<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=5&amp;t=403" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2011-03-03T03:27:58+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=5&amp;t=403</id>
<entry>
<author><name><![CDATA[kai]]></name></author>
<updated>2011-03-03T03:27:58+01:00</updated>
<published>2011-03-03T03:27:58+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=403&amp;p=2599#p2599</id>
<link href="https://forum.yubico.com/viewtopic.php?t=403&amp;p=2599#p2599"/>
<title type="html"><![CDATA[Re: SSH authentication]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=403&amp;p=2599#p2599"><![CDATA[
<div class="quotetitle">rossnick wrote:</div><div class="quotecontent"><br />If I change the sufficient for required, I see :<br /><br /># ssh rossnick@localhost<br />Yubikey for `rossnick':<br />Password:<br />Read from remote host localhost: Connection reset by peer<br />Connection to localhost closed.<br /><br />Logs show me that the yubikey auth worked, and see this :<br /><br />sshd[31293]: Accepted keyboard-interactive/pam for rossnick from 127.0.0.1 port 42127 ssh2<br />sshd[31293]: fatal: PAM: pam_setcred(): Authentication service cannot retrieve user credentials<br /><br />in my secure log.<br /><br />I have ChallengeResponseAuthentication, PasswordAuthentication and UsePAM at yes in my sshd config file. If ChallengeResponseAuthentication is set to no, I did not get a prompt for the yubikey at all.<br /></div><br /><br />I have _exactly_ this problem on Ubuntu 10.10. I've compiled the yubico lib and pam lib from the latest git source. <br /><br />I set up as per the instructions but if I set &quot;auth required&quot; in my pam.d/sshd file and log in, I get the yubikey prompt... followed by my password prompt.. but the second I type in my password I get disconnected and the following error shows up in my /var/log/auth.log: <br /><br />Mar  3 10:15:47 ************ sshd[7537]: fatal: PAM: pam_setcred(): Authentication service cannot retrieve user credentials<br /><br />If I change it to &quot;auth sufficient&quot; in the pam.d/sshd file then it works fine I can log in no problems with just the yubikey and no password prompt. I don't _mind_ using the yubikey as my only auth.. but I would _much_ rather have the two factor of my PW + the yubikey. <br /><br />Any suggestions as to why this is dying with the required option?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1560">kai</a> — Thu Mar 03, 2011 3:27 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[rossnick]]></name></author>
<updated>2010-10-20T18:11:25+01:00</updated>
<published>2010-10-20T18:11:25+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=403&amp;p=2395#p2395</id>
<link href="https://forum.yubico.com/viewtopic.php?t=403&amp;p=2395#p2395"/>
<title type="html"><![CDATA[Re: SSH authentication]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=403&amp;p=2395#p2395"><![CDATA[
I just found a post from  romain, also related to pam, which I first discarded because of kerberose.<br /><br />But, I downloaded those rpms instead and modified a bit the config to use default api servers instead of my own, and now all works well.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1397">rossnick</a> — Wed Oct 20, 2010 6:11 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[rossnick]]></name></author>
<updated>2010-10-20T17:43:39+01:00</updated>
<published>2010-10-20T17:43:39+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=403&amp;p=2394#p2394</id>
<link href="https://forum.yubico.com/viewtopic.php?t=403&amp;p=2394#p2394"/>
<title type="html"><![CDATA[Re: SSH authentication]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=403&amp;p=2394#p2394"><![CDATA[
Hi !<br /><br />I'm new to the yubikey world, I just received mine, and I am starting to play with it.<br /><br />I was able to use pam_yubico.so to authenticate with ssh. But, in sufficient mode only.<br /><br />In this mode, I can login with my yubikey or my password. Either one work.<br /><br />If I change the sufficient for required, I see :<br /><br /># ssh rossnick@localhost<br />Yubikey for `rossnick':<br />Password:<br />Read from remote host localhost: Connection reset by peer<br />Connection to localhost closed.<br /><br />Logs show me that the yubikey auth worked, and see this :<br /><br />sshd[31293]: Accepted keyboard-interactive/pam for rossnick from 127.0.0.1 port 42127 ssh2<br />sshd[31293]: fatal: PAM: pam_setcred(): Authentication service cannot retrieve user credentials<br /><br />in my secure log.<br /><br />I have ChallengeResponseAuthentication, PasswordAuthentication and UsePAM at yes in my sshd config file. If ChallengeResponseAuthentication is set to no, I did not get a prompt for the yubikey at all.<br /><br />Any hints on what I missed ?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1397">rossnick</a> — Wed Oct 20, 2010 5:43 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[romain]]></name></author>
<updated>2010-10-13T10:46:30+01:00</updated>
<published>2010-10-13T10:46:30+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=403&amp;p=2384#p2384</id>
<link href="https://forum.yubico.com/viewtopic.php?t=403&amp;p=2384#p2384"/>
<title type="html"><![CDATA[Re: SSH authentication]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=403&amp;p=2384#p2384"><![CDATA[
superstructure -&gt; some food for thoughts:<br /><br />You can &quot;force&quot; Yubikeys for external users with this line at the beginning of your PAM configuration file for SSH:<br /><br /># Enable Yubikey authentication for the users listed in /etc/external_users<br />auth      [success=1 new_authtok_reqd=ok default=ignore]   pam_listfile.so item=user sense=deny file=/etc/external_users onerr=fail<br /><br />(It will tell PAM to skip the next line in the file, which should be where pam_yubico is called, for users NOT listed in external_users. ie: users in the external_users file must use Yubikeys.)<br /><br />You then need to set &quot;ChallengeResponseAuthentication Yes&quot; in SSH to move password authentication from the &quot;password&quot; to the &quot;keyboard-interactive&quot; method.<br /><br />Finally, you must disable SSH Public key authentication altogether. It's unfortunate, but this authentication method is handled by SSH internally, and if it is successful, PAM will not be called, effectively disabling multifactor authentication.<br /><br />HTH,<br />Romain.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1368">romain</a> — Wed Oct 13, 2010 10:46 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[superstructure]]></name></author>
<updated>2010-03-29T15:13:57+01:00</updated>
<published>2010-03-29T15:13:57+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=403&amp;p=2150#p2150</id>
<link href="https://forum.yubico.com/viewtopic.php?t=403&amp;p=2150#p2150"/>
<title type="html"><![CDATA[Re: SSH authentication]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=403&amp;p=2150#p2150"><![CDATA[
OK, we have a very similar problem.<br /><br />We have a system running opensuse 10.3 that is configured to allow external users access to our internal network. At present this is using Aladdin secure usb tokens for standard public key access vis ssh.<br /><br />I have configured another sshd daemon, running on a different port, for use for access with yubikeys.<br /><br />The question I have is how to configure the pam set up to allow for mixed access.<br /><br />Internal users have to be able to connect to this machine via ssh with standard password authentication.<br />External users need to be able to continue to connect via ssh with standard public key and password acccess and also users with yubikey need ssh access with 2 factor authentication. <!-- l --><a class="postlink-local" href="http://forum.yubico.com/posting.php?mode=reply&amp;f=5&amp;t=403&amp;sid=7efc8d0782cc48c526af1c50a99a3951#">posting.php?mode=reply&amp;f=5&amp;t=403&amp;sid=7efc8d0782cc48c526af1c50a99a3951#</a><!-- l --><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1146">superstructure</a> — Mon Mar 29, 2010 3:13 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[betrunkenaffe]]></name></author>
<updated>2009-11-09T18:17:10+01:00</updated>
<published>2009-11-09T18:17:10+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=403&amp;p=1861#p1861</id>
<link href="https://forum.yubico.com/viewtopic.php?t=403&amp;p=1861#p1861"/>
<title type="html"><![CDATA[Re: SSH authentication]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=403&amp;p=1861#p1861"><![CDATA[
Okay, solved my problem.<br /><br />After watching this video (about half way): <!-- m --><a class="postlink" href="http://www.cruzinthegalaxie.com/how-to-setup-yubikey-ssh-on-fedora/">http://www.cruzinthegalaxie.com/how-to- ... on-fedora/</a><!-- m --><br /><br />I realized that the PasswordAuthentication no which was set on my ssh server isn't the default value, I changed that to yes and now the single factor authentication works.<br /><br />Another note for anyone trying to set this up: Read the instructions fully, I ran into a few issues because I skipped steps without realizing it. <br /><br />You'll need your id if you are authenticating against Yubico's servers, see -&gt; <!-- m --><a class="postlink" href="http://yubico.com/developers/api/">http://yubico.com/developers/api/</a><!-- m --><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=944">betrunkenaffe</a> — Mon Nov 09, 2009 6:17 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[betrunkenaffe]]></name></author>
<updated>2009-11-09T08:48:32+01:00</updated>
<published>2009-11-09T08:48:32+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=403&amp;p=1860#p1860</id>
<link href="https://forum.yubico.com/viewtopic.php?t=403&amp;p=1860#p1860"/>
<title type="html"><![CDATA[Re: SSH authentication]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=403&amp;p=1860#p1860"><![CDATA[
ATM, I would be happy with either. I will probably use 2 factor however until 1 factor works, I am unconcerned.<br /><br /><div class="quotetitle">network-marvels wrote:</div><div class="quotecontent"><br />Also, irrespective of single factor or two factor authentication, edit the sshd configuration file “/etc/ssh/sshd_config” to disable challenge-response passwords. Change “challenge-response passwords yes” to “challenge-response passwords no” from the “/etc/ssh/sshd_config” file.<br /><br />We would appreciate if you can make the above mentioned changes and test again.<br /></div><br /><br />I know this one fairly well.<br /><br />ssh 192.168.1.5 -p 32123 -l user<br />Permission denied (publickey).<br /><br />I was seeing many comments that yes was required. I did notice on this pass looking at the logs<br /><br />kcheckpass: pam_unix2(xdm:auth): Unknown option: `try_first_pass`<br />kcheckpass:pam_unix2(xdm:setcred): Unknown option: `try_first_pass`<br />sshd: Received signal 15: terminating<br /><br />I'll look more into that when I wake up again.<br /><br />Thanks.<br /><br />To answer OP: Unless you are running your own authentication server then you will be authorizing off Yubico's. For SSH, that shouldn't be too much of an issue (unless their auth server is down). It sounds like you wanted to do it for your main login, there could be issues with that (since your inet reliability comes into play there as to whether you can use your comp)<br /><br />Someone can correct me if I'm wrong.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=944">betrunkenaffe</a> — Mon Nov 09, 2009 8:48 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[network-marvels]]></name></author>
<updated>2009-11-09T08:01:43+01:00</updated>
<published>2009-11-09T08:01:43+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=403&amp;p=1859#p1859</id>
<link href="https://forum.yubico.com/viewtopic.php?t=403&amp;p=1859#p1859"/>
<title type="html"><![CDATA[Re: SSH authentication]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=403&amp;p=1859#p1859"><![CDATA[
Please let us know if you want to use the Yubico PAM module for two factor authentication or single factor authentication. If you want to use it for two factor then, the top line in the /etc/pam.d/sshd should be:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">auth required pam_yubico.so authfile=/etc/yubikeyauth id=16 debug<br /></div> <br />instead of <br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">auth sufficient pam_yubico.so authfile=/etc/yubikeyauth id=16 debug<br /></div><br /><br />If you want to use it for single factor authentication then the configuration of the pam file is correct.<br /><br />Also, irrespective of single factor or two factor authentication, edit the sshd configuration file “/etc/ssh/sshd_config” to disable challenge-response passwords. Change “challenge-response passwords yes” to “challenge-response passwords no” from the “/etc/ssh/sshd_config” file.<br /><br />We would appreciate if you can make the above mentioned changes and test again.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=280">network-marvels</a> — Mon Nov 09, 2009 8:01 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[betrunkenaffe]]></name></author>
<updated>2009-11-09T05:52:06+01:00</updated>
<published>2009-11-09T05:52:06+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=403&amp;p=1857#p1857</id>
<link href="https://forum.yubico.com/viewtopic.php?t=403&amp;p=1857#p1857"/>
<title type="html"><![CDATA[Re: SSH authentication]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=403&amp;p=1857#p1857"><![CDATA[
I don't want to make another post since I am also having issues with setting up the Yubikey for the SSH server.<br /><br />As per the directions, I compiled all the libraries and moved the pam_yubico.so to /lib/security (if I need to move others, please let me know, instructions didn't state any others needed to move).<br /><br />I have set it up in /etc/pam.d/sshd at the top as follows:<br /><br />auth sufficient pam_yubico.so authfile=/etc/yubikeyauth id=16 debug<br /><br />I created the file /etc/yubikeyauth with the username:id pair I am testing with.<br /><br />I am using OpenSuse 11.1 so it appears I need to change /etc/pam.d/common-auth to include try_first_pass however it uses pam_unix2.so not pam_unix.so (I did swap to pam_unix.so but didn't solve issue so changed back)<br /><br />I do have ChallengeResponseAuthentication yes set as well. When I try to connect using SSH I get the following:<br /><br />ssh 192.168.1.5 -p 32123 -l user<br />Yubikey for `user':<br />Read from remote host 192.168.1.5: Connection reset by peer<br />Connection to 192.168.1.5 closed.<br /><br />In case this makes a difference, I'm using a 64 bit machine  on the client side however the server side is 32 bit. I have not installed any PAM modules or libraries on the client machine either.<br /><br />Any suggestions for resolving?<br /><br />Thank you.<br /><br /><strong>UPDATE:</strong> It appears that sshd is segfaulting. Looking into it, there is a known issue with servers running 64 bit doing this however I am running 32 bit on the server and 64 bit on the client, could that cause it? My search continues<br /><br />sshd  : segfault at 11 ip b72a770b sp bfe12928 error 4 in libc-2.9.so...<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=944">betrunkenaffe</a> — Mon Nov 09, 2009 5:52 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[iw2lsi]]></name></author>
<updated>2009-09-11T09:41:42+01:00</updated>
<published>2009-09-11T09:41:42+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=403&amp;p=1759#p1759</id>
<link href="https://forum.yubico.com/viewtopic.php?t=403&amp;p=1759#p1759"/>
<title type="html"><![CDATA[Re: SSH authentication]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=403&amp;p=1759#p1759"><![CDATA[
Hello<br /><br />first of all, thanks for your help<br /><br />I've setup my authfile but it seems not to work...<br /><br />anyway... I have another doubt... what's the  id record that appear in the line:<br /><br />   auth sufficient pam_yubico.so id=16 debug authfile=/etc/yubico<br /><br />for ???<br /><br />if I'm not wrong, it's related to the yubico autentication server... but... do my machine need<br />to be always on-line, then ? what's if my network is down and/or yubico server is not reachable ?<br /><br />  best regards<br /><br />                Paolo<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=858">iw2lsi</a> — Fri Sep 11, 2009 9:41 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[network-marvels]]></name></author>
<updated>2009-09-11T08:07:03+01:00</updated>
<published>2009-09-11T08:07:03+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=403&amp;p=1757#p1757</id>
<link href="https://forum.yubico.com/viewtopic.php?t=403&amp;p=1757#p1757"/>
<title type="html"><![CDATA[Re: SSH authentication]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=403&amp;p=1757#p1757"><![CDATA[
Please visit the following link which provides step by step guide for configuring the Yubico PAM module for SSH:<br /><br /><!-- m --><a class="postlink" href="http://code.google.com/p/yubico-pam/wiki/YubikeyAndSSHViaPAM">http://code.google.com/p/yubico-pam/wik ... dSSHViaPAM</a><!-- m --><br /><br />The ID that needs to be stored in the authfile is the YubiKey ID i.e first 12 characters of the OTP generated from the YubiKey. <br />For example: The YubiKey ID of the YubiKey generating the following OTP will be &quot;vvjgngudlbfe&quot;:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">vvjgngudlbfehlnlbficbhkkdifnlkbbretelidlujbi<br /></div><br /><br />We hope this helps!<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=280">network-marvels</a> — Fri Sep 11, 2009 8:07 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[iw2lsi]]></name></author>
<updated>2009-09-10T15:46:17+01:00</updated>
<published>2009-09-10T15:46:17+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=403&amp;p=1753#p1753</id>
<link href="https://forum.yubico.com/viewtopic.php?t=403&amp;p=1753#p1753"/>
<title type="html"><![CDATA[SSH authentication]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=403&amp;p=1753#p1753"><![CDATA[
Hi all<br /><br />  I'm totally new to yubikeys and I'm trying to set my linux box to use them for login...<br />  I've setup my  /etc/pam.d/sshd and  /etc/ssh/sshd_config for PAM auth<br />  but I don't understand how to setup my authfile: <br /><br />  authfile format should be:<br /><br />    user:id:id<br /><br />   but... what's id ?  how can I get it ?<br /><br />       thanks<br /><br />              Paolo<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=858">iw2lsi</a> — Thu Sep 10, 2009 3:46 pm</p><hr />
]]></content>
</entry>
</feed>