<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=23&amp;t=2614" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2017-03-30T23:57:43+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=23&amp;t=2614</id>
<entry>
<author><name><![CDATA[mattlegitt]]></name></author>
<updated>2017-03-30T23:57:43+01:00</updated>
<published>2017-03-30T23:57:43+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9526#p9526</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9526#p9526"/>
<title type="html"><![CDATA[Re: Ubuntu MFA SSH login is not working]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9526#p9526"><![CDATA[
Hello Pradeep,<br /><br />Please go to the following linked page and test your OTP credential. if the test fails you'll need to re-program your YubiKey with the previous linked documentation and upload to YubiCloud.<br /><br /><!-- m --><a class="postlink" href="https://demo.yubico.com/">https://demo.yubico.com/</a><!-- m --><br /><br />Best Regards,<br />Matthew<br />Yubico Support<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4123">mattlegitt</a> — Thu Mar 30, 2017 11:57 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[pradeepverizon]]></name></author>
<updated>2017-03-30T20:47:27+01:00</updated>
<published>2017-03-30T20:47:27+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9525#p9525</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9525#p9525"/>
<title type="html"><![CDATA[Re: Ubuntu MFA SSH login is not working]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9525#p9525"><![CDATA[
I am getting below error in auth.log<br /><br />Mar 30 15:45:06 ubuntu-14 sshd[12715]: PAM unable to dlopen(pam_yubico.so): /usr/lib/x86_64-linux-gnu/libykclient.so.3: version `YKCLIENT_2.15' not found (required by /lib/security/pam_yubico.so)<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4752">pradeepverizon</a> — Thu Mar 30, 2017 8:47 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[pradeepverizon]]></name></author>
<updated>2017-03-30T14:44:37+01:00</updated>
<published>2017-03-30T14:44:37+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9522#p9522</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9522#p9522"/>
<title type="html"><![CDATA[Re: Ubuntu MFA SSH login is not working]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9522#p9522"><![CDATA[
Hi Matthew,<br /><br /> Basically we are evaluating Yubikey for out team. We servers spread across two subnet . I am pushing this configuration in servers in both subnet using configuration management tool.In one subnet it is working fine. But the servers in other subnet it is not.<br /><br />Thanks,<br />Pradeep<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4752">pradeepverizon</a> — Thu Mar 30, 2017 2:44 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[mattlegitt]]></name></author>
<updated>2017-03-30T02:24:30+01:00</updated>
<published>2017-03-30T02:24:30+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9519#p9519</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9519#p9519"/>
<title type="html"><![CDATA[Re: Ubuntu MFA SSH login is not working]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9519#p9519"><![CDATA[
Hello pradeepverizon,<br /><br />Are you using an internal validation service? if not the OTP ID is not a factory Yubico OTP ID and will not work with our validation service. Please follow the linked page to upload your OTP ID to the validation server. if you need further assistance I recommend creating a support ticket. (<!-- m --><a class="postlink" href="https://www.yubico.com/support/raise-ticket/">https://www.yubico.com/support/raise-ticket/</a><!-- m -->)<br /><br /><!-- m --><a class="postlink" href="https://www.yubico.com/support/knowledge-base/categories/articles/yubikey-yubicloud-configuration-guide/">https://www.yubico.com/support/knowledg ... ion-guide/</a><!-- m --><br /><br />Best Regards,<br />Matthew<br />Yubico Support<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4123">mattlegitt</a> — Thu Mar 30, 2017 2:24 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[pradeepverizon]]></name></author>
<updated>2017-03-29T21:56:24+01:00</updated>
<published>2017-03-29T21:56:24+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9518#p9518</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9518#p9518"/>
<title type="html"><![CDATA[Re: Ubuntu MFA SSH login is not working]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9518#p9518"><![CDATA[
While trying to dig more into the logs, i got he error message from pam logs. here is the error i am getting<br /><br /><ul> <br />[../pam_yubico.c:parse_cfg(782)] mode=client<br />[../pam_yubico.c:parse_cfg(783)] chalresp_path=(null)<br />[../pam_yubico.c:pam_sm_authenticate(823)] get user returned: pradeep.cg<br />[../pam_yubico.c:pam_sm_authenticate(929)] conv returned 44 bytes<br />[../pam_yubico.c:pam_sm_authenticate(947)] Skipping first 0 bytes. Length is 44, token_id set to 12 and token OTP always 32.<br />[../pam_yubico.c:pam_sm_authenticate(954)] OTP: ccfdssaseltdfetbdtkulcefrnfuddbnvtftjjhkltegb ID: ccfdssaselt<br />[../pam_yubico.c:pam_sm_authenticate(985)] ykclient return value (101): Could not parse server response<br />[../pam_yubico.c:pam_sm_authenticate(1038)] done. [Authentication service cannot retrieve authentication info]<br />[../pam_yubico.c:parse_cfg(761)] called.<br /></ul><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4752">pradeepverizon</a> — Wed Mar 29, 2017 9:56 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[pradeepverizon]]></name></author>
<updated>2017-03-29T18:12:24+01:00</updated>
<published>2017-03-29T18:12:24+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9517#p9517</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9517#p9517"/>
<title type="html"><![CDATA[Ubuntu MFA SSH login is not working]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2614&amp;p=9517#p9517"><![CDATA[
Hi,<br />We are configuring yubikey multi-factor authentication for SSH on Ubuntu Server. Our server version is<br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />Linux ubuntu-14 4.2.0-27-generic #32~14.04.1-Ubuntu SMP Fri Jan 22 15:32:26 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux<br /></div><br />We are using OpenSSH <div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.6, OpenSSL 1.0.1f 6 Jan 2014<br /></div><br />My issue is when i try to login in , i am able to login into my ubuntu box using yubikey.I am not able to see any usefull logs.<br /><br />1./etc/ssh/sshd_conf<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">## This configuration file is generated using ansible. Please do not make any changes manually<br />## If you need to make any changes , please contact &quot;Atlassian.Tools.Team@verizon.com&quot;<br /><br />Port 22<br />ListenAddress 0.0.0.0<br />Protocol 2<br />HostKey /etc/ssh/ssh_host_rsa_key<br />HostKey /etc/ssh/ssh_host_dsa_key<br />HostKey /etc/ssh/ssh_host_ecdsa_key<br />HostKey /etc/ssh/ssh_host_ed25519_key<br /><br />UsePrivilegeSeparation yes<br />KeyRegenerationInterval 3600<br />ServerKeyBits 1024<br />SyslogFacility AUTH<br />LogLevel INFO<br />LoginGraceTime 120<br />PermitRootLogin without-password<br />StrictModes yes<br />RSAAuthentication yes<br />PubkeyAuthentication yes<br />IgnoreRhosts yes<br />RhostsRSAAuthentication no<br />HostbasedAuthentication no<br />PermitEmptyPasswords no<br />PasswordAuthentication no<br />X11DisplayOffset 10<br />PrintMotd no<br />PrintLastLog yes<br />TCPKeepAlive yes<br />Banner /etc/issue.net<br />AcceptEnv LANG LC_*<br />Subsystem sftp /usr/lib/openssh/sftp-server<br />UsePAM yes<br />ChallengeResponseAuthentication yes<br />Match User appuser1,appuser2<br />        AuthenticationMethods publickey<br />Match User supportuser1,supportuser2<br />        AuthenticationMethods publickey,keyboard-interactive<br />        PasswordAuthentication no<br /></div><br />2. /etc/pam.d/sshd<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent"># PAM configuration for the Secure Shell service<br /><br /># Standard Un*x authentication.<br />#@include common-auth<br />auth sufficient pam_yubico.so id=65324 key=owZVX2FHJKD43432qYnkk00= debug authfile=/etc/yubikey_mappings mode=client<br /># Disallow non-root logins when /etc/nologin exists.<br />account    required     pam_nologin.so<br /><br /># Uncomment and edit /etc/security/access.conf if you need to set complex<br /># access limits that are hard to express in sshd_config.<br /># account  required     pam_access.so<br /><br /># Standard Un*x authorization.<br />@include common-account<br /><br /># SELinux needs to be the first session rule.  This ensures that any<br /># lingering context has been cleared.  Without this it is possible that a<br /># module could execute code in the wrong domain.<br />session &#91;success=ok ignore=ignore module_unknown=ignore default=bad&#93;        pam_selinux.so close<br /><br /># Set the loginuid process attribute.<br />session    required     pam_loginuid.so<br /><br /># Create a new session keyring.<br />session    optional     pam_keyinit.so force revoke<br /><br /># Standard Un*x session setup and teardown.<br />@include common-session<br /><br /># Print the message of the day upon successful login.<br /># This includes a dynamically generated part from /run/motd.dynamic<br /># and a static (admin-editable) part from /etc/motd.<br />session    optional     pam_motd.so  motd=/run/motd.dynamic<br />session    optional     pam_motd.so noupdate<br /><br /># Print the status of the user's mailbox upon successful login.<br />session    optional     pam_mail.so standard noenv # &#91;1&#93;<br /># Print the message of the day upon successful login.<br /># This includes a dynamically generated part from /run/motd.dynamic<br /># and a static (admin-editable) part from /etc/motd.<br />session    optional     pam_motd.so  motd=/run/motd.dynamic<br />session    optional     pam_motd.so noupdate<br /><br /># Print the status of the user's mailbox upon successful login.<br />session    optional     pam_mail.so standard noenv # &#91;1&#93;<br /><br /># Set up user limits from /etc/security/limits.conf.<br />session    required     pam_limits.so<br /><br /># Read environment variables from /etc/environment and<br /># /etc/security/pam_env.conf.<br />session    required     pam_env.so # &#91;1&#93;<br /># In Debian 4.0 (etch), locale-related environment variables were moved to<br /># /etc/default/locale, so read that as well.<br />session    required     pam_env.so user_readenv=1 envfile=/etc/default/locale<br /><br /># SELinux needs to intervene at login time to ensure that the process starts<br /># in the proper default security context.  Only sessions which are intended<br /># to run in the user's context should be run after this.<br />session &#91;success=ok ignore=ignore module_unknown=ignore default=bad&#93;        pam_selinux.so open<br /><br /># Standard Un*x password updating.<br />@include common-password<br /><br /></div><br />3.<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">supportuser1:xxxxxxx<br />supportuser1:xxxxxxx<br />supportuser1:xxxxxxx<br />supportuser1:XXXXXXXX<br /></div><br />The output when try to login to the server is <br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">#ssh -vvv -i server_ssh supportuser1@192.168.1.10<br />Ubuntu 14.04.4 LTS<br />debug1: Authentications that can continue: publickey<br />debug3: start over, passed a different list publickey<br />debug3: preferred publickey,keyboard-interactive,password<br />debug3: authmethod_lookup publickey<br />debug3: remaining preferred: keyboard-interactive,password<br />debug3: authmethod_is_enabled publickey<br />debug1: Next authentication method: publickey<br />debug1: Offering RSA public key: cardno:0007913443<br />debug3: send_pubkey_test<br />debug2: we sent a publickey packet, wait for reply<br />debug1: Authentications that can continue: publickey<br />debug1: Offering RSA public key: server_ssh<br />debug3: send_pubkey_test<br />debug2: we sent a publickey packet, wait for reply<br />debug1: Server accepts key: pkalg ssh-rsa blen 151<br />debug2: input_userauth_pk_ok: fp SHA256:SyXJ6CI+QNIId+ewelZUznt/HAuqGyDqUp5QHQ438vM<br />debug3: sign_and_send_pubkey: RSA SHA256:SyXJ6CI+QNIId+ewelZUznt/HAuqGyDqUp5QHQ438vM<br />Authenticated with partial success.<br />debug2: key: cardno:000605483812 (0x7fcf086007e0),<br />debug2: key: server_ssh (0x0), explicit<br />debug1: Authentications that can continue: keyboard-interactive<br />debug3: start over, passed a different list keyboard-interactive<br />debug3: preferred publickey,keyboard-interactive,password<br />debug3: authmethod_lookup keyboard-interactive<br />debug3: remaining preferred: password<br />debug3: authmethod_is_enabled keyboard-interactive<br />debug1: Next authentication method: keyboard-interactive<br />debug2: userauth_kbdint<br />debug2: we sent a keyboard-interactive packet, wait for reply<br />debug2: input_userauth_info_req<br />debug2: input_userauth_info_req: num_prompts 1<br />YubiKey for `supportuser1':<br />debug1: Authentications that can continue: keyboard-interactive<br />debug2: userauth_kbdint<br />debug2: we sent a keyboard-interactive packet, wait for reply<br />debug2: input_userauth_info_req<br />debug2: input_userauth_info_req: num_prompts 1<br /></div><br />And Debug Auth Logs Says<br /><ul>Mar 29 13:07:55 ubuntu-14 sshd[3123]: error: PAM: Permission denied for supportuser1  from 10.10.3.6<br />Mar 29 13:07:55 ubuntu-14 sshd[3123]: Postponed keyboard-interactive for supportuser1 from 10.10.3.6 port 60260 ssh2 [preauth]</ul><br /><br />Could you please help me to resolve this issue<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4752">pradeepverizon</a> — Wed Mar 29, 2017 6:12 pm</p><hr />
]]></content>
</entry>
</feed>