<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=23&amp;t=1423" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2014-07-08T10:20:59+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=23&amp;t=1423</id>
<entry>
<author><name><![CDATA[jkroepke]]></name></author>
<updated>2014-07-08T10:20:59+01:00</updated>
<published>2014-07-08T10:20:59+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1423&amp;p=5388#p5388</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1423&amp;p=5388#p5388"/>
<title type="html"><![CDATA[[PROBLEM] pam_yubico and urllist (HA)]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1423&amp;p=5388#p5388"><![CDATA[
Hi,<br /><br />i want to use the pam_yubico Module with Two Factor SSH authentication.<br /><br />Here is my configuration:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">auth requisite pam_yubico.so id=1 urllist=http://hajvmyk01:8000/wsapi/2.0/verify;http://hajvmyk01:8002/wsapi/2.0/verify authfile=/etc/yubikey_mappings/authorized_yubikeys debug</div><br /><br />On the hajvmyk01 server runs two instance of yubico-serve. TFA for SSH is configured on hajvmyk02 (client).<br /><br />Currently <!-- m --><a class="postlink" href="http://hajvmyk01:8000/wsapi/2.0/verify">http://hajvmyk01:8000/wsapi/2.0/verify</a><!-- m --> is not reachable. (HA failure test).<br /><br />So if I login into the client it successfully login but the log says:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">&#91;pam_yubico.c:parse_cfg(764)&#93; called.<br />&#91;pam_yubico.c:parse_cfg(765)&#93; flags 1 argc 4<br />&#91;pam_yubico.c:parse_cfg(767)&#93; argv&#91;0&#93;=id=1<br />&#91;pam_yubico.c:parse_cfg(767)&#93; argv&#91;1&#93;=urllist=http://hajvmyk01:8000/wsapi/2.0/verify;http://hajvmyk01:8002/wsapi/2.0/verify<br />&#91;pam_yubico.c:parse_cfg(767)&#93; argv&#91;2&#93;=authfile=/etc/yubikey_mappings/authorized_yubikeys<br />&#91;pam_yubico.c:parse_cfg(767)&#93; argv&#91;3&#93;=debug<br />&#91;pam_yubico.c:parse_cfg(768)&#93; id=1<br />&#91;pam_yubico.c:parse_cfg(769)&#93; key=(null)<br />&#91;pam_yubico.c:parse_cfg(770)&#93; debug=1<br />&#91;pam_yubico.c:parse_cfg(771)&#93; alwaysok=0<br />&#91;pam_yubico.c:parse_cfg(772)&#93; verbose_otp=0<br />&#91;pam_yubico.c:parse_cfg(773)&#93; try_first_pass=0<br />&#91;pam_yubico.c:parse_cfg(774)&#93; use_first_pass=0<br />&#91;pam_yubico.c:parse_cfg(775)&#93; authfile=/etc/yubikey_mappings/authorized_yubikeys<br />&#91;pam_yubico.c:parse_cfg(776)&#93; ldapserver=(null)<br />&#91;pam_yubico.c:parse_cfg(777)&#93; ldap_uri=(null)<br />&#91;pam_yubico.c:parse_cfg(778)&#93; ldapdn=(null)<br />&#91;pam_yubico.c:parse_cfg(779)&#93; user_attr=(null)<br />&#91;pam_yubico.c:parse_cfg(780)&#93; yubi_attr=(null)<br />&#91;pam_yubico.c:parse_cfg(781)&#93; yubi_attr_prefix=(null)<br />&#91;pam_yubico.c:parse_cfg(782)&#93; url=(null)<br />&#91;pam_yubico.c:parse_cfg(783)&#93; urllist=http://hajvmyk01:8000/wsapi/2.0/verify;http://hajvmyk01:8002/wsapi/2.0/verify<br />&#91;pam_yubico.c:parse_cfg(784)&#93; capath=(null)<br />&#91;pam_yubico.c:parse_cfg(785)&#93; token_id_length=12<br />&#91;pam_yubico.c:parse_cfg(786)&#93; mode=client<br />&#91;pam_yubico.c:parse_cfg(787)&#93; chalresp_path=(null)<br />&#91;pam_yubico.c:pam_sm_authenticate(829)&#93; get user returned: root<br />&#91;pam_yubico.c:pam_sm_authenticate(972)&#93; conv returned 53 bytes<br />&#91;pam_yubico.c:pam_sm_authenticate(990)&#93; Skipping first 9 bytes. Length is 53, token_id set to 12 and token OTP always 32.<br />&#91;pam_yubico.c:pam_sm_authenticate(997)&#93; OTP: vvuficteuultktdbfeuhguguvivcldjeugtrbrndfliv ID: vvuficteuult<br />&#91;pam_yubico.c:pam_sm_authenticate(1012)&#93; Extracted a probable system password entered before the OTP - setting item PAM_AUTHTOK<br />&#91;pam_yubico.c:pam_sm_authenticate(1028)&#93; ykclient return value (2): Yubikey OTP was replayed (REPLAYED_OTP)<br />&#91;pam_yubico.c:pam_sm_authenticate(1089)&#93; done. &#91;Authentication failure&#93;<br /></div><br /><br /><strong>Authentication failure.</strong><br /><br />Another login fails but the log says:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">&#91;pam_yubico.c:parse_cfg(764)&#93; called.<br />&#91;pam_yubico.c:parse_cfg(765)&#93; flags 1 argc 4<br />&#91;pam_yubico.c:parse_cfg(767)&#93; argv&#91;0&#93;=id=1<br />&#91;pam_yubico.c:parse_cfg(767)&#93; argv&#91;1&#93;=urllist=http://hajvmyk01:8000/wsapi/2.0/verify;http://hajvmyk01:8002/wsapi/2.0/verify<br />&#91;pam_yubico.c:parse_cfg(767)&#93; argv&#91;2&#93;=authfile=/etc/yubikey_mappings/authorized_yubikeys<br />&#91;pam_yubico.c:parse_cfg(767)&#93; argv&#91;3&#93;=debug<br />&#91;pam_yubico.c:parse_cfg(768)&#93; id=1<br />&#91;pam_yubico.c:parse_cfg(769)&#93; key=(null)<br />&#91;pam_yubico.c:parse_cfg(770)&#93; debug=1<br />&#91;pam_yubico.c:parse_cfg(771)&#93; alwaysok=0<br />&#91;pam_yubico.c:parse_cfg(772)&#93; verbose_otp=0<br />&#91;pam_yubico.c:parse_cfg(773)&#93; try_first_pass=0<br />&#91;pam_yubico.c:parse_cfg(774)&#93; use_first_pass=0<br />&#91;pam_yubico.c:parse_cfg(775)&#93; authfile=/etc/yubikey_mappings/authorized_yubikeys<br />&#91;pam_yubico.c:parse_cfg(776)&#93; ldapserver=(null)<br />&#91;pam_yubico.c:parse_cfg(777)&#93; ldap_uri=(null)<br />&#91;pam_yubico.c:parse_cfg(778)&#93; ldapdn=(null)<br />&#91;pam_yubico.c:parse_cfg(779)&#93; user_attr=(null)<br />&#91;pam_yubico.c:parse_cfg(780)&#93; yubi_attr=(null)<br />&#91;pam_yubico.c:parse_cfg(781)&#93; yubi_attr_prefix=(null)<br />&#91;pam_yubico.c:parse_cfg(782)&#93; url=(null)<br />&#91;pam_yubico.c:parse_cfg(783)&#93; urllist=http://hajvmyk01:8000/wsapi/2.0/verify;http://hajvmyk01:8002/wsapi/2.0/verify<br />&#91;pam_yubico.c:parse_cfg(784)&#93; capath=(null)<br />&#91;pam_yubico.c:parse_cfg(785)&#93; token_id_length=12<br />&#91;pam_yubico.c:parse_cfg(786)&#93; mode=client<br />&#91;pam_yubico.c:parse_cfg(787)&#93; chalresp_path=(null)<br />&#91;pam_yubico.c:pam_sm_authenticate(829)&#93; get user returned: root<br />&#91;pam_yubico.c:pam_sm_authenticate(972)&#93; conv returned 53 bytes<br />&#91;pam_yubico.c:pam_sm_authenticate(990)&#93; Skipping first 9 bytes. Length is 53, token_id set to 12 and token OTP always 32.<br />&#91;pam_yubico.c:pam_sm_authenticate(997)&#93; OTP: vvuficteuultdgngcbedjirtfuncljkinvjjktktuccc ID: vvuficteuult<br />&#91;pam_yubico.c:pam_sm_authenticate(1012)&#93; Extracted a probable system password entered before the OTP - setting item PAM_AUTHTOK<br />&#91;pam_yubico.c:pam_sm_authenticate(1028)&#93; ykclient return value (0): Success<br />&#91;pam_yubico.c:authorize_user_token(222)&#93; Using system-wide auth_file /etc/yubikey_mappings/authorized_yubikeys<br />&#91;pam_yubico.c:check_user_token(179)&#93; Authorization line: root:vvuficteuult<br />&#91;pam_yubico.c:check_user_token(183)&#93; Matched user: root<br />&#91;pam_yubico.c:check_user_token(188)&#93; Authorization token: vvuficteuult<br />&#91;pam_yubico.c:check_user_token(191)&#93; Match user/token as root/vvuficteuult<br />&#91;pam_yubico.c:pam_sm_authenticate(1089)&#93; done. &#91;Success&#93;</div><br /><br /><strong>Success.</strong><br /><br />The 3rd try is a little bit strange, it will be timeouted.<br /><br />Log: <br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">&#91;pam_yubico.c:parse_cfg(764)&#93; called.<br />&#91;pam_yubico.c:parse_cfg(765)&#93; flags 1 argc 4<br />&#91;pam_yubico.c:parse_cfg(767)&#93; argv&#91;0&#93;=id=1<br />&#91;pam_yubico.c:parse_cfg(767)&#93; argv&#91;1&#93;=urllist=http://hajvmyk01:8000/wsapi/2.0/verify<br />&#91;pam_yubico.c:parse_cfg(767)&#93; argv&#91;2&#93;=authfile=/etc/yubikey_mappings/authorized_yubikeys<br />&#91;pam_yubico.c:parse_cfg(767)&#93; argv&#91;3&#93;=debug<br />&#91;pam_yubico.c:parse_cfg(768)&#93; id=1<br />&#91;pam_yubico.c:parse_cfg(769)&#93; key=(null)<br />&#91;pam_yubico.c:parse_cfg(770)&#93; debug=1<br />&#91;pam_yubico.c:parse_cfg(771)&#93; alwaysok=0<br />&#91;pam_yubico.c:parse_cfg(772)&#93; verbose_otp=0<br />&#91;pam_yubico.c:parse_cfg(773)&#93; try_first_pass=0<br />&#91;pam_yubico.c:parse_cfg(774)&#93; use_first_pass=0<br />&#91;pam_yubico.c:parse_cfg(775)&#93; authfile=/etc/yubikey_mappings/authorized_yubikeys<br />&#91;pam_yubico.c:parse_cfg(776)&#93; ldapserver=(null)<br />&#91;pam_yubico.c:parse_cfg(777)&#93; ldap_uri=(null)<br />&#91;pam_yubico.c:parse_cfg(778)&#93; ldapdn=(null)<br />&#91;pam_yubico.c:parse_cfg(779)&#93; user_attr=(null)<br />&#91;pam_yubico.c:parse_cfg(780)&#93; yubi_attr=(null)<br />&#91;pam_yubico.c:parse_cfg(781)&#93; yubi_attr_prefix=(null)<br />&#91;pam_yubico.c:parse_cfg(782)&#93; url=(null)<br />&#91;pam_yubico.c:parse_cfg(783)&#93; urllist=http://hajvmyk01:8000/wsapi/2.0/verify<br />&#91;pam_yubico.c:parse_cfg(784)&#93; capath=(null)<br />&#91;pam_yubico.c:parse_cfg(785)&#93; token_id_length=12<br />&#91;pam_yubico.c:parse_cfg(786)&#93; mode=client<br />&#91;pam_yubico.c:parse_cfg(787)&#93; chalresp_path=(null)<br />&#91;pam_yubico.c:pam_sm_authenticate(829)&#93; get user returned: root<br />&#91;pam_yubico.c:pam_sm_authenticate(972)&#93; conv returned 53 bytes<br />&#91;pam_yubico.c:pam_sm_authenticate(990)&#93; Skipping first 9 bytes. Length is 53, token_id set to 12 and token OTP always 32.<br />&#91;pam_yubico.c:pam_sm_authenticate(997)&#93; OTP: vvuficteuultbjfnlfekbirdgeuejelkjgeekhenhejv ID: vvuficteuult<br />&#91;pam_yubico.c:pam_sm_authenticate(1012)&#93; Extracted a probable system password entered before the OTP - setting item PAM_AUTHTOK<br /></div><br /><br />The urllist parameter has been changed and is not equal to the pam file.<br /><br />Does anybody know of this problems or what I misconfigured?<br /><br />I use Ubuntu 12.04 and the offical yubico ppa packages.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2951">jkroepke</a> — Tue Jul 08, 2014 10:20 am</p><hr />
]]></content>
</entry>
</feed>