Remi Mollon
b42307d169
adding yubi_prefix parameter, when looking for token_id in ldap
2012-01-18 17:04:58 +01:00
Fredrik Thulin
263012f725
authorize_user_token: Don't drop privs for system-wide file.
2011-12-13 16:56:04 +01:00
Fredrik Thulin
43134038a5
do_challenge_response: Remove 2 unused variables.
2011-12-06 13:45:58 +01:00
Fredrik Thulin
b27599957c
Fix implicit yubikey_* declarations.
2011-12-06 13:31:25 +01:00
Fredrik Thulin
fa8a9ff074
Fix pointer signedness warnings.
2011-12-06 11:56:52 +01:00
Fredrik Thulin
f24f333867
Drop privileges before writing new C-R file.
2011-11-23 13:56:01 +01:00
Fredrik Thulin
94885d2d48
Verify that challenge-response file is a normal file.
2011-11-23 13:55:44 +01:00
Fredrik Thulin
d4acd495f0
improve debug messages
2011-11-23 13:46:26 +01:00
Fredrik Thulin
fcde64a93e
Use pam_modutil_drop_priv if it is available.
...
Utility functions for what was done in drop_priv.c appeared
in PAM 1.1.3. Use them when available.
2011-11-23 13:45:41 +01:00
Fredrik Thulin
b92902fd8f
Restore challenge-response functionality.
...
HAVE_LIBYKPERS_1 did not seem to ever get defined, so use HAVE_CR instead.
2011-11-23 13:26:02 +01:00
Ricky Zhou
a9892dbb44
Drop privileges before opening user files.
...
This change also ensures that user tokens are regular files. We may
want to add a similar check for user challenge files.
2011-11-23 10:16:00 +01:00
Fredrik Thulin
f92ee12aa9
Remove unused variable and extra undef.
2011-11-22 11:17:29 +01:00
Fredrik Thulin
47d883b600
pam_sm_authenticate: check strdup return value
2011-11-22 11:08:53 +01:00
Fredrik Thulin
57cf6ed5d6
authorize_user_token_ldap: check malloc return value
2011-11-22 11:08:28 +01:00
dr8
6dc10799b6
Bug fix: pam_yubico doesn't check server signature
...
Squashed commit of the following:
commit 9e7746bc53957f2a1e68784c0c26d082049180a7
Author: dr8 <github@dominicrutherford.co.uk>
Date: Mon Oct 31 14:27:47 2011 +0000
Bug fix: pam_yubico doesn't check server signature
commit 2f3d5e721cbfc905582da6208495c1da6dd2f79c
Author: dr8 <github@dominicrutherford.co.uk>
Date: Sat Oct 29 16:59:08 2011 +0100
Bug fix: pam_yubico does not validate server signature
commit 58a1e6820a88f6aa365ef006e9cca4c62af7c7cf
Author: dr8 <github@dominicrutherford.co.uk>
Date: Fri Oct 28 22:09:49 2011 +0100
only validate server signature when key is specified
commit d705f429bc972f85a50f0b2f96703cbdc28b744f
Author: dr8 <github@dominicrutherford.co.uk>
Date: Tue Oct 25 22:45:22 2011 +0100
fix failure to validate server signature
2011-11-08 21:57:28 +01:00
Nanakos Chrysostomos
4712da70ca
Fix big security hole: Authentication succeeded when no password
...
was given, unless use_first_pass was being used.
This is fatal if pam_yubico is considered 'sufficient' in the PAM
configuration.
Signed-off-by: Nanakos Chrysostomos <nanakos@wired-net.gr>
2011-08-26 14:32:03 +03:00
Simon Josefsson
e469b630d5
Make dependency on libykpers optional.
...
Use --without-cr to force it. Reported by Jussi Sallinen <jussi@jus.si>.
2011-06-07 00:35:22 +02:00
Fredrik Thulin
eb438e782c
parse_cfg: Use memset to clear cfg struct.
...
The code will be easier to maintain if one does not have to remember
explicitly initializing all new members of the config struct.
2011-04-15 16:30:06 +02:00
Fredrik Thulin
804b537acf
Fix some D's that should've been DBG.
2011-04-15 16:28:00 +02:00
Fredrik Thulin
dfebd4173f
Make DBG macro unified.
...
Refactor authorize_user_token and authorize_user_token_ldap to take
a cfg argument instead of a number of elements from cfg.
2011-04-15 15:24:50 +02:00
Romain Riviere
1ec6d2df92
Debug: adding a dbg flag and macro so as to disable unwanted debug messages
2011-04-15 14:17:23 +02:00
Tollef Fog Heen
7923496375
Tell the user if something goes wrong after authenticating
...
If we successfully authenticate, but something then goes wrong, such
as failure to generate a new challenge, failure to update the
challenge and so on, tell the user.
2011-03-18 23:05:26 +01:00
Tollef Fog Heen
72d1f4bba9
Move code around slightly to make merging with Fredrik easier
2011-03-18 23:01:46 +01:00
Fredrik Thulin
b20c0ed678
Make get_user_challenge_file() also include YubiKey serial number,
...
and move it to util.c.
2011-03-18 22:57:22 +01:00
Fredrik Thulin
69ec1bf8a0
Further cleanups to challenge response code, and move more code to util.c.
2011-03-18 22:56:41 +01:00
Fredrik Thulin
cb16817047
Revert "Wait with declaring PAM_SUCCESS on challenge-response until new"
...
Tollef has argued that the login should not fail if, for example, the
disk is full. I'd rather fail on the cautious side and make sure we
don't end up always sending the same challenge to the YubiKey, but I'll
leave it up to Tollef to decide for now.
This reverts commit 14e917ffae52e05121a69a192d03f98090e8ae41.
Conflicts:
pam_yubico.c
2011-03-18 22:50:23 +01:00
Fredrik Thulin
721866df0b
Move more challenge-response code to util.c.
2011-03-18 21:52:07 +01:00
Fredrik Thulin
c557249503
Move soon-to-be commonly used code to util.c
2011-03-18 21:49:23 +01:00
Fredrik Thulin
3abc5b2d81
Remove hard coded values for challenge/responses.
...
Also do some input validation on what we read from the C/R file.
2011-03-16 22:52:36 +01:00
Fredrik Thulin
d73618f271
generate_challenge() only generated half as many bytes as it should.
...
Changed generate_challenge() to generating bytes instead of a hex
encoded string, to not have to decode what we just encoded - instead
just generate plain bytes of randomness and then encode them once.
2011-03-16 22:49:57 +01:00
Tollef Fog Heen
1364b39db7
Use a temporary file to ensure we always have a challenge
...
If we use ftruncate we might end up in the situation that we do not
have a challenge on disk, leading to the user being unable to log in.
By using a temporary file, fsync and rename we avoid this problem.
2011-03-16 22:49:51 +01:00
Fredrik Thulin
dc6cd95a98
fsync() wants file descriptor
...
Also, truncate file before writing if the challenge length has
changed (became shorter) or garbage has otherwise been appended.
2011-03-16 22:28:33 +01:00
Fredrik Thulin
ee2e8b42da
Don't generate new challenge on bad response.
2011-03-16 22:28:02 +01:00
Fredrik Thulin
7360223a14
Support challenge-response files outside user's home directory.
...
Having the challege-response data inside the home directory won't
work very well if the YubiKey is to unlock an ecryptfs encrypted
home directory.
2011-03-16 22:27:02 +01:00
Tollef Fog Heen
d9ee08b97f
Add challenge-response authentication
2011-03-12 15:57:07 +01:00
Tollef Fog Heen
ed1ce7e6e7
Undef USERFILE when we don't need it any more
2011-03-12 15:57:02 +01:00
Tollef Fog Heen
49c923a99d
Get rid of unimplemented PAM functions
2011-03-12 15:56:48 +01:00
Fredrik Thulin
e338807cc8
Merge branch 'fix/various_ldap_fixes'
2011-03-10 20:50:48 +01:00
Fredrik Thulin
a59c6c4d71
Ignore errors from pam_get_data().
2011-03-04 15:52:02 +01:00
Fredrik Thulin
f91a7dc99a
Correct debug log message for too short OTPs.
2011-03-03 15:45:00 +01:00
Fredrik Thulin
a5594fa09c
Merge branch 'devel/avoid_logging_passwords'
2011-03-03 15:07:53 +01:00
Fredrik Thulin
702ac98b21
Bugfix getting option token_id_length.
2011-03-03 15:06:15 +01:00
Fredrik Thulin
ac76947e8a
Avoid logging passwords when debug is enabled.
...
Problem reported in
http://code.google.com/p/yubico-pam/issues/detail?id=28
2011-03-03 15:00:05 +01:00
Fredrik Thulin
abb0b7e4e4
authorize_user_token_ldap: Only fetch the attribute we're interested in.
...
Previous version fetched ALL attributes of the identified object,
and treated them all equal when looking for the YubiKey token identifier.
2011-03-03 14:18:00 +01:00
Fredrik Thulin
a9ef97ea4c
authorize_user_token_ldap: Don't leak memory on failures.
2011-03-03 12:48:43 +01:00
Fredrik Thulin
0bb1630abf
authorize_user_token_ldap: sr was under-allocated by one byte.
...
Also change strcat's to sprintf to make code easier to maintain.
2011-03-03 12:38:34 +01:00
Fredrik Thulin
bfd8efd682
Don't segfault on unset LDAP parameters.
...
When ldapserver / ldap_uri was specified, but not for example
user_attr, authorize_user_token_ldap() used to cause a segmentation
fault.
2011-03-03 10:58:34 +01:00
Fredrik Thulin
01897ebb9e
Use LDAPv3 instead of LDAPv2.
...
LDAPv2 was declared historical in 2003, and is now not supported by
for example Mac OS X Server's Open Directory.
Patch by maxsanna81@gmail.com .
2011-03-03 10:31:30 +01:00
Fredrik Thulin
90a7fd0f0a
Avoid LDAP warnings about deprecated functions.
...
Patch by judas.iscariote.
2011-03-03 10:19:55 +01:00
Fredrik Thulin
6a0c8fc82b
authorize_user_token_ldap: Use correct LDAP free function.
...
Patch by judas.iscariote.
2011-03-03 10:11:16 +01:00