<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=3&amp;t=86" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2008-11-20T08:26:50+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=3&amp;t=86</id>
<entry>
<author><name><![CDATA[network-marvels]]></name></author>
<updated>2008-11-20T08:26:50+01:00</updated>
<published>2008-11-20T08:26:50+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=86&amp;p=794#p794</id>
<link href="https://forum.yubico.com/viewtopic.php?t=86&amp;p=794#p794"/>
<title type="html"><![CDATA[Re: PAM Radius and Fedora]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=86&amp;p=794#p794"><![CDATA[
<ul></ul>Please refer below documentation for configuring FreeRADIUS with two factor authentication using YubiKey:<br /><br /><ul><li> <span style="text-decoration: underline"><strong>About this document:</strong> </span></li></ul><br />The purpose of this document is to guide readers through the configuration steps to enable two factor authentication using YubiKey and RADIUS server on Linux platform. This document assumes that the reader has advance knowledge and experience in Linux system administration, particularly how to configure PAM authentication mechanism on a Linux platform.<br /><br />Although this configuration guide focuses on configuration of radiusd demon for local authentication using the custom database (we have used /etc/passwd), radiusd can be configured easily to use centralized LDAP database for authentication or any popular directory service by configuring appropriate PAM modules in radiusd pam configuration file.<br /><br /><ul><li> <span style="text-decoration: underline"><strong>Prerequisites:</strong> </span></li></ul><br />Successful configuration of the Yubico PAM module to support two factor authentication for RADIUS requires following prerequisites:<br /><br /><ul>1) Operating System: Any Unix operating system which supports PAM (Pluggable Authentication Module) (<!-- m --><a class="postlink" href="http://www.kernel.org/pub/linux/libs/pam/">http://www.kernel.org/pub/linux/libs/pam/</a><!-- m -->)<br />2) Complier : GNU GCC complier (<!-- m --><a class="postlink" href="http://gcc.gnu.org/">http://gcc.gnu.org/</a><!-- m -->)<br />3) Yubico PAM Module: Yubico PAM Module Version 1.8. It can be downloaded from: <!-- m --><a class="postlink" href="http://code.google.com/p/yubico-pam">http://code.google.com/p/yubico-pam</a><!-- m --><br />4) FreeRADIUS: FreeRADIUS Version: 1.1.7. It can be downloaded from : <!-- m --><a class="postlink" href="http://freeradius.org/download.html">http://freeradius.org/download.html</a><!-- m --><br /></ul><br /><ul><li> <span style="text-decoration: underline"><strong>Configuration:</strong> </span></li></ul><br />We assume that freeRADIUS is already installed on the server.<br /><br /><ul>A) <strong>Configuration of freeRADIUS server to support PAM authentication:</strong><br /><ul><br /> 1) Edit the radiusd configuration file “/etc/raddb/radiusd.conf” to make following changes:<br /><br /><ul> a) Change user and group to “root” to provide the root privileges to radiusd demon so that it can call and use pam modules for authentication. NOTE: Generally, it is not a good security practice to assign root privileges to a user for a demon. However, since use of PAM requires root privileges, this is a mandatory step here.<br /><br /> b) In “authenticate” section uncomment pam to direct radiusd demon to use pam module for authentication<br /></ul> <br /> 2) Edit the client configuration file “/etc/raddb/clients.conf” to add sample client for testing<br /><br /> 3) Edit the user configuration file “/etc/raddb/users” to make following change:<br /><br />     Change &quot;DEFAULT Auth-Type = System&quot; to &quot;DEFAULT Auth-Type = pam&quot; for using pam modules for user authentication<br /></ul><br />B) <strong>Installation of pam_yubico module:</strong><br /><br />Build instructions for pam_yubico are available in the README: <br /><br /><!-- m --><a class="postlink" href="http://code.google.com/p/yubico-c/source/browse/trunk/README">http://code.google.com/p/yubico-c/sourc ... unk/README</a><!-- m --><br /><br />C) <strong>Configuration of pam_yubico module:</strong><br /><br /><ul>a) Configuration for user and YubiKey PublicID mapping:<br />There are two ways of user and YubiKey PublicID (token ID) mapping. It can be either done at administrative level or at individual user level.<br /><ul><br />1) Administrative Level:<br /><br />In Administrative level, system administrators hold right to configure the user and YubiKey PublicID mapping. Administrators can achieve this by creating a new file that contains information about the username and the corresponding PublicIDs of YubiKey(s) assigned. This file contains user name that is allowed to connect to the system using RADIUS and the PublicID of the YubiKey(s) assigned to that particular user. A user can be assigned multiple YubiKeys and this multi key mapping is supported by this file. However, presently there is no logic coded to detect or prevent use of same YubiKey ID for multiple users.<br /> <br />Each record in the file should begin on a new line. The parameters in each record are separated by “:” character similar to /etc/passwd. <br />The contents of this file are as follows: <br /><br />&lt;user name&gt;:&lt;YubiKey PublicID&gt;:&lt;YubiKey PublicID&gt;: …. <br />&lt;user name&gt;:&lt;YubiKey PublicID &gt;:&lt;YubiKey PublicID&gt;:….. <br /><br />e.g.:<br /> <br />paul:indvnvlcbdre:ldvglinuddek simon:uturrufnjder:hjturefjtehv kurt:ertbhunjimko <br /><br />The mapping file must be created/updated manually before configuration of Yubico PAM module for RADIUS authentication.<br /><br /><ul><li> <strong>Configuration of modified pam_yubico.so module at administrative level:</strong><br /><br />Append the following line to the beginning of /etc/pam.d/radiusd file: <br />auth required pam_yubico.so id=16 debug authfile=&lt;absolute path of the mapping file&gt; <br /><br />After the above configuration changes, whenever a user connects to the server using any RADIUS client, the PAM authentication interface will pass the control to Yubico PAM module. The Yubico PAM module first checks the presence of authfile argument in PAM configuration. If authfile argument is present, it parses the corresponding mapping file and verifies the username with corresponding YubiKey PublicID as configured in the mapping file. If valid, the Yubico PAM module extracts the OTP string and sends it to the Yubico authentication server or else it reports failure. If authfile argument is present but the mapping file is not present at the provided path PAM module reports failure. After successful verification of OTP Yubico PAM module from the Yubico authentication server, a success code is returned.<br /><br /></ul>2) User Level:<br /><br />Although, user level configuration of pam_yubico is possible, this might not be a desired configuration option in case of radisud demon in most enterprise.<br /></ul></ul><br />D) <strong>Configuration of selinux policy to create exception for radiusd demon:</strong><br /><br />Local effective selinux policy must be updated to provide sufficient privileges to radiusd demon on system resources. Please follow the steps below to configure effective selinux policy for radiusd demon:<br /><br /><ul>1) Start the radiusd demon<br />2) Test the RADIUS authentication with the test case provided in “Testing the configuration” section below<br />3) As radiusd demon doesn’t have sufficient selinux privileges to access the system resources required for using pam modules, the RADIUS authentication will fail.<br />4) This will create the logs in either “/var/log/messages” or in “/var/log/audit/audit.log” depending on the selinux configuration.<br />5) We can use audit2allow utility to provide selinux privileges to radiusd by using following sequence of commands:<br /># audit2allow -m local -l -i /var/log/messages &gt; local.te<br /># checkmodule -M -m -o local.mod local.te<br /># semodule_package -o local.pp -m local.mod<br /># semodule -i local.pp<br />6) For more selinux policy updating information and explanation of above commands please visit the following website:<br /><!-- m --><a class="postlink" href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">http://fedora.redhat.com/docs/selinux-f ... #id2961385</a><!-- m --><br /></ul></li></ul><br /><ul><li> <span style="text-decoration: underline"><strong>Test Setup:</strong> </span></li></ul><br />Our test environment is as follows:<br /><br /><ul>a) Operating System: Fedora release 8 (Werewolf)<br />b) FreeRADIUS Server : FreeRADIUS Version 1.1.7<br />c) Yubico PAM: pam_yubico  Version 1.8<br />d) &quot;/etc/pam.d/radiusd&quot; file:<br /><br />auth                    required     pam_yubico.so authfile=/etc/yubikeyid id=16 debug<br />auth        include     system-auth<br />account    required  pam_nologin.so<br />account     include      system-auth<br />password   include     system-auth<br />session     include     system-auth<br /></ul><br /><ul><li> <span style="text-decoration: underline"><strong>Testing the configuration:</strong> </span></li></ul><br />We have tested the pam_yubico configuration on following Linux sever platforms:<br /><br /><ul>1) Fedora 8:<br /><ul>a) Operating system: Fedora release 8 (Werewolf)<br />b) FreeRADIUS Server : FreeRADIUS Version 1.1.7<br />c) Yubico PAM: pam_yubico  Version 1.8<br /></ul><br />2) Fedora 6:<br /><ul>a) Operating system: Fedora Core release 6 (Zod)<br />b) FreeRADIUS Server : FreeRADIUS Version 1.1.7<br />c) Yubico PAM: pam_yubico  Version 1.8<br /></ul></ul><br />To test the RADIUS two factor authentication with YubiKey, we can use “radtest” radius client. The command is as follows:<br /><br /># radtest &lt;username&gt; &lt;passwd followed by YubiKey generated OTP&gt; &lt;radius-server&gt;:&lt;radius server port&gt; &lt;nas-port-number&gt; &lt;secret [ppphint] [nasname]&gt;<br /><br />e.g.:<br /><br /># radtest test test123vrkvfefuitvflvgufcdlbjufkggukufkebeildbdkkjc 127.0.0.1 0 testing123<br /><br /><ul><li> <span style="text-decoration: underline"><strong>Note:</strong> </span></li></ul><br />The FreeRADIUS server version 1.1.3 seems to have problems regarding memory management and it may result in Segmentation Fault if configured with Yubico PAM module. We recommend using FreeRADIUS server version 1.1.7 or above.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=280">network-marvels</a> — Thu Nov 20, 2008 8:26 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Snow]]></name></author>
<updated>2008-06-10T07:48:57+01:00</updated>
<published>2008-06-10T07:48:57+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=86&amp;p=216#p216</id>
<link href="https://forum.yubico.com/viewtopic.php?t=86&amp;p=216#p216"/>
<title type="html"><![CDATA[Re: PAM Radius and Fedora]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=86&amp;p=216#p216"><![CDATA[
I have integrated YubiKey with Cisco VPN, FreeRadius and Cisco SSL VPN by following the guide and use the PAM module from Yubico:<br /><br /><!-- m --><a class="postlink" href="http://code.google.com/p/yubico-pam/wiki/YubikeyAndRadiusViaPAM">http://code.google.com/p/yubico-pam/wik ... diusViaPAM</a><!-- m --><br /><br />Cheers<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=120">Snow</a> — Tue Jun 10, 2008 7:48 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[sentwistle]]></name></author>
<updated>2008-06-09T16:09:24+01:00</updated>
<published>2008-06-09T16:09:24+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=86&amp;p=195#p195</id>
<link href="https://forum.yubico.com/viewtopic.php?t=86&amp;p=195#p195"/>
<title type="html"><![CDATA[PAM Radius and Fedora]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=86&amp;p=195#p195"><![CDATA[
Has anyone experience of using Radius with Fedora and Yubico?<br /><br />I would like to set up a test server on a corporate network to act as a radius server for a SSL VPN radius client.<br /><br />So I have FreeRadius installed on a Fedora box.  I have the demo PAM code compiled.  Not too sure where to go with it next.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=103">sentwistle</a> — Mon Jun 09, 2008 4:09 pm</p><hr />
]]></content>
</entry>
</feed>