<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=5&amp;t=174" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2008-09-12T15:36:16+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=5&amp;t=174</id>
<entry>
<author><name><![CDATA[pmk]]></name></author>
<updated>2008-09-12T15:36:16+01:00</updated>
<published>2008-09-12T15:36:16+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=174&amp;p=684#p684</id>
<link href="https://forum.yubico.com/viewtopic.php?t=174&amp;p=684#p684"/>
<title type="html"><![CDATA[Re: Using the latest pam_yubico module]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=174&amp;p=684#p684"><![CDATA[
See below.  By breaking off the password, I mean that the token and password are being separated correctly.<br /><br />Can you post your working config?  Thanks.<br /><br />[pam_yubico.c:pam_sm_authenticate(217)] called.<br />[pam_yubico.c:pam_sm_authenticate(218)] flags 1 argc 2<br />[pam_yubico.c:pam_sm_authenticate(220)] argv[0]=id=269<br />[pam_yubico.c:pam_sm_authenticate(220)] argv[1]=debug<br />[pam_yubico.c:pam_sm_authenticate(221)] id=269<br />[pam_yubico.c:pam_sm_authenticate(222)] debug=1<br />[pam_yubico.c:pam_sm_authenticate(223)] alwaysok=0<br />[pam_yubico.c:pam_sm_authenticate(224)] authfile=(null)<br />[pam_yubico.c:pam_sm_authenticate(235)] get user returned: modus<br />[pam_yubico.c:pam_sm_authenticate(245)] get password returned: (null)<br />[pam_yubico.c:pam_sm_authenticate(275)] conv returned: [password]bcbtkuvenfnhugcggjhctrcclhuvcfiebcfjvdljjggj<br />[pam_yubico.c:pam_sm_authenticate(321)]  Token is : bcbtkuvenfnhugcggjhctrcclhuvcfiebcfjvdljjggj and password is [password]<br />[pam_yubico.c:pam_sm_authenticate(322)]  Token ID is: bcbtkuvenfnh <br />[pam_yubico.c:check_user_token(112)] Got user record :: modus:bcbtkuvenfnh<br />[pam_yubico.c:check_user_token(119)] Token Found :: bcbtkuvenfnh<br />[pam_yubico.c:pam_sm_authenticate(356)] libyubikey-client return value (0): Success<br />[pam_yubico.c:pam_sm_authenticate(377)] done. [Success]<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=213">pmk</a> — Fri Sep 12, 2008 3:36 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[paul]]></name></author>
<updated>2008-09-11T23:40:56+01:00</updated>
<published>2008-09-11T23:40:56+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=174&amp;p=680#p680</id>
<link href="https://forum.yubico.com/viewtopic.php?t=174&amp;p=680#p680"/>
<title type="html"><![CDATA[Re: Using the latest pam_yubico module]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=174&amp;p=680#p680"><![CDATA[
<div class="quotetitle">pmk wrote:</div><div class="quotecontent"><br />Simon:<br /><br />I've been unable to make the multifactor in pam_yubico_1.7 work correctly.  With the auth section of my /etc/pam.d/sshd setup like this:<br /><br />auth       required   /usr/local/lib/security/pam_yubico.so id=269 debug<br />auth       required   pam_stack.so service=system-auth<br /><br />Authentication requests always fail.  pam-debug.log shows that the password is being properly broken off from the token and that the token auth is working fine.  But the login never succeeds.<br /><br />What was your guys' two-factor test setup?<br /></div><br /><br />Hi, pmk, can you share the pam-debug.log and explain what do you mean by password broken off? Someone here in Yubico will be helping on this issue asap.<br /><br />Thanks<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=55">paul</a> — Thu Sep 11, 2008 11:40 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[pmk]]></name></author>
<updated>2008-09-02T14:50:15+01:00</updated>
<published>2008-09-02T14:50:15+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=174&amp;p=633#p633</id>
<link href="https://forum.yubico.com/viewtopic.php?t=174&amp;p=633#p633"/>
<title type="html"><![CDATA[Re: Using the latest pam_yubico module]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=174&amp;p=633#p633"><![CDATA[
Simon:<br /><br />I've been unable to make the multifactor in pam_yubico_1.7 work correctly.  With the auth section of my /etc/pam.d/sshd setup like this:<br /><br />auth       required   /usr/local/lib/security/pam_yubico.so id=269 debug<br />auth       required   pam_stack.so service=system-auth<br /><br />Authentication requests always fail.  pam-debug.log shows that the password is being properly broken off from the token and that the token auth is working fine.  But the login never succeeds.<br /><br />What was your guys' two-factor test setup?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=213">pmk</a> — Tue Sep 02, 2008 2:50 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Simon]]></name></author>
<updated>2008-09-02T10:52:49+01:00</updated>
<published>2008-09-02T10:52:49+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=174&amp;p=631#p631</id>
<link href="https://forum.yubico.com/viewtopic.php?t=174&amp;p=631#p631"/>
<title type="html"><![CDATA[Re: Using the latest pam_yubico module]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=174&amp;p=631#p631"><![CDATA[
The latest official pam_yubico release 1.7 should have similar functionality in it, and documentation how to set this up are available from:<br /><br /><!-- m --><a class="postlink" href="http://code.google.com/p/yubico-pam/wiki/YubikeyAndSSHViaPAM">http://code.google.com/p/yubico-pam/wik ... dSSHViaPAM</a><!-- m --><br /><br />It doesn't use recursive PAM queries, but retain the password-part of the entered information for later PAM modules to verify.<br /><br />If anyone has tested this and Dion's work and can compare it, that would be helpful.  We are trying to make our pam module support all features.  The code we have merged came from a different author than Dion, but they have now stopped improving with it, so if Dion wants to resume with our current code it will be easier for us to merge the code.<br /><br />/Simon<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2">Simon</a> — Tue Sep 02, 2008 10:52 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[kseistrup]]></name></author>
<updated>2008-09-01T15:23:44+01:00</updated>
<published>2008-09-01T15:23:44+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=174&amp;p=615#p615</id>
<link href="https://forum.yubico.com/viewtopic.php?t=174&amp;p=615#p615"/>
<title type="html"><![CDATA[Re: Using the latest pam_yubico module]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=174&amp;p=615#p615"><![CDATA[
<div class="quotetitle">pmk wrote:</div><div class="quotecontent"><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">auth       sufficient   pam_stack.so service=system-auth</div><br /></div><br />Please note that <a href="http://www.redhat.com/archives/rhl-devel-list/2005-October/msg00050.html" class="postlink">pam_stack.so has been obsoleted</a> by the include directive.<br /><br />Cheers,<br />Klaus<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=251">kseistrup</a> — Mon Sep 01, 2008 3:23 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[pmk]]></name></author>
<updated>2008-09-01T04:16:55+01:00</updated>
<published>2008-09-01T04:16:55+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=174&amp;p=614#p614</id>
<link href="https://forum.yubico.com/viewtopic.php?t=174&amp;p=614#p614"/>
<title type="html"><![CDATA[Using the latest pam_yubico module]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=174&amp;p=614#p614"><![CDATA[
All:<br /><br />Dion has published his latest version of the pam_yubico module.  This version supports mapping yubikey IDs to users and eliminates some static buffers that the Yubico folks weren't happy with.<br /><br />So you can finally authenticate users safely for SSH and other services via PAM (including PAM-capable RADIUS servers), without worrying that anyone with a yubikey could access your system.  This is great news and means that we'll be able to start replacing our Cryptocards with Yubikeys in the near future.<br /><br />Right now, the module doesn't come with great docs, so I figured I'd document how I got it working on my servers.  Here's the drill:<br /><ul><li> Compile and install the latest Yubikey C client from <!-- m --><a class="postlink" href="http://code.google.com/p/yubico-c-client/downloads/list">http://code.google.com/p/yubico-c-client/downloads/list</a><!-- m --> (I used 1.2)</li><li> Check out the latest pam_yubico code (svn checkout <!-- m --><a class="postlink" href="http://yubico-pam.googlecode.com/svn/trunk/">http://yubico-pam.googlecode.com/svn/trunk/</a><!-- m --> yubico-pam-read-only).  I used r38.</li><li> Configure, compile and install pam_yubico.so.  I used  ./configure --with-libyubikey-client-prefix=/usr/local, but you may need to point it  somewhere else, if your yubikey libraries are elsewhere.</li><li> Get a Yubico API ID at <!-- m --><a class="postlink" href="https://api.yubico.com/get-api-key/">https://api.yubico.com/get-api-key/</a><!-- m -->.</li><li> Modify the pam configuration for your sshd to add pam_yubico.so.  On CentOS/RHEL, you can do this globally by editing /etc/pam.d/system-auth or you can edit the specific service you want to test with.  For my test, I only modified /etc/pam.d/sshd.  You need to add a line that reads <div class="codetitle"><b>Code:</b></div><div class="codecontent">auth       sufficient   /usr/local/lib/security/pam_yubico.so id=xxx debug</div> and change the xxx to your API ID.  If you want to continue to allow password-based authentication (highly recommended for testing), change other auth lines that do authentication (on CentOS/RHEL, the call to system-auth) to sufficient as well.  Here's what my sshd looked like after I got done editing it: <div class="codetitle"><b>Code:</b></div><div class="codecontent">auth       sufficient   /usr/local/lib/security/pam_yubico.so id=269 debug<br />auth       sufficient   pam_stack.so service=system-auth<br />auth       required     pam_nologin.so<br />account    required     pam_stack.so service=system-auth<br />password   required   pam_stack.so service=system-auth<br />session    required     pam_stack.so service=system-auth<br />session    required     pam_loginuid.so</div></li><li> If you don't plan to use two-factor authentication (a user-entered PIN/password, in addition to the yubikey output), add yubikeyonly=1 to the pam_yubico.so line.</li><li> If you _do_ plan to use two-factor authentication, create a pam service called yubikey-multifactor with a single auth line, that calls the appropriate authentication service for the PIN/password.  On my system, this looks like this: <div class="codetitle"><b>Code:</b></div><div class="codecontent">auth       required     pam_stack.so service=system-auth</div></li><li> Create a file in $HOME/.yubikey/ called authorized_keys that contains your Yubikey IDs, separated by newlines.  A newline is _required_ even if you only have a single Yubikey</li><li> Create a file called /tmp/pam-debug.log and chmod it to 666, so you can see debug output emitted by the yubico module.  This is recommended for testing, but this file should be deleted once testing is complete, as it will contain sensitive information.</li><li> Try to login!  If you are using two-factor authentication, you should enter your normal UNIX password, then hit the button on your yubikey.  If you are only using one-factor authentication, just pressing the yubikey will be enough.</li><li> If you make it in, congrats!  You're ready to go.  If not, check /tmp/pam-debug.log and see what happened.</li><li> Don't forget to delete /tmp/pam-debug.log!</li></ul><br />There are other tricks you can do (define a global list of valid IDs in /etc/yubico-pam.conf, use an options file to control two-factor auth on a user-by-user basis (not sure this is the best idea, if not globally override-able)) so check out the source for more details.<br /><br />I hope this helps someone.  And thanks to Dion for the great work!<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=213">pmk</a> — Mon Sep 01, 2008 4:16 am</p><hr />
]]></content>
</entry>
</feed>