<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=5&amp;t=213" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2013-12-18T22:37:50+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=5&amp;t=213</id>
<entry>
<author><name><![CDATA[frijsdijk]]></name></author>
<updated>2013-12-18T22:37:50+01:00</updated>
<published>2013-12-18T22:37:50+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=213&amp;p=4732#p4732</id>
<link href="https://forum.yubico.com/viewtopic.php?t=213&amp;p=4732#p4732"/>
<title type="html"><![CDATA[Re: PAM module not working on FreeBSD]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=213&amp;p=4732#p4732"><![CDATA[
When configuring DEBUG logging from SSHD, I get in /var/log/debug<br /><br />Up on making ssh connection:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">Dec 18 22:34:53 null sshd&#91;41987&#93;: in openpam_dispatch(): calling pam_sm_authenticate() in /usr/local/lib/security/pam_yubico.so<br />Dec 18 22:34:53 null sshd&#91;41987&#93;: in pam_get_user(): entering<br />Dec 18 22:34:53 null sshd&#91;41987&#93;: in pam_get_item(): entering: PAM_USER<br />Dec 18 22:34:53 null sshd&#91;41987&#93;: in pam_get_item(): returning PAM_SUCCESS<br />Dec 18 22:34:53 null sshd&#91;41987&#93;: in pam_get_user(): returning PAM_SUCCESS<br />Dec 18 22:34:53 null sshd&#91;41987&#93;: in pam_get_item(): entering: PAM_CONV<br />Dec 18 22:34:53 null sshd&#91;41987&#93;: in pam_get_item(): returning PAM_SUCCESS</div><br /><br />Client side:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">&#91;user@server ~&#93;$ ssh -p 22 user@x.x.x.x<br />YubiKey for `user':  &lt;presses key&gt;</div><br /><br />.. nothing!<br /><br />When entering deliberate wrong OTP (that is, wrong size!)<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_set_data(): entering: 'yubico_setcred_return'<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_set_data(): returning PAM_SUCCESS<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in openpam_dispatch(): /usr/local/lib/security/pam_yubico.so: pam_sm_authenticate(): authentication error<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in openpam_dispatch(): calling pam_sm_authenticate() in pam_unix.so<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in openpam_get_option(): entering: 'auth_as_self'<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in openpam_get_option(): returning NULL<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_user(): entering<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): entering: PAM_USER<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): returning PAM_SUCCESS<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_user(): returning PAM_SUCCESS<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_sm_authenticate(): Got user: frederique<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_sm_authenticate(): Doing real authentication<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_authtok(): entering<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): entering: PAM_RHOST<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): returning PAM_SUCCESS<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): entering: PAM_HOST<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): returning PAM_SUCCESS<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): entering: PAM_OLDAUTHTOK<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): returning PAM_SUCCESS<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in openpam_get_option(): entering: 'try_first_pass'<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in openpam_get_option(): returning ''<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): entering: PAM_AUTHTOK<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): returning PAM_SUCCESS<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in openpam_get_option(): entering: 'use_first_pass'<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in openpam_get_option(): returning NULL<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in openpam_get_option(): entering: 'authtok_prompt'<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in openpam_get_option(): returning NULL<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): entering: PAM_AUTHTOK_PROMPT<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): returning PAM_SUCCESS<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in openpam_subst(): entering: 'Password for %u@%h:'<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): entering: PAM_USER<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): returning PAM_SUCCESS<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): entering: PAM_HOST<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): returning PAM_SUCCESS<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in openpam_subst(): returning PAM_SUCCESS<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in openpam_get_option(): entering: 'echo_pass'<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in openpam_get_option(): returning NULL<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_vprompt(): entering<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): entering: PAM_CONV<br />Dec 18 22:36:43 null sshd&#91;41992&#93;: in pam_get_item(): returning PAM_SUCCESS</div><br /><br />So.. when entering something of the right size, nothing happens. When entering something of the wrong size, above logging appears.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2745">frijsdijk</a> — Wed Dec 18, 2013 10:37 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[frijsdijk]]></name></author>
<updated>2013-12-18T21:28:30+01:00</updated>
<published>2013-12-18T21:28:30+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=213&amp;p=4731#p4731</id>
<link href="https://forum.yubico.com/viewtopic.php?t=213&amp;p=4731#p4731"/>
<title type="html"><![CDATA[Re: PAM module not working on FreeBSD]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=213&amp;p=4731#p4731"><![CDATA[
I also can't get it to work. We've bought 2 keys to try it, if it works all our admins ilke to use this.<br /><br />Feel like I'm close, but yet so far away.<br /><br />In trying this in FreeBSD 9.2-RELEASE:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent"># sshd -v<br />sshd: illegal option -- v<br />OpenSSH_6.2p2, OpenSSL 0.9.8y 5 Feb 2013</div><br /><br />My sshd_config:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">#       $OpenBSD: sshd_config,v 1.89 2013/02/06 00:20:42 dtucker Exp $<br />#       $FreeBSD: release/9.2.0/crypto/openssh/sshd_config 252339 2013-06-28 09:55:00Z des $<br /><br /># This is the sshd server system-wide configuration file.  See<br /># sshd_config(5) for more information.<br /><br /># This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin<br /><br /># The strategy used for options in the default sshd_config shipped with<br /># OpenSSH is to specify options with their default value where<br /># possible, but leave them commented.  Uncommented options override the<br /># default value.<br /><br /># Note that some of FreeBSD's defaults differ from OpenBSD's, and<br /># FreeBSD has a few additional options.<br /><br />#Port 22<br />#AddressFamily any<br />#ListenAddress 0.0.0.0<br />#ListenAddress ::<br /><br /># The default requires explicit activation of protocol 1<br />#Protocol 2<br /><br /># HostKey for protocol version 1<br />#HostKey /etc/ssh/ssh_host_key<br /># HostKeys for protocol version 2<br />#HostKey /etc/ssh/ssh_host_rsa_key<br />#HostKey /etc/ssh/ssh_host_dsa_key<br />#HostKey /etc/ssh/ssh_host_ecdsa_key<br /><br /># Lifetime and size of ephemeral version 1 server key<br />#KeyRegenerationInterval 1h<br />#ServerKeyBits 1024<br /><br /># Logging<br /># obsoletes QuietMode and FascistLogging<br />#SyslogFacility AUTH<br />#LogLevel INFO<br /><br /># Authentication:<br /><br />#LoginGraceTime 2m<br />#PermitRootLogin no<br />#StrictModes yes<br />#MaxAuthTries 6<br />#MaxSessions 10<br /><br />#RSAAuthentication yes<br />PubkeyAuthentication yes<br /><br /># The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2<br />#AuthorizedKeysFile .ssh/authorized_keys .ssh/authorized_keys2<br /><br />#AuthorizedPrincipalsFile none<br /><br />#AuthorizedKeysCommand none<br />#AuthorizedKeysCommandUser nobody<br /><br /># For this to work you will also need host keys in /etc/ssh/ssh_known_hosts<br />#RhostsRSAAuthentication no<br /># similar for protocol version 2<br />#HostbasedAuthentication no<br /># Change to yes if you don't trust ~/.ssh/known_hosts for<br /># RhostsRSAAuthentication and HostbasedAuthentication<br />#IgnoreUserKnownHosts no<br /># Don't read the user's ~/.rhosts and ~/.shosts files<br />#IgnoreRhosts yes<br /><br /># Change to yes to enable built-in password authentication.<br />PasswordAuthentication no<br />#PermitEmptyPasswords no<br /><br /># Change to no to disable PAM authentication<br />#ChallengeResponseAuthentication yes<br /><br /># Kerberos options<br />#KerberosAuthentication no<br />#KerberosOrLocalPasswd yes<br />#KerberosTicketCleanup yes<br />#KerberosGetAFSToken no<br /><br /># GSSAPI options<br />#GSSAPIAuthentication no<br />#GSSAPICleanupCredentials yes<br /><br /># Set this to 'no' to disable PAM authentication, account processing,<br /># and session processing. If this is enabled, PAM authentication will<br /># be allowed through the ChallengeResponseAuthentication and<br /># PasswordAuthentication.  Depending on your PAM configuration,<br /># PAM authentication via ChallengeResponseAuthentication may bypass<br /># the setting of &quot;PermitRootLogin without-password&quot;.<br /># If you just want the PAM account and session checks to run without<br /># PAM authentication, then enable this but set PasswordAuthentication<br /># and ChallengeResponseAuthentication to 'no'.<br />#UsePAM yes<br /><br />#AllowAgentForwarding yes<br />#AllowTcpForwarding yes<br />#GatewayPorts no<br />#X11Forwarding yes<br />#X11DisplayOffset 10<br />#X11UseLocalhost yes<br />#PrintMotd yes<br />#PrintLastLog yes<br />#TCPKeepAlive yes<br />#UseLogin no<br />#UsePrivilegeSeparation yes<br />#PermitUserEnvironment no<br />#Compression delayed<br />#ClientAliveInterval 0<br />#ClientAliveCountMax 3<br />#UseDNS yes<br />#PidFile /var/run/sshd.pid<br />#MaxStartups 10:30:100<br />#PermitTunnel no<br />#ChrootDirectory none<br />#VersionAddendum FreeBSD-20130515<br /><br /># no default banner path<br />#Banner none<br /><br /># override default of no subsystems<br />Subsystem       sftp    /usr/libexec/sftp-server<br /><br /># Disable HPN tuning improvements.<br />#HPNDisabled no<br /><br /># Buffer size for HPN to non-HPN connections.<br />#HPNBufferSize 2048<br /><br /># TCP receive socket buffer polling for HPN.  Disable on non autotuning kernels.<br />#TcpRcvBufPoll yes<br /><br /># Allow the use of the NONE cipher.<br />#NoneEnabled no<br /><br /># Example of overriding settings on a per-user basis<br />#Match User anoncvs<br />#       X11Forwarding no<br />#       AllowTcpForwarding no<br />#       ForceCommand cvs server</div><br /><br /><br /><br />Ive installed:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">pam_yubico-2.14                PAM module for authenticating with a Yubico YubiKey<br />ykclient-2.9_1                 Yubico C client library<br />ykpers-1.12.0                  Library and tool for personalization of Yubico's YubiKey</div><br /><br />In /etc/pam.d/sshd I've added (first line, below comments):<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">auth required /usr/local/lib/security/pam_yubico.so id=MYID key=MYKEY url=http://api.yubico.com/wsapi/2.0/verify?id=%d&amp;otp=%s debug</div><br /><br />So, when I try to login from remote, this is what it looks like (running SSHD in debug mode on port 23):<br /><br />[user@server ~]$ ssh -p 23 user@x.x.x.x<br />YubiKey for `user': &lt;press yubikey&gt;<br /><br />- nothing happens - <br /><br />The other side, sshd in debug (/usr/sbin/sshd -p 23 -ddd);<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent"># /usr/sbin/sshd -p 23 -ddd<br />debug2: load_server_config: filename /etc/ssh/sshd_config<br />debug2: load_server_config: done config len = 231<br />debug2: parse_server_config: config /etc/ssh/sshd_config len 231<br />debug3: /etc/ssh/sshd_config:50 setting PubkeyAuthentication yes<br />debug3: /etc/ssh/sshd_config:71 setting PasswordAuthentication no<br />debug3: /etc/ssh/sshd_config:124 setting Subsystem sftp /usr/libexec/sftp-server<br />debug1: HPN Buffer Size: 65536<br />debug1: sshd version OpenSSH_6.2p2_hpn13v11 FreeBSD-20130515, OpenSSL 0.9.8y 5 Feb 2013<br />debug3: Incorrect RSA1 identifier<br />debug1: read PEM private key done: type RSA<br />debug1: private host key: #0 type 1 RSA<br />debug3: Incorrect RSA1 identifier<br />debug1: read PEM private key done: type DSA<br />debug1: private host key: #1 type 2 DSA<br />debug3: Incorrect RSA1 identifier<br />debug1: read PEM private key done: type ECDSA<br />debug1: private host key: #2 type 3 ECDSA<br />debug1: rexec_argv&#91;0&#93;='/usr/sbin/sshd'<br />debug1: rexec_argv&#91;1&#93;='-p'<br />debug1: rexec_argv&#91;2&#93;='23'<br />debug1: rexec_argv&#91;3&#93;='-ddd'<br />debug2: fd 3 setting O_NONBLOCK<br />debug3: ssh_sock_set_v6only: set socket 3 IPV6_V6ONLY<br />debug1: Bind to port 23 on ::.<br />debug1: Server TCP RWIN socket size: 65536<br />debug1: HPN Buffer Size: 65536<br />Server listening on :: port 23.<br />debug2: fd 4 setting O_NONBLOCK<br />debug1: Bind to port 23 on 0.0.0.0.<br />debug1: Server TCP RWIN socket size: 65536<br />debug1: HPN Buffer Size: 65536<br />Server listening on 0.0.0.0 port 23.</div><br /><br />The we start the ssh session from remote:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">debug1: fd 5 clearing O_NONBLOCK<br />debug1: Server will not fork when running in debugging mode.<br />debug3: send_rexec_state: entering fd = 8 config len 231<br />debug3: ssh_msg_send: type 0<br />debug3: send_rexec_state: done<br />debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8<br />debug1: inetd sockets after dupping: 3, 3<br />debug1: res_init()<br />Connection from x.x.x.xport 50388<br />debug1: HPN Disabled: 0, HPN Buffer Size: 65536<br />debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 FreeBSD-20080901<br />debug1: match: OpenSSH_5.1p1 FreeBSD-20080901 pat OpenSSH_5*<br />debug1: Remote is not HPN-aware<br />debug1: Enabling compatibility mode for protocol 2.0<br />debug1: Local version string SSH-2.0-OpenSSH_6.2_hpn13v11 FreeBSD-20130515<br />debug2: fd 3 setting O_NONBLOCK<br />debug2: Network child is on pid 28065<br />debug3: preauth child monitor started<br />debug3: privsep user:group 22:22 &#91;preauth&#93;<br />debug1: permanently_set_uid: 22/22 &#91;preauth&#93;<br />debug1: list_hostkey_types: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 &#91;preauth&#93;<br />debug1: SSH2_MSG_KEXINIT sent &#91;preauth&#93;<br />debug1: SSH2_MSG_KEXINIT received &#91;preauth&#93;<br />debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 &#91;preauth&#93;<br />debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 &#91;preauth&#93;<br />debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se &#91;preauth&#93;<br />debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se &#91;preauth&#93;<br />debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 &#91;preauth&#93;<br />debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 &#91;preauth&#93;<br />debug2: kex_parse_kexinit: none,zlib@openssh.com &#91;preauth&#93;<br />debug2: kex_parse_kexinit: none,zlib@openssh.com &#91;preauth&#93;<br />debug2: kex_parse_kexinit:  &#91;preauth&#93;<br />debug2: kex_parse_kexinit:  &#91;preauth&#93;<br />debug2: kex_parse_kexinit: first_kex_follows 0  &#91;preauth&#93;<br />debug2: kex_parse_kexinit: reserved 0  &#91;preauth&#93;<br />debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 &#91;preauth&#93;<br />debug2: kex_parse_kexinit: ssh-dss,ssh-rsa &#91;preauth&#93;<br />debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr &#91;preauth&#93;<br />debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr &#91;preauth&#93;<br />debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 &#91;preauth&#93;<br />debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 &#91;preauth&#93;<br />debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib &#91;preauth&#93;<br />debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib &#91;preauth&#93;<br />debug2: kex_parse_kexinit:  &#91;preauth&#93;<br />debug2: kex_parse_kexinit:  &#91;preauth&#93;<br />debug2: kex_parse_kexinit: first_kex_follows 0  &#91;preauth&#93;<br />debug2: kex_parse_kexinit: reserved 0  &#91;preauth&#93;<br />debug2: mac_setup: found hmac-md5 &#91;preauth&#93;<br />debug1: kex: client-&gt;server aes128-cbc hmac-md5 none &#91;preauth&#93;<br />debug2: mac_setup: found hmac-md5 &#91;preauth&#93;<br />debug1: kex: server-&gt;client aes128-cbc hmac-md5 none &#91;preauth&#93;<br />debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received &#91;preauth&#93;<br />debug3: mm_request_send entering: type 0 &#91;preauth&#93;<br />debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI &#91;preauth&#93;<br />debug3: mm_request_receive_expect entering: type 1 &#91;preauth&#93;<br />debug3: mm_request_receive entering &#91;preauth&#93;<br />debug3: mm_request_receive entering<br />debug3: monitor_read: checking request 0<br />debug3: mm_answer_moduli: got parameters: 1024 1024 8192<br />debug3: mm_request_send entering: type 1<br />debug2: monitor_read: 0 used once, disabling now<br />debug3: mm_choose_dh: remaining 0 &#91;preauth&#93;<br />debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent &#91;preauth&#93;<br />debug2: dh_gen_key: priv key bits set: 137/256 &#91;preauth&#93;<br />debug2: bits set: 496/1024 &#91;preauth&#93;<br />debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT &#91;preauth&#93;<br />debug2: bits set: 507/1024 &#91;preauth&#93;<br />debug3: mm_key_sign entering &#91;preauth&#93;<br />debug3: mm_request_send entering: type 6 &#91;preauth&#93;<br />debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN &#91;preauth&#93;<br />debug3: mm_request_receive_expect entering: type 7 &#91;preauth&#93;<br />debug3: mm_request_receive entering &#91;preauth&#93;<br />debug3: mm_request_receive entering<br />debug3: monitor_read: checking request 6<br />debug3: mm_answer_sign<br />debug3: mm_answer_sign: signature 0x803019100(55)<br />debug3: mm_request_send entering: type 7<br />debug2: monitor_read: 6 used once, disabling now<br />debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent &#91;preauth&#93;<br />debug2: kex_derive_keys &#91;preauth&#93;<br />debug2: set_newkeys: mode 1 &#91;preauth&#93;<br />debug1: SSH2_MSG_NEWKEYS sent &#91;preauth&#93;<br />debug1: expecting SSH2_MSG_NEWKEYS &#91;preauth&#93;<br />debug2: set_newkeys: mode 0 &#91;preauth&#93;<br />debug1: SSH2_MSG_NEWKEYS received &#91;preauth&#93;<br />debug1: KEX done &#91;preauth&#93;<br />debug3: Trying to reverse map address x.x.x.x. &#91;preauth&#93;<br />debug1: userauth-request for user user service ssh-connection method none &#91;preauth&#93;<br />debug1: attempt 0 failures 0 &#91;preauth&#93;<br />debug3: mm_getpwnamallow entering &#91;preauth&#93;<br />debug3: mm_request_send entering: type 8 &#91;preauth&#93;<br />debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM &#91;preauth&#93;<br />debug3: mm_request_receive_expect entering: type 9 &#91;preauth&#93;<br />debug3: mm_request_receive entering &#91;preauth&#93;<br />debug3: mm_request_receive entering<br />debug3: monitor_read: checking request 8<br />debug3: mm_answer_pwnamallow<br />debug3: Trying to reverse map address x.x.x.x.<br />debug2: parse_server_config: config reprocess config len 231<br />debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1<br />debug3: mm_request_send entering: type 9<br />debug2: monitor_read: 8 used once, disabling now<br />debug2: input_userauth_request: setting up authctxt for user &#91;preauth&#93;<br />debug3: mm_start_pam entering &#91;preauth&#93;<br />debug3: mm_request_send entering: type 100 &#91;preauth&#93;<br />debug3: mm_inform_authserv entering &#91;preauth&#93;<br />debug3: mm_request_send entering: type 4 &#91;preauth&#93;<br />debug3: mm_request_receive entering<br />debug3: monitor_read: checking request 100<br />debug1: PAM: initializing for &quot;user&quot;<br />debug1: PAM: setting PAM_RHOST to &quot;server.fqdn.nl&quot;<br />debug2: monitor_read: 100 used once, disabling now<br />debug2: input_userauth_request: try method none &#91;preauth&#93;<br />debug3: userauth_finish: failure partial=0 next methods=&quot;publickey,keyboard-interactive&quot; &#91;preauth&#93;<br />debug1: userauth-request for user user service ssh-connection method publickey &#91;preauth&#93;<br />debug1: attempt 1 failures 0 &#91;preauth&#93;<br />debug2: input_userauth_request: try method publickey &#91;preauth&#93;<br />debug1: test whether pkalg/pkblob are acceptable &#91;preauth&#93;<br />debug3: mm_key_allowed entering &#91;preauth&#93;<br />debug3: mm_request_send entering: type 22 &#91;preauth&#93;<br />debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED &#91;preauth&#93;<br />debug3: mm_request_receive_expect entering: type 23 &#91;preauth&#93;<br />debug3: mm_request_receive entering &#91;preauth&#93;<br />debug3: mm_request_receive entering<br />debug3: monitor_read: checking request 4<br />debug3: mm_answer_authserv: service=ssh-connection, style=<br />debug2: monitor_read: 4 used once, disabling now<br />debug3: mm_request_receive entering<br />debug3: monitor_read: checking request 22<br />debug3: mm_answer_keyallowed entering<br />debug3: mm_answer_keyallowed: key_from_blob: 0x8030082e0<br />debug1: trying public key file /home/user/.ssh/authorized_keys<br />debug1: fd 4 clearing O_NONBLOCK<br />debug3: key_read: type mismatch<br />- snipped ssh-keys data - <br />debug2: key not found<br />debug1: trying public key file /home/user/.ssh/authorized_keys2<br />debug1: Could not open authorized keys '/home/user/.ssh/authorized_keys2': Permission denied<br />Failed publickey for user from x.x.x.x port 50388 ssh2<br />debug3: mm_answer_keyallowed: key 0x8030082e0 is not allowed<br />debug3: mm_request_send entering: type 23<br />debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss &#91;preauth&#93;<br />debug3: userauth_finish: failure partial=0 next methods=&quot;publickey,keyboard-interactive&quot; &#91;preauth&#93;<br />debug1: userauth-request for user user service ssh-connection method publickey &#91;preauth&#93;<br />debug1: attempt 2 failures 1 &#91;preauth&#93;<br />debug2: input_userauth_request: try method publickey &#91;preauth&#93;<br />debug1: test whether pkalg/pkblob are acceptable &#91;preauth&#93;<br />debug3: mm_key_allowed entering &#91;preauth&#93;<br />debug3: mm_request_send entering: type 22 &#91;preauth&#93;<br />debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED &#91;preauth&#93;<br />debug3: mm_request_receive_expect entering: type 23 &#91;preauth&#93;<br />debug3: mm_request_receive entering &#91;preauth&#93;<br />debug3: mm_request_receive entering<br />debug3: monitor_read: checking request 22<br />debug3: mm_answer_keyallowed entering<br />debug3: mm_answer_keyallowed: key_from_blob: 0x8030082e0<br />debug1: trying public key file /home/user/.ssh/authorized_keys<br />debug1: fd 4 clearing O_NONBLOCK<br />debug2: key not found<br />debug1: trying public key file /home/user/.ssh/authorized_keys2<br />debug1: Could not open authorized keys '/home/user/.ssh/authorized_keys2': Permission denied<br />Failed publickey for USER from x.x.x.xport 50388 ssh2<br />debug3: mm_answer_keyallowed: key 0x8030082e0 is not allowed<br />debug3: mm_request_send entering: type 23<br />debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa &#91;preauth&#93;<br />debug3: userauth_finish: failure partial=0 next methods=&quot;publickey,keyboard-interactive&quot; &#91;preauth&#93;<br />debug1: userauth-request for user USER service ssh-connection method keyboard-interactive &#91;preauth&#93;<br />debug1: attempt 3 failures 2 &#91;preauth&#93;<br />debug2: input_userauth_request: try method keyboard-interactive &#91;preauth&#93;<br />debug1: keyboard-interactive devs  &#91;preauth&#93;<br />debug1: auth2_challenge: user=USER devs= &#91;preauth&#93;<br />debug1: kbdint_alloc: devices 'pam' &#91;preauth&#93;<br />debug2: auth2_challenge_start: devices pam &#91;preauth&#93;<br />debug2: kbdint_next_device: devices &lt;empty&gt; &#91;preauth&#93;<br />debug1: auth2_challenge_start: trying authentication method 'pam' &#91;preauth&#93;<br />debug3: mm_sshpam_init_ctx &#91;preauth&#93;<br />debug3: mm_request_send entering: type 104 &#91;preauth&#93;<br />debug3: mm_sshpam_init_ctx: waiting for MONITOR_ANS_PAM_INIT_CTX &#91;preauth&#93;<br />debug3: mm_request_receive_expect entering: type 105 &#91;preauth&#93;<br />debug3: mm_request_receive entering &#91;preauth&#93;<br />debug3: mm_request_receive entering<br />debug3: monitor_read: checking request 104<br />debug3: mm_answer_pam_init_ctx<br />debug3: PAM: sshpam_init_ctx entering<br />debug3: mm_request_send entering: type 105<br />debug3: mm_sshpam_query &#91;preauth&#93;<br />debug3: mm_request_send entering: type 106 &#91;preauth&#93;<br />debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY &#91;preauth&#93;<br />debug3: mm_request_receive_expect entering: type 107 &#91;preauth&#93;<br />debug3: mm_request_receive entering &#91;preauth&#93;<br />debug3: mm_request_receive entering<br />debug3: monitor_read: checking request 106<br />debug3: mm_answer_pam_query<br />debug3: PAM: sshpam_query entering<br />debug3: ssh_msg_recv entering<br />debug3: PAM: sshpam_thread_conv entering, 1 messages<br />debug3: ssh_msg_send: type 1<br />debug3: ssh_msg_recv entering<br />debug3: mm_request_send entering: type 107<br />debug3: mm_sshpam_query: pam_query returned 0 &#91;preauth&#93;<br />Postponed keyboard-interactive for user from x.x.x.x port 50388 ssh2 &#91;preauth&#93;<br /></div><br />Then, I press the yubikey, and we get:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">debug3: mm_sshpam_respond &#91;preauth&#93;<br />debug3: mm_request_send entering: type 108 &#91;preauth&#93;<br />debug3: mm_sshpam_respond: waiting for MONITOR_ANS_PAM_RESPOND &#91;preauth&#93;<br />debug3: mm_request_receive_expect entering: type 109 &#91;preauth&#93;<br />debug3: mm_request_receive entering &#91;preauth&#93;<br />debug3: mm_request_receive entering<br />debug3: monitor_read: checking request 108<br />debug3: mm_answer_pam_respond<br />debug2: PAM: sshpam_respond entering, 1 responses<br />debug3: ssh_msg_send: type 6<br />debug3: mm_request_send entering: type 109<br />debug3: mm_sshpam_respond: pam_respond returned 1 &#91;preauth&#93;<br />debug3: mm_sshpam_query &#91;preauth&#93;<br />debug3: mm_request_send entering: type 106 &#91;preauth&#93;<br />debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY &#91;preauth&#93;<br />debug3: mm_request_receive_expect entering: type 107 &#91;preauth&#93;<br />debug3: mm_request_receive entering &#91;preauth&#93;<br />debug3: mm_request_receive entering<br />debug3: monitor_read: checking request 106<br />debug3: mm_answer_pam_query<br />debug3: PAM: sshpam_query entering<br />debug3: ssh_msg_recv entering</div><br /><br />That's it. Nothing Else. <br /><br />I also see no outgoing connections (deny out firewall with logging).<br /><br />I've been trying for hours, but nada. Tried the Google authenticator, worked right away. But.. I want to use Yubikey!<br /><br />Can I get some help? Happy to provide any data!<br /><br />Oh PS: I've created /var/run/pam-debug.log with write rights for everyone.. but no data appears.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2745">frijsdijk</a> — Wed Dec 18, 2013 9:28 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[InquisitiveDonut]]></name></author>
<updated>2013-10-02T01:37:45+01:00</updated>
<published>2013-10-02T01:37:45+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=213&amp;p=4442#p4442</id>
<link href="https://forum.yubico.com/viewtopic.php?t=213&amp;p=4442#p4442"/>
<title type="html"><![CDATA[Re: PAM module not working on FreeBSD]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=213&amp;p=4442#p4442"><![CDATA[
I've tried this on FreeBSD 9.0-RELEASE and have had no luck. Swapping &quot;ChallengeResponse&quot; to &quot;yes&quot;, and &quot;PasswordAuthentication&quot; to &quot;no&quot; yields the following - (answers filled in by me)<br /><br />login as: &lt;my username&gt;<br />Using keyboard-interactive authentication.<br />Yubikey for `&lt;my username&gt;`: &lt;I touch my yubikey's button&gt;<br />Access denied<br /><br />After 3 attempts, OpenSSH shuts me down.<br /><br />My /etc/pam.d/sshd is as follows:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">auth            sufficient      pam_yubico.so           id=&lt;my id&gt; key=&lt;my key&gt; debug<br />auth            sufficient      pam_opie.so             no_warn no_fake_prompts try_first_pass<br />auth            requisite       pam_opieaccess.so       no_warn allow_local<br />auth            required        pam_unix.so             no_warn try_first_pass<br /></div><br /><br />My /etc/ssh/sshd_config is as follows:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">PasswordAuthentication no<br />PermitEmptyPasswords no<br /><br /># Change to no to disable PAM authentication<br />ChallengeResponseAuthentication yes<br /><br />UsePAM yes<br /></div><br /><br />In addition, it appears that the debug flag does nothing - nothing shows up when telling syslog-ng to log everything to a single log file.<br /><br />At this point, help would be appreciated.<br /><br />EDIT to add: Further information. I'm not seeing any outbound traffic from my machine to authenticate.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2615">InquisitiveDonut</a> — Wed Oct 02, 2013 1:37 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[network-marvels]]></name></author>
<updated>2008-12-22T16:55:59+01:00</updated>
<published>2008-12-22T16:55:59+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=213&amp;p=828#p828</id>
<link href="https://forum.yubico.com/viewtopic.php?t=213&amp;p=828#p828"/>
<title type="html"><![CDATA[Re: PAM module not working on FreeBSD]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=213&amp;p=828#p828"><![CDATA[
We need to disable default &quot;ChallengeResponseAuthentication&quot; for ssh log ins in order to use pam_yubico module for two factor authentication.<br /><br /><span style="text-decoration: underline"><strong>Steps to disable &quot;ChallengeResponseAuthentication&quot;:</strong></span><br /><br />Edit the sshd configuration file “/etc/ssh/sshd_config” with root privileges and do the following changes:<br /><ul><br />a) Uncomment &quot;PasswordAuthentication&quot; and change “PasswordAuthentication no” to “PasswordAuthentication yes” on line 61 of “/etc/ssh/sshd_config”<br /><br />b) Uncomment &quot;ChallengeResponseAuthentication&quot; and change “ChallengeResponseAuthentication yes” to “ChallengeResponseAuthentication no” on line 65 of “/etc/ssh/sshd_config”<br /><br />c) Uncomment &quot;UsePAM&quot; and change “UsePAM no” to “UsePAM yes” on line 86 of “/etc/ssh/sshd_config”<br /></ul><br />We have tested the Yubico PAM configuration on following test environment:<br /><br /><ul>1) OS Version: FreeBSD 7.0-RELEASE<br />2) OpenSSH Version: OpenSSH_4.5p1 FreeBSD-20061110,<br />3) Yubico PAM Version: pam_yubico-1.8<br />4) /etc/pam.d/sshd:<br /><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />#<br /># $FreeBSD: src/etc/pam.d/sshd,v 1.16 2007/06/10 18:57:20 yar Exp $<br />#<br /># PAM configuration for the &quot;sshd&quot; service<br />#<br /><br /># auth<br />auth            required        pam_yubico.so authfile=/etc/yubikeyid id=16 debug<br />auth            sufficient      pam_opie.so             no_warn no_fake_prompts<br />auth            requisite       pam_opieaccess.so       no_warn allow_local<br />#auth           sufficient      pam_krb5.so             no_warn try_first_pass<br />#auth           sufficient      pam_ssh.so              no_warn try_first_pass<br />auth            required        pam_unix.so             no_warn try_first_pass<br /><br /># account<br />account         required        pam_nologin.so<br />#account        required        pam_krb5.so<br />account         required        pam_login_access.so<br />account         required        pam_unix.so<br /><br /># session<br />#session        optional        pam_ssh.so<br />session         required        pam_permit.so<br /><br /># password<br />#password       sufficient      pam_krb5.so             no_warn try_first_pass<br />password        required        pam_unix.so             no_warn try_first_pass<br /></div><br /><br /><br />5) “/etc/ssh/sshd_config”:<br /><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />#$OpenBSD: sshd_config,v 1.74 2006/07/19 13:07:10 dtucker Exp $<br />#$FreeBSD: src/crypto/openssh/sshd_config,v 1.47 2006/11/10 16:52:41 des Exp $<br /><br /># This is the sshd server system-wide configuration file.  See<br /># sshd_config(5) for more information.<br /><br /># This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin<br /><br /># The strategy used for options in the default sshd_config shipped with<br /># OpenSSH is to specify options with their default value where<br /># possible, but leave them commented.  Uncommented options change a<br /># default value.<br /><br /># Note that some of FreeBSD's defaults differ from OpenBSD's, and<br /># FreeBSD has a few additional options.<br /><br />#VersionAddendum FreeBSD-20061110<br /><br />#Port 22<br />#Protocol 2<br />#AddressFamily any<br />#ListenAddress 0.0.0.0<br />#ListenAddress ::<br /><br /># HostKey for protocol version 1<br />#HostKey /etc/ssh/ssh_host_key<br /># HostKeys for protocol version 2<br />#HostKey /etc/ssh/ssh_host_dsa_key<br /><br /># Lifetime and size of ephemeral version 1 server key<br />#KeyRegenerationInterval 1h<br />#ServerKeyBits 768<br /><br /># Logging<br /># obsoletes QuietMode and FascistLogging<br />#SyslogFacility AUTH<br />#LogLevel INFO<br /><br /># Authentication:<br /><br />#LoginGraceTime 2m<br />#PermitRootLogin no<br />#StrictModes yes<br />#MaxAuthTries 6<br /><br />#RSAAuthentication yes<br />#PubkeyAuthentication yes<br />#AuthorizedKeysFile.ssh/authorized_keys<br /><br /># For this to work you will also need host keys in /etc/ssh/ssh_known_hosts<br />#RhostsRSAAuthentication no<br /># similar for protocol version 2<br />#HostbasedAuthentication no<br /># Change to yes if you don't trust ~/.ssh/known_hosts for<br /># RhostsRSAAuthentication and HostbasedAuthentication<br />#IgnoreUserKnownHosts no<br /># Don't read the user's ~/.rhosts and ~/.shosts files<br />#IgnoreRhosts yes<br /><br /># Change to yes to enable built-in password authentication.<br />PasswordAuthentication yes<br />#PermitEmptyPasswords no<br /><br /># Change to no to disable PAM authentication<br />ChallengeResponseAuthentication no<br /><br /># Kerberos options<br />#KerberosAuthentication no<br />#KerberosOrLocalPasswd yes<br />#KerberosTicketCleanup yes<br />#KerberosGetAFSToken no<br /><br /># GSSAPI options<br />#GSSAPIAuthentication no<br />#GSSAPICleanupCredentials yes<br /><br /># Set this to 'no' to disable PAM authentication, account processing,<br /># and session processing. If this is enabled, PAM authentication will <br /># be allowed through the ChallengeResponseAuthentication and<br /># PasswordAuthentication.  Depending on your PAM configuration,<br /># PAM authentication via ChallengeResponseAuthentication may bypass<br /># the setting of &quot;PermitRootLogin without-password&quot;.<br /># If you just want the PAM account and session checks to run without<br /># PAM authentication, then enable this but set PasswordAuthentication<br /># and ChallengeResponseAuthentication to 'no'.<br />UsePAM yes<br /><br />#AllowTcpForwarding yes<br />#GatewayPorts no<br />#X11Forwarding yes<br />#X11DisplayOffset 10<br />#X11UseLocalhost yes<br />#PrintMotd yes<br />#PrintLastLog yes<br />#TCPKeepAlive yes<br />#UseLogin no<br />#UsePrivilegeSeparation yes<br />#PermitUserEnvironment no<br />#Compression delayed<br />#ClientAliveInterval 0<br />#ClientAliveCountMax 3<br />#UseDNS yes<br />#PidFile /var/run/sshd.pid<br />#MaxStartups 10<br />#PermitTunnel no<br /><br /># no default banner path<br />#Banner /some/path<br /><br /># override default of no subsystems<br />Subsystemsftp/usr/libexec/sftp-server<br /><br /># Example of overriding settings on a per-user basis<br />#Match User anoncvs<br />#X11Forwarding no<br />#AllowTcpForwarding no<br />#ForceCommand cvs server<br /></div><br /></ul><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=280">network-marvels</a> — Mon Dec 22, 2008 4:55 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[network-marvels]]></name></author>
<updated>2008-12-19T17:10:21+01:00</updated>
<published>2008-12-19T17:10:21+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=213&amp;p=823#p823</id>
<link href="https://forum.yubico.com/viewtopic.php?t=213&amp;p=823#p823"/>
<title type="html"><![CDATA[Re: PAM module not working on FreeBSD]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=213&amp;p=823#p823"><![CDATA[
We are looking into this and will update you soon.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=280">network-marvels</a> — Fri Dec 19, 2008 5:10 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[wwager]]></name></author>
<updated>2008-12-18T15:27:52+01:00</updated>
<published>2008-12-18T15:27:52+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=213&amp;p=822#p822</id>
<link href="https://forum.yubico.com/viewtopic.php?t=213&amp;p=822#p822"/>
<title type="html"><![CDATA[PAM module not working on FreeBSD]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=213&amp;p=822#p822"><![CDATA[
Hi there,<br /><br />I'm trying to get pam_yubico-1.8 to work with FreeBSD 6.x, so far we are at the point where the module has compiled properly and we have it in /usr/lib/, when trying to use it with sshd or passwd it breaks with no actual error. All our servers are primarily FreeBSD 6.x and 7.x so its critical that we can get it working on this platform. Has anyone been able to get this to work on FreeBSD? <br /><br />If anyone can assist I would appreciate it. <br /><br />Cheers,<br /><br />Will<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=332">wwager</a> — Thu Dec 18, 2008 3:27 pm</p><hr />
]]></content>
</entry>
</feed>