Yubico Forum https://forum.yubico.com/ |
|
Using the latest pam_yubico module https://forum.yubico.com/viewtopic.php?f=5&t=174 |
Page 1 of 1 |
Author: | pmk [ Mon Sep 01, 2008 4:16 am ] |
Post subject: | Using the latest pam_yubico module |
All: Dion has published his latest version of the pam_yubico module. This version supports mapping yubikey IDs to users and eliminates some static buffers that the Yubico folks weren't happy with. So you can finally authenticate users safely for SSH and other services via PAM (including PAM-capable RADIUS servers), without worrying that anyone with a yubikey could access your system. This is great news and means that we'll be able to start replacing our Cryptocards with Yubikeys in the near future. Right now, the module doesn't come with great docs, so I figured I'd document how I got it working on my servers. Here's the drill:
There are other tricks you can do (define a global list of valid IDs in /etc/yubico-pam.conf, use an options file to control two-factor auth on a user-by-user basis (not sure this is the best idea, if not globally override-able)) so check out the source for more details. I hope this helps someone. And thanks to Dion for the great work! |
Author: | kseistrup [ Mon Sep 01, 2008 3:23 pm ] |
Post subject: | Re: Using the latest pam_yubico module |
pmk wrote: Code: auth sufficient pam_stack.so service=system-auth Please note that pam_stack.so has been obsoleted by the include directive. Cheers, Klaus |
Author: | Simon [ Tue Sep 02, 2008 10:52 am ] |
Post subject: | Re: Using the latest pam_yubico module |
The latest official pam_yubico release 1.7 should have similar functionality in it, and documentation how to set this up are available from: http://code.google.com/p/yubico-pam/wik ... dSSHViaPAM It doesn't use recursive PAM queries, but retain the password-part of the entered information for later PAM modules to verify. If anyone has tested this and Dion's work and can compare it, that would be helpful. We are trying to make our pam module support all features. The code we have merged came from a different author than Dion, but they have now stopped improving with it, so if Dion wants to resume with our current code it will be easier for us to merge the code. /Simon |
Author: | pmk [ Tue Sep 02, 2008 2:50 pm ] |
Post subject: | Re: Using the latest pam_yubico module |
Simon: I've been unable to make the multifactor in pam_yubico_1.7 work correctly. With the auth section of my /etc/pam.d/sshd setup like this: auth required /usr/local/lib/security/pam_yubico.so id=269 debug auth required pam_stack.so service=system-auth Authentication requests always fail. pam-debug.log shows that the password is being properly broken off from the token and that the token auth is working fine. But the login never succeeds. What was your guys' two-factor test setup? |
Author: | paul [ Thu Sep 11, 2008 11:40 pm ] |
Post subject: | Re: Using the latest pam_yubico module |
pmk wrote: Simon: I've been unable to make the multifactor in pam_yubico_1.7 work correctly. With the auth section of my /etc/pam.d/sshd setup like this: auth required /usr/local/lib/security/pam_yubico.so id=269 debug auth required pam_stack.so service=system-auth Authentication requests always fail. pam-debug.log shows that the password is being properly broken off from the token and that the token auth is working fine. But the login never succeeds. What was your guys' two-factor test setup? Hi, pmk, can you share the pam-debug.log and explain what do you mean by password broken off? Someone here in Yubico will be helping on this issue asap. Thanks |
Author: | pmk [ Fri Sep 12, 2008 3:36 pm ] |
Post subject: | Re: Using the latest pam_yubico module |
See below. By breaking off the password, I mean that the token and password are being separated correctly. Can you post your working config? Thanks. [pam_yubico.c:pam_sm_authenticate(217)] called. [pam_yubico.c:pam_sm_authenticate(218)] flags 1 argc 2 [pam_yubico.c:pam_sm_authenticate(220)] argv[0]=id=269 [pam_yubico.c:pam_sm_authenticate(220)] argv[1]=debug [pam_yubico.c:pam_sm_authenticate(221)] id=269 [pam_yubico.c:pam_sm_authenticate(222)] debug=1 [pam_yubico.c:pam_sm_authenticate(223)] alwaysok=0 [pam_yubico.c:pam_sm_authenticate(224)] authfile=(null) [pam_yubico.c:pam_sm_authenticate(235)] get user returned: modus [pam_yubico.c:pam_sm_authenticate(245)] get password returned: (null) [pam_yubico.c:pam_sm_authenticate(275)] conv returned: [password]bcbtkuvenfnhugcggjhctrcclhuvcfiebcfjvdljjggj [pam_yubico.c:pam_sm_authenticate(321)] Token is : bcbtkuvenfnhugcggjhctrcclhuvcfiebcfjvdljjggj and password is [password] [pam_yubico.c:pam_sm_authenticate(322)] Token ID is: bcbtkuvenfnh [pam_yubico.c:check_user_token(112)] Got user record :: modus:bcbtkuvenfnh [pam_yubico.c:check_user_token(119)] Token Found :: bcbtkuvenfnh [pam_yubico.c:pam_sm_authenticate(356)] libyubikey-client return value (0): Success [pam_yubico.c:pam_sm_authenticate(377)] done. [Success] |
Page 1 of 1 | All times are UTC + 1 hour |
Powered by phpBB® Forum Software © phpBB Group https://www.phpbb.com/ |