<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=4&amp;t=191" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2011-02-04T10:48:38+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=4&amp;t=191</id>
<entry>
<author><name><![CDATA[jimrippon]]></name></author>
<updated>2011-02-04T10:48:38+01:00</updated>
<published>2011-02-04T10:48:38+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=2547#p2547</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=2547#p2547"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=2547#p2547"><![CDATA[
The process to generate a Client ID has changed since Jonix's entry above regarding YMS.  Shamelessly copy-and-pasted from my reply this morning from yubico, this is the procedure you need to follow to generate a Client ID currently:<br /><br />The Client ID aka Auth_ID is required for API Key. The API key is a symmetric key aimed at protecting the communication (creating a hash signature) on packets between the client and the Yubico Online Validation Service. When generating the key an API ID (also called a Client ID) is also generated at the same time and this ID is sent by the client to the server in the authentication request and acts as a reference for the Validation Service to find the right API key in the database to create a signature when sending the authentication (response) result back to the to the (dot net) client.<br /><br />The key is simply generated from any YubiKey that you have. Follow the link <!-- m --><a class="postlink" href="https://upgrade.yubico.com/getapikey/">https://upgrade.yubico.com/getapikey/</a><!-- m --> and enter a valid email address (mainly used as an internal reference in the database) and an OTP from one of the YubiKeys you received. The result page will show the generated Client ID (API ID) and the generated API key (Secret Key). Make a record of both and use these two values in corresponding libraries and modules. Wait 5 to 10 minutes after generating the key before testing so that the API key will be updated on all the servers in the Yubico Online Validation Service backend.<br /><br />Hope this helps <img src="https://forum.yubico.com/images/smilies/icon_e_smile.gif" alt=":)" title="Smile" /><br /><br />Jim<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1527">jimrippon</a> — Fri Feb 04, 2011 10:48 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[samir]]></name></author>
<updated>2010-11-16T14:11:07+01:00</updated>
<published>2010-11-16T14:11:07+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=2446#p2446</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=2446#p2446"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=2446#p2446"><![CDATA[
Thank you for creating the Patch! We appreciate your efforts to make the Yubico PAM more robust and useful!<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1076">samir</a> — Tue Nov 16, 2010 2:11 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[gsreynolds]]></name></author>
<updated>2010-11-16T19:58:26+01:00</updated>
<published>2010-11-16T13:47:26+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=2445#p2445</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=2445#p2445"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=2445#p2445"><![CDATA[
Just noticed an errant line in the above code.<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">      char *userfile = NULL;<br />      authfile = get_userfile(username);<br />      free(authfile);</div><br /><br />should just be <br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">      authfile = get_userfile(username);<br /></div><br /><br />Copy &amp; paste oversight...<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1441">gsreynolds</a> — Tue Nov 16, 2010 1:47 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[gsreynolds]]></name></author>
<updated>2010-11-16T19:59:01+01:00</updated>
<published>2010-11-16T13:40:27+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=2444#p2444</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=2444#p2444"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=2444#p2444"><![CDATA[
<div class="quotetitle">samir wrote:</div><div class="quotecontent"><br />Yubico PAM module does not currently support selective two or single factor authentication based on specific user IDs (only two factor authentication is supported for all users). Supporting this functionality is currently on Yubico's roadmap.<br /><br />However, if you can make some simple changes to the Yubico PAM module then it would be possible to use the same Yubico PAM module to authenticate selective users based on Yubikey bindings i.e. if a user has YubiKey assigned, then it would require 2 factor auth. otherwise only user name and password will be sufficient to authenticate.<br /> <br />The changes are needed to be made in the logic where the Yubico PAM module looks for the YubiKey ID and Username  binding. If no YubiKey ID and Username binding found for a user, then the Yubico PAM module should skip all checks and send the success signal to the underlying PAM modules.<br /><br />We hope this helps!<br /></div><br />Hi there,<br /><br />Based on your suggestion I've created a patch for pam_yubico.c<br /><br />Changelog<br /><ul><li>Added a check_user_in_auth_file function which is just check_user_token but with only the username checking, no token checking. This is called near the beginning of pam_sm_authenticate. </li><li>Moved user auth file path code from authorize_user_token to a new function get_userfile. This was so I could reuse it in check_user_in_auth_file.</li></ul><br />New code in pam_sm_authenticate<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">  if (check_user_in_auth_file(cfg.auth_file, user) == 0)<br />    {<br />      DBG ((&quot;user not in auth file: %s&quot;, user));<br />      /* If user is not in auth file, skip all checks<br />       and send the success signal to the underlying PAM modules.<br />       Authentication will continue using the underlying PAM modules. */<br />      retval = PAM_SUCCESS;<br />      goto done;<br />    }</div><br /><br />New functions in pam_yubico<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">/*<br /> * This function will return the file path to the authorized_yubikeys file in the<br /> * users home dir.<br /> */<br />static char*<br />get_userfile(const char *username)<br />{<br />  struct passwd *p;<br />  char *userfile = NULL;<br /><br />  p = getpwnam(username);<br />  if (p)<br />    {<br />      userfile = malloc((p-&gt;pw_dir ? strlen(p-&gt;pw_dir) : 0) + strlen(USERFILE)<br />          + 1);<br />      if (!userfile)<br />        return NULL;<br /><br />      strcpy(userfile, p-&gt;pw_dir);<br />      strcat(userfile, USERFILE);<br />    }<br />  return userfile;<br /><br /><br />}<br /><br />/*<br /> * This function will check if a users name is present in the auth file. It<br /> * will return 0 for no and 1 for yes.<br /> */<br />static int<br />check_user_in_auth_file(const char *authfile, const char *username)<br />{<br />  char buf&#91;1024&#93;;<br />  char *s_user;<br />  int retval = 0;<br />  FILE *opwfile;<br /><br />  if (!authfile)<br />    {<br />      /* Getting file from user home directory<br />       ..... i.e. ~/.yubico/authorized_yubikeys<br />       */<br />       authfile = get_userfile(username);<br />    }<br /><br />  opwfile = fopen(authfile, &quot;r&quot;);<br />  if (opwfile == NULL)<br />    {<br />      D((&quot;Cannot open file: %s&quot;, authfile));<br />      return retval;<br />    }<br /><br />  while (fgets(buf, 1024, opwfile))<br />    {<br />      if (buf&#91;strlen(buf) - 1&#93; == '\n')<br />        buf&#91;strlen(buf) - 1&#93; = '\0';<br />      D((&quot;Authorization line: %s&quot;, buf));<br />      s_user = strtok(buf, &quot;:&quot;);<br />      if (s_user &amp;&amp; strcmp(username, s_user) == 0)<br />        {<br />          D((&quot;Matched user: %s&quot;, s_user));<br />          fclose(opwfile);<br />          return 1;<br />        }<br />    }<br /><br />  fclose(opwfile);<br /><br />  return 0;<br />}</div><br /><br />I've tested this with the /etc/ authfile and it works as expected, though I've not tested with the user auth file - as far as I can see though the code should work for that.<br /><br />Patch against latest version in the pam_yubico SVN is attached in a tar.gz (won't let me attach txt files, disallowed in phpBB config).<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1441">gsreynolds</a> — Tue Nov 16, 2010 1:40 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[samir]]></name></author>
<updated>2010-11-16T10:18:13+01:00</updated>
<published>2010-11-16T10:18:13+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=2443#p2443</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=2443#p2443"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=2443#p2443"><![CDATA[
Yubico PAM module does not currently support selective two or single factor authentication based on specific user IDs (only two factor authentication is supported for all users). Supporting this functionality is currently on Yubico's roadmap.<br /><br />However, if you can make some simple changes to the Yubico PAM module then it would be possible to use the same Yubico PAM module to authenticate selective users based on Yubikey bindings i.e. if a user has YubiKey assigned, then it would require 2 factor auth. otherwise only user name and password will be sufficient to authenticate.<br /> <br />The changes are needed to be made in the logic where the Yubico PAM module looks for the YubiKey ID and Username  binding. If no YubiKey ID and Username binding found for a user, then the Yubico PAM module should skip all checks and send the success signal to the underlying PAM modules.<br /><br />We hope this helps!<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1076">samir</a> — Tue Nov 16, 2010 10:18 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[gsreynolds]]></name></author>
<updated>2010-11-15T12:19:23+01:00</updated>
<published>2010-11-15T12:19:23+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=2442#p2442</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=2442#p2442"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=2442#p2442"><![CDATA[
I followed the above instructions, as well as the wiki article on how to set up Yubikey PAM for SSH and have a fully working system.<br /><br />I have issued myself and 2 other users with Yubikeys, all of us having sudo on our machines. However, for regular users I don't want to give them Yubikeys, they should just be able to login with their username and password.<br /><br />Unfortunately, I have found that users without Yubikeys cannot login, i.e. if they aren't in the /etc/yubikeyid file, they can't login.<br /><br />Is there any way around this?<br /><br />Thanks<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1441">gsreynolds</a> — Mon Nov 15, 2010 12:19 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[displacedtexan]]></name></author>
<updated>2009-07-15T21:59:08+01:00</updated>
<published>2009-07-15T21:59:08+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=1582#p1582</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=1582#p1582"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=1582#p1582"><![CDATA[
I found your post very useful.<br /><br />Eventually, I found my problem corrected by doing the following to my CentOS vmware image:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">Copy the pam_yubico.so module from “/usr/local/lib/security” to “/lib/security”</div><br /><br />Thanks!<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=459">displacedtexan</a> — Wed Jul 15, 2009 9:59 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Jonix]]></name></author>
<updated>2009-02-06T11:52:45+01:00</updated>
<published>2009-02-06T11:52:45+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=1042#p1042</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=1042#p1042"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=1042#p1042"><![CDATA[
Some descriptions of the term:<br /><br /><span style="text-decoration: underline">The magic number 16, AKA Client ID</span><br /><br />In <strong>/etc/pam.d/sshd</strong> <br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">auth required pam_yubico.so authfile=/etc/yubikeyid id=16 debug</div><br /><br />the id variable is your Client ID. To get hold of the Client ID I needed to login to the Yubikey Managing System/YMS hosted by Yubico at URL <a href="https://api.yubico.com/yms/yubi_login.php" class="postlink">https://api.yubico.com/yms/yubi_login.php</a>.<br /><br />Strip the Client- text from the ClientID and use that number in place of 16.<br /><br /><br /><span style="text-decoration: underline">Getting access to Yubikey Management System: </span><br />To actually be able to login to the YMS system I needed to email <!-- e --><a href="mailto:yms@yubico.com">yms@yubico.com</a><!-- e -->, with detailed information of the purchase of my Yubikey  + two sequentallly generated One Time Passwords (OTP) using the same e-mail address I used when I purchased my Yubikey<br /><br />Once there,  the client ID is displayed at the title bar as highlighted in the attached image.<br />8.JPG<br /><br /><br /><span style="text-decoration: underline">The yubikey id file</span><br />In the file <strong>/etc/yubikeyid</strong> you define your system user-name you use which you use when normally logging in. The code after the colon-sign is the first 12 characters of your Yubikey One Time password<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">username:12 characters</div><br /><br /><br /><span style="text-decoration: underline">Actually logging in to the SSH server</span><br />After all configurations are done you may to restart the SSH server. On my debian machine I used sudo /etc/init.d/ssh restart<br /><br />After all that was done I logged in with<br />ssh username@hostname<br /><br />Please observe that when SSH asked me for password, you need to <span style="font-size: 150%; line-height: normal"><strong>first enter your regular password</strong></span> and then press the button on the Yubikey device. For the longest time I only used the OTP to try to authenticate, which got me a permission denied reply.<br /><br /><br /><br /><span style="text-decoration: underline">Debugging</span><br />To see if if the PAM module is working correctly and you have debug enabled in <strong>/etc/pam.d/sshd</strong> you might want to create a world writable log file<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">  <br />  touch /var/run/pam-debug.log <br />  chmod go+w /var/run/pam-debug.log <br /></div><br /><br />After a login attempt: <div class="codetitle"><b>Code:</b></div><div class="codecontent"> cat /var/run/pam-debug.log </div><br /><br />After everything is good I would remove the debug from the  <strong>/etc/pam.d/sshd</strong> file and restart SSH<br /><br />If a single person is helped by this post, then I am very happy... For it has been a quite enfuriating experience to not realize that you need to enter the regular password and the OTP from Yubikey.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=427">Jonix</a> — Fri Feb 06, 2009 11:52 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[timm_tem]]></name></author>
<updated>2008-10-03T16:57:55+01:00</updated>
<published>2008-10-03T16:57:55+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=734#p734</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=734#p734"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=734#p734"><![CDATA[
Thank you for all you help!! Its greatly appriciated as it can be hard to find help!<br /><br />Also glad that I could be of help to further the project!<br /><br /><div class="quotetitle">network-marvels wrote:</div><div class="quotecontent"><br /><ul>1)Copy the pam_yubico.so module from “/usr/local/lib/security” to “/lib/security”<br />2)Edit the sshd configuration file “/etc/ssh/sshd_config” to disable challenge-response passwords. Change “challenge-response passwords yes” to “challenge-response passwords no” from line 47 of  “/etc/ssh/sshd_config”<br /></ul><br /></div><br /><br />interesting that the “challenge-response passwords” is now set to no as the only reason I changed it was because it was something I had to do to get this to work before!?<br /><br />But I am glad we have a fix!<br /><br />Thank you again<br /><br />Tim<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=57">timm_tem</a> — Fri Oct 03, 2008 4:57 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[network-marvels]]></name></author>
<updated>2008-10-03T16:34:35+01:00</updated>
<published>2008-10-03T16:34:35+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=733#p733</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=733#p733"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=733#p733"><![CDATA[
We have downloaded the VMware image uploaded by you. There was a small configuration issue.<br /><br />Please follow these steps to fix the issue:<br /><br /><ul>1)Copy the pam_yubico.so module from “/usr/local/lib/security” to “/lib/security”<br />2)Edit the sshd configuration file “/etc/ssh/sshd_config” to disable challenge-response passwords. Change “challenge-response passwords yes” to “challenge-response passwords no” from line 47 of  “/etc/ssh/sshd_config”<br /></ul><br />Thanks for pointing out this issue! This has helped us to generalize Yubico PAM module configuration to work on more Linux flavors.  We will update the Yubico PAM configuration document on the Google Code site to reflect these changes.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=280">network-marvels</a> — Fri Oct 03, 2008 4:34 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[timm_tem]]></name></author>
<updated>2008-10-03T10:55:24+01:00</updated>
<published>2008-10-03T10:55:24+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=732#p732</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=732#p732"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=732#p732"><![CDATA[
<div class="quotetitle">timm_tem wrote:</div><div class="quotecontent"><br />l<br />...<br />I used putty to ssh to my Yubikey test box <br /><br />    Password: (enter 'password' and touch the hgfujcchbnjg yubikey) <br />...<br />Tim<br /></div><br /><br />So I just wanted also to clarify this bit I type my username press enter then type my password press the yubikey and then the yubikey as such pressed enter on the password line for me?<br /><br />do I understand this correctly?<br /><br />is it not possible to have the username the password then the yubikey as 3 separate things? just for clarity in nothing else?<br /><br />Thank you in advanced <br /><br />Tim<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=57">timm_tem</a> — Fri Oct 03, 2008 10:55 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[timm_tem]]></name></author>
<updated>2008-10-03T10:47:28+01:00</updated>
<published>2008-10-03T10:47:28+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=731#p731</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=731#p731"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=731#p731"><![CDATA[
I did find one difference in my /etc/pam.d/sshd to yours<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent"># Standard Un*x authorization.<br />@include common-account</div><br /><br />In mine was commented out but I uncommented it but still no luck.<br /><br />The error I get every time is.... not sure if this is relevant the &quot;Using keyboard-interactive authentication&quot; <br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">debian:/home/timm#<br />login as: timm<br />Using keyboard-interactive authentication.<br />Password:<br />Access denied</div><br /><br />Thank you again <br /><br />Tim<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=57">timm_tem</a> — Fri Oct 03, 2008 10:47 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[timm_tem]]></name></author>
<updated>2008-10-03T10:29:26+01:00</updated>
<published>2008-10-03T10:29:26+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=730#p730</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=730#p730"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=730#p730"><![CDATA[
Thank you again the Image is avaliable at <a href="http://temsc.co.uk/uploads/Clone_of_Yubikey-PAM.zip" class="postlink">http://temsc.co.uk/uploads/Clone_of_Yubikey-PAM.zip</a> <br /><br />The passwords are root:yubikey and timm:yubikey1234<br /><br />Thank you again I have no more ideas<br /><br />Tim<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=57">timm_tem</a> — Fri Oct 03, 2008 10:29 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[network-marvels]]></name></author>
<updated>2008-10-03T08:03:33+01:00</updated>
<published>2008-10-03T08:03:33+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=729#p729</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=729#p729"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=729#p729"><![CDATA[
We would appreciate if you can upload VMware image. We will download it and try to figure out the problem.<br /><br />Meanwhile, we have tested the Yubico PAM configuration on following test environment:<br /><br /><ul>1)OS Version: Debian GNU/Linux lenny/sid \n \l<br />2)Kernel Version: Linux version 2.6.24-1-686 (Debian 2.6.24-7)<br />3)OpenSSH Version: OpenSSH_5.1p1 Debian-3<br />4)Yubico PAM Version: pam_yubico-1.8<br />5)/etc/pam.d/sshd:<br /># PAM configuration for the Secure Shell service<br /><br />## YubiKey Config<br /># Administrative Level<br />auth required pam_yubico.so authfile=/etc/yubikeyid id=16 debug<br /><br /># Standard Un*x authentication.<br /># Read environment variables from /etc/environment and<br /># /etc/security/pam_env.conf.<br />auth       required     pam_env.so debug # [1]<br /><br /># In Debian 4.0 (etch), locale-related environment variables were moved to<br /># /etc/default/locale, so read that as well.<br />auth       required     pam_env.so envfile=/etc/default/locale debug<br /><br />#@include common-auth<br />@include common-auth<br /><br /># Disallow non-root logins when /etc/nologin exists.<br />account    required     pam_nologin.so<br /><br /># Uncomment and edit /etc/security/access.conf if you need to set complex<br /># access limits that are hard to express in sshd_config.<br /> account  required     pam_access.so<br /><br /># Standard Un*x authorization.<br />@include common-account<br /><br /># Standard Un*x session setup and teardown.<br />@include common-session<br /><br /># Print the message of the day upon successful login.<br />session    optional     pam_motd.so # [1]<br /><br /># Print the status of the user's mailbox upon successful login.<br />session    optional     pam_mail.so standard noenv # [1]<br /><br /># Set up user limits from /etc/security/limits.conf.<br />session    required     pam_limits.so<br /><br /># Set up SELinux capabilities (need modified pam)<br /> session  required     pam_selinux.so multiple<br /><br /># Standard Un*x password updating.<br />@include common-password<br /><br />6)/etc/pam.d/common-auth:<br />#<br /># /etc/pam.d/common-auth - authentication settings common to all services<br />#<br /># This file is included from other service-specific PAM config files,<br /># and should contain a list of the authentication modules that define<br /># the central authentication scheme for use on the system<br /># (e.g., /etc/shadow, LDAP, Kerberos, etc.).  The default is to use the<br /># traditional Unix authentication mechanisms.<br />#<br />auth    required        pam_unix.so try_first_pass nullok_secure debug<br /></ul><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=280">network-marvels</a> — Fri Oct 03, 2008 8:03 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[timm_tem]]></name></author>
<updated>2008-10-02T18:10:48+01:00</updated>
<published>2008-10-02T18:10:48+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=191&amp;p=728#p728</id>
<link href="https://forum.yubico.com/viewtopic.php?t=191&amp;p=728#p728"/>
<title type="html"><![CDATA[Re: Yubikey, SSH and debian]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=191&amp;p=728#p728"><![CDATA[
network-marvels just want to say thank you for your quick response its much appreciated!! As I really want to make this work but I only use debian for my servers so it must work with debian before I can deploy it!! <br /><br />So as you suggested my /etc/pam.d/common-auth now looks like this but there is no change<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">#<br /># /etc/pam.d/common-auth - authentication settings common to all services<br />#<br /># This file is included from other service-specific PAM config files,<br /># and should contain a list of the authentication modules that define<br /># the central authentication scheme for use on the system<br /># (e.g., /etc/shadow, LDAP, Kerberos, etc.).  The default is to use the<br /># traditional Unix authentication mechanisms.<br />#<br />auth    required        pam_unix.so try_first_pass nullok_secure debug</div><br /><br />I rebooted to be sure that everything loaded.<br /><br />I am using VMware so if it a copy of my install would help them I can put it online for download?<br /><br />Any more help would again be greatly appreciated.<br /><br />Thank you<br /><br />Tim<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=57">timm_tem</a> — Thu Oct 02, 2008 6:10 pm</p><hr />
]]></content>
</entry>
</feed>