Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: pam_yubico | Distribution: openSUSE Tumbleweed |
Version: 2.27 | Vendor: openSUSE |
Release: 2.13 | Build date: Mon Oct 18 22:08:29 2021 |
Group: Productivity/Networking/Security | Build host: reproducible |
Size: 162343 | Source RPM: pam_yubico-2.27-2.13.src.rpm |
Packager: http://bugs.opensuse.org | |
Url: https://developers.yubico.com/yubico-pam/ | |
Summary: Yubico Pluggable Authentication Module (PAM) |
The Yubico PAM module provides an easy way to integrate the YubiKey into your existing user authentication infrastructure. PAM is used by GNU/Linux, Solaris and Mac OS X for user authentication, and by other specialized applications such as NCSA MyProxy.
BSD-2-Clause
* Mon Oct 18 2021 Torsten Gruner <t.gruner@katodev.de> - Use %_pam_moduledir instead of hardcoding %{_lib}/security - Define macro _pam_moduledir if not set to fix builds for Leap and SLE * Mon May 17 2021 Paolo Perego <paolo.perego@suse.com> - Version 2.27 (released 2021-04-09) - Add always_prompt configuration option. - Add client certificate support for ldap. - Add starttls support for ldap. - Add ldap_bind_as_user support. - Parsing, cleanliness and string fixes. - Documentation and spelling fixes. * Fri Apr 20 2018 kbabioch@suse.com - Version 2.26 (released 2018-04-20) - Make sure to close authfile (CVE-2018-9275 bsc#1088027). - Fix compiler warnings. - Open file descriptors with O_CLOEXEC. - Use mkostemp() instead of mkstemp(). - Dropped patches that are included upstream: - cloexec.patch - compiler-warnings-format-strings.patch - compiler-warnings-pointer.patch - leaking-file-descriptor.patch - util_test-mkdtemp.patch * Fri Apr 13 2018 kbabioch@suse.com - Added patches: - cloexec.patch: Harden file descriptor handling (boo#1089517) - compiler-warnings-pointer.patch: Fix compiler warnings due to wrong pointer casts (boo#1089518) - compiler-warnings-format-strings.patch: Fix compiler warnings due to wrong format string specifiers (boo#1089519) - util_test-mkdtemp.patch: Use mkdtemp() instead of tempnam() (boo#1089520) * Wed Apr 04 2018 kbabioch@suse.com - leaking-file-descriptor.patch: Close the authfile before returning to make sure no file descriptors are leaked (bsc#1088027). * Tue Mar 27 2018 kbabioch@suse.com - Version 2.25 (released 2018-03-27): - Security: Storage of challenges in path with restricted permissions - Perform OTP validation only if token is authorized - Return early if the user has no authorized tokens - Compare OTP IDs against `yubi_attr` only - Add nullok support to challenge-response mode - Several improvements to the documentation - Improved debugging output and test cases * Mon Nov 27 2017 meissner@suse.com - Version 2.24 (released 2016-11-25) (bsc#1067191) - Debug mode changed, allows file output with debug_file. - Fixup returning user-unknown correctly. - Version 2.23 (released 2016-06-15) - Fix an issue where a failure to set permissions was wrongly outputted. * Thu Jun 09 2016 t.gruner@katodev.de - Version 2.22 (released 2016-05-23) - Documentation improvements. - Retain ownership and permission of challenge files (issue #92). - Make dependency on yubico-c-client 2.15 clearer. * Mon Apr 25 2016 t.gruner@katodev.de - Version 2.21 (released 2016-02-19) - Add proxy support for yubico-c-client. - Check that conv is set before trying to use it fixes a crash bug with the osx loginwindow. - Add building of a mac installer. * Mon Oct 05 2015 t.gruner@katodev.de - Version 2.20 (released 2015-09-22) - Add cainfo option to allow usage of a cabundle instead of path. - Support comments in authfile. - For challenge response with system-wide directory, write the files as root instead of the user. - add baselib.conf
/usr/bin/ykpamcfg /usr/lib/security/pam_yubico.so /usr/share/doc/packages/pam_yubico /usr/share/doc/packages/pam_yubico/AUTHORS /usr/share/doc/packages/pam_yubico/Authentication_Using_Challenge-Response.adoc /usr/share/doc/packages/pam_yubico/MacOS_X_Challenge-Response.adoc /usr/share/doc/packages/pam_yubico/NEWS /usr/share/doc/packages/pam_yubico/README /usr/share/doc/packages/pam_yubico/Two_Factor_PAM_Configuration.adoc /usr/share/doc/packages/pam_yubico/Ubuntu_FreeRadius_YubiKey.adoc /usr/share/doc/packages/pam_yubico/YubiKey_and_FreeRADIUS_1FA_via_PAM.adoc /usr/share/doc/packages/pam_yubico/YubiKey_and_FreeRADIUS_via_PAM.adoc /usr/share/doc/packages/pam_yubico/YubiKey_and_OpenVPN_via_PAM.adoc /usr/share/doc/packages/pam_yubico/YubiKey_and_Radius_via_PAM.adoc /usr/share/doc/packages/pam_yubico/YubiKey_and_SELinux.adoc /usr/share/doc/packages/pam_yubico/YubiKey_and_SSH_via_PAM.adoc /usr/share/licenses/pam_yubico /usr/share/licenses/pam_yubico/COPYING /usr/share/man/man1/ykpamcfg.1.gz /usr/share/man/man8/pam_yubico.8.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jan 7 23:49:12 2025