| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: pam_yubico | Distribution: openSUSE Tumbleweed |
| Version: 2.27 | Vendor: openSUSE |
| Release: 2.16 | Build date: Mon Oct 18 22:08:29 2021 |
| Group: Productivity/Networking/Security | Build host: reproducible |
| Size: 162343 | Source RPM: pam_yubico-2.27-2.16.src.rpm |
| Packager: http://bugs.opensuse.org | |
| Url: https://developers.yubico.com/yubico-pam/ | |
| Summary: Yubico Pluggable Authentication Module (PAM) | |
The Yubico PAM module provides an easy way to integrate the YubiKey into your existing user authentication infrastructure. PAM is used by GNU/Linux, Solaris and Mac OS X for user authentication, and by other specialized applications such as NCSA MyProxy.
BSD-2-Clause
* Mon Oct 18 2021 Torsten Gruner <t.gruner@katodev.de>
- Use %_pam_moduledir instead of hardcoding %{_lib}/security
- Define macro _pam_moduledir if not set to fix builds for Leap and SLE
* Mon May 17 2021 Paolo Perego <paolo.perego@suse.com>
- Version 2.27 (released 2021-04-09)
- Add always_prompt configuration option.
- Add client certificate support for ldap.
- Add starttls support for ldap.
- Add ldap_bind_as_user support.
- Parsing, cleanliness and string fixes.
- Documentation and spelling fixes.
* Fri Apr 20 2018 kbabioch@suse.com
- Version 2.26 (released 2018-04-20)
- Make sure to close authfile (CVE-2018-9275 bsc#1088027).
- Fix compiler warnings.
- Open file descriptors with O_CLOEXEC.
- Use mkostemp() instead of mkstemp().
- Dropped patches that are included upstream:
- cloexec.patch
- compiler-warnings-format-strings.patch
- compiler-warnings-pointer.patch
- leaking-file-descriptor.patch
- util_test-mkdtemp.patch
* Fri Apr 13 2018 kbabioch@suse.com
- Added patches:
- cloexec.patch: Harden file descriptor handling (boo#1089517)
- compiler-warnings-pointer.patch: Fix compiler warnings due to wrong pointer
casts (boo#1089518)
- compiler-warnings-format-strings.patch: Fix compiler warnings due to wrong
format string specifiers (boo#1089519)
- util_test-mkdtemp.patch: Use mkdtemp() instead of tempnam() (boo#1089520)
* Wed Apr 04 2018 kbabioch@suse.com
- leaking-file-descriptor.patch: Close the authfile before returning
to make sure no file descriptors are leaked (bsc#1088027).
* Tue Mar 27 2018 kbabioch@suse.com
- Version 2.25 (released 2018-03-27):
- Security: Storage of challenges in path with restricted permissions
- Perform OTP validation only if token is authorized
- Return early if the user has no authorized tokens
- Compare OTP IDs against `yubi_attr` only
- Add nullok support to challenge-response mode
- Several improvements to the documentation
- Improved debugging output and test cases
* Mon Nov 27 2017 meissner@suse.com
- Version 2.24 (released 2016-11-25) (bsc#1067191)
- Debug mode changed, allows file output with debug_file.
- Fixup returning user-unknown correctly.
- Version 2.23 (released 2016-06-15)
- Fix an issue where a failure to set permissions was wrongly outputted.
* Thu Jun 09 2016 t.gruner@katodev.de
- Version 2.22 (released 2016-05-23)
- Documentation improvements.
- Retain ownership and permission of challenge files (issue #92).
- Make dependency on yubico-c-client 2.15 clearer.
* Mon Apr 25 2016 t.gruner@katodev.de
- Version 2.21 (released 2016-02-19)
- Add proxy support for yubico-c-client.
- Check that conv is set before trying to use it fixes a crash bug with the osx loginwindow.
- Add building of a mac installer.
* Mon Oct 05 2015 t.gruner@katodev.de
- Version 2.20 (released 2015-09-22)
- Add cainfo option to allow usage of a cabundle instead of path.
- Support comments in authfile.
- For challenge response with system-wide directory, write the files as root instead of the user.
- add baselib.conf
/usr/bin/ykpamcfg /usr/lib/security/pam_yubico.so /usr/share/doc/packages/pam_yubico /usr/share/doc/packages/pam_yubico/AUTHORS /usr/share/doc/packages/pam_yubico/Authentication_Using_Challenge-Response.adoc /usr/share/doc/packages/pam_yubico/MacOS_X_Challenge-Response.adoc /usr/share/doc/packages/pam_yubico/NEWS /usr/share/doc/packages/pam_yubico/README /usr/share/doc/packages/pam_yubico/Two_Factor_PAM_Configuration.adoc /usr/share/doc/packages/pam_yubico/Ubuntu_FreeRadius_YubiKey.adoc /usr/share/doc/packages/pam_yubico/YubiKey_and_FreeRADIUS_1FA_via_PAM.adoc /usr/share/doc/packages/pam_yubico/YubiKey_and_FreeRADIUS_via_PAM.adoc /usr/share/doc/packages/pam_yubico/YubiKey_and_OpenVPN_via_PAM.adoc /usr/share/doc/packages/pam_yubico/YubiKey_and_Radius_via_PAM.adoc /usr/share/doc/packages/pam_yubico/YubiKey_and_SELinux.adoc /usr/share/doc/packages/pam_yubico/YubiKey_and_SSH_via_PAM.adoc /usr/share/licenses/pam_yubico /usr/share/licenses/pam_yubico/COPYING /usr/share/man/man1/ykpamcfg.1.gz /usr/share/man/man8/pam_yubico.8.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Thu Oct 23 22:58:29 2025