contrib/yubico-pam
Tim Biermann 41e8eac82e
[notify] yubico-pam: removed obsolete dependencies
2021-08-15 16:35:33 +02:00
..
.footprint
.signature
Pkgfile
README

README

Authenticating with HMAC-SHA1 Challenge-Response through linux-pam

You need a pam aware userland (e.g. shadow for login, sudo, sshd, ..) and
yubikey-personalization to succeed.
We will write our key to the second slot, as the first slot comes with a
higher secure level key which shouldn't be overwritten.

Then proceed as follows:

CHANGE {$USER} to your username!

$ ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -oserial-api-visible
$ sudo mkdir /var/yubico
$ sudo chown root:root /var/yubico
$ sudo chmod 700 /var/yubico
$ ykpamcfg -2 -v
$ sudo mv ~/.yubico/challenge-123456 /var/yubico/{$USER}-123456
$ sudo chown root:root /var/yubico/*
$ sudo chmod 600 /var/yubico/*

then, edit your relative pam files to contain this as the first auth paragraph:
auth        sufficient    pam_yubico.so mode=challenge-response
chalresp_path=/var/yubico

This way ('sufficient'), you can still authenticate with your normal password, in case you
brake your yubikey or you foobar'd.