(no title)
mihaigalos | 2 years ago
# /etc/pam.d/sudo
auth optional pam_faildelay.so delay=5000000
auth [success=1 default=ignore] pam_yubico.so authfile=/home/user/auth_file id=16
session required pam_env.so readenv=1 user_readenv=0
session required pam_env.so readenv=1 envfile=/etc/default/locale user_readenv=0
@include common-auth
@include common-account
@include common-session-noninteractive
# /etc/pam.d/sshd auth optional pam_faildelay.so delay=5000000
auth requisite pam_yubico.so authfile=/home/user/auth_file id=16 debug
account include base-account
auth required pam_env.so
auth required pam_nologin.so successok
mihaigalos|2 years ago
Thorrez|2 years ago
jasomill|2 years ago
1. Reconfigure pam_yubico to use local challenge-response auth instead of YubiCloud. The ykpamcfg(1) man page[1] explains how to do so.
2. Use pam_u2f to enable FIDO2/U2F auth. See, e.g.,
https://support.yubico.com/hc/en-us/articles/360016649099-Ub...
https://docs.fedoraproject.org/en-US/quick-docs/using-yubike...
Though on Fedora (and RHEL), I personally prefer authselect to hand-editing /etc/pam.d; in particular, authselect's "sssd" default profile includes optional U2F support:
[1] https://raw.githubusercontent.com/Yubico/yubico-pam/5719a2f8...