbbrfcrurvbireggknbcckevgvf&#93; (from client localhost port 0)<br />  Found Post-Auth-Type Reject<br />+- entering group REJECT<br />        expand: %{User-Name} -&gt; admin<br /> attr_filter: Matched entry DEFAULT at line 11<br />++&#91;attr_filter.access_reject&#93; returns updated<br />Delaying reject of request 1 for 1 seconds<br />Going to the next request<br />Waking up in 0.9 seconds.<br />Sending delayed reject for request 1<br />Sending Access-Reject of id 17 to 127.0.0.1 port 39305<br />Waking up in 4.9 seconds.<br />Cleaning up request 1 ID 17 with timestamp +545<br />Ready to process requests.<br /></div><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1568">geoffb</a> — Thu Mar 17, 2011 8:33 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[samir]]></name></author>
<updated>2011-03-17T07:00:18+01:00</updated>
<published>2011-03-17T07:00:18+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=647&amp;p=2615#p2615</id>
<link href="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2615#p2615"/>
<title type="html"><![CDATA[Re: Yubico-pam with Freeradius]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2615#p2615"><![CDATA[
We would appreciate if you can:<br /><br /><ul>1) Run the FreeRADIUS server in debug mode using the command below:<br /><br /># radiusd -X<br /><br />2) Test the FreeRADIUS authentication using the radtest command. This will generate a debug output on the shell running the FreeRADIUS server in debug mode as explained above.<br /><br />3) Please send us this debug output.<br /></ul><br />This will help us in determining the exact cause of the problem.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1076">samir</a> — Thu Mar 17, 2011 7:00 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[geoffb]]></name></author>
<updated>2011-03-14T19:18:41+01:00</updated>
<published>2011-03-14T19:18:41+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=647&amp;p=2612#p2612</id>
<link href="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2612#p2612"/>
<title type="html"><![CDATA[Re: Yubico-pam with Freeradius]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2612#p2612"><![CDATA[
Thanks for the link. I've tried the pam.d config as suggested:<br /><br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">    auth         required       pam_yubico.so authfile=/etc/yubikeyid id=16 debug<br />    auth         include        system-auth<br />    account      required       pam_nologin.so<br />    account      include        system-auth<br />    password     include        system-auth<br />    session      include        system-auth</div><br /><br />But still the same effect, freeradius authenticates against /etc/passwd + shadow, but never uses the pam_yubico.so module.<br /><br />Any ideas?<br />thanks,geoff<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1568">geoffb</a> — Mon Mar 14, 2011 7:18 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[samir]]></name></author>
<updated>2011-03-11T14:40:30+01:00</updated>
<published>2011-03-11T14:40:30+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=647&amp;p=2608#p2608</id>
<link href="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2608#p2608"/>
<title type="html"><![CDATA[Re: Yubico-pam with Freeradius]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2608#p2608"><![CDATA[
Please refer to the following wiki page which provides step by step guide to use the YubiKey with FreeRADIUS for two factor authentication using Yubico PAM module:<br /><br /><!-- m --><a class="postlink" href="https://github.com/Yubico/yubico-pam/wiki/YubiKeyAndFreeRADIUSviaPAM">https://github.com/Yubico/yubico-pam/wi ... DIUSviaPAM</a><!-- m --> <br /><br />We hope this helps!<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1076">samir</a> — Fri Mar 11, 2011 2:40 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[geoffb]]></name></author>
<updated>2011-03-08T16:47:07+01:00</updated>
<published>2011-03-08T16:47:07+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=647&amp;p=2604#p2604</id>
<link href="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2604#p2604"/>
<title type="html"><![CDATA[Yubico-pam with Freeradius]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=647&amp;p=2604#p2604"><![CDATA[
I'm trying to setup yubico-pam with Freeradius on a small Linksys NSLU2 running Debian.<br /><br />I've got Freeradius working and is currently authenticating using /etc/passwd. sshd is using the yubico-pam module with the addition of the following line to /etc/pam.d/sshd<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">auth required pam_yubico.so authfile=/etc/freeradius/yubikey id=16 debug</div><br /><br />But, I cannot get Freeradius to use the yubico pam module. I'm testing using radtest, which accepts the UNIX passwd but fails if I add the yubico OTP.<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">/etc/pam.d/radiusd<br /><br />auth required pam_yubico.so authfile=/etc/freeradius/yubikey id=16 debug<br />@include common-auth<br />@include common-account<br />@include common-password<br />@include common-session</div><br /><br />I'm sure I've just missed something fairly simple, but not sure how to proceed with debugging?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1568">geoffb</a> — Tue Mar 08, 2011 4:47 pm</p><hr />
]]></content>
</entry>
</feed>