pam_ssh_agent_auth
pam_ssh_agent_auth copied to clipboard
Moving pam_ssh_agent_auth to github as primary development location
Do you plan to sync your code with sourceforge, and release a 0.10.3 version on github ?
Hi, Seems like I can't get it to work properly on my server. This is what I've done on the server so far: - Copied the authorized keys with: `$...
This is needed on NixOS to allow a system-level authorized keys file and a user file. Patch from https://github.com/NixOS/nixpkgs/blob/master/pkgs/os-specific/linux/pam_ssh_agent_auth/multiple-key-files.patch Written by Eelco Dolstra
Hi, I'm trying to check whether the SSH key used during initial authentication (rather than once a session is established, SSH_AUTH_SOCK is populated, and we're using sudo etc.) matches a...
Hi, I am trying to use pam_ssh_agent_auth with sudo on CentOS 7. Everything works great, when user is in sudoers (wheel group) and has correct key loaded in ssh-agent. But...
Warns if PAM_RUSER and PAM_USER are identical. Bails out if additionally allow_user_owned_authorized_keys_file is enabled. If authorized_keys_file is allowed to be owned by user, and user is identical with ruser, this...
``` % cat /tmp/test.zsh #!/bin/zsh echo $SSH_AUTH_SOCK sudo echo OK % /tmp/test.zsh /home/sergio/.gnupg/S.gpg-agent.ssh [sudo] password for sergio: ``` ``` /var/log/auth.log: Beginning pam_ssh_agent_auth for user sergio Attempting authentication: `sergio' as `sergio'...
The README mentions https://github.com/jbeverly/pam_ssh_agent_auth-2.0 as the new home for `pam_ssh_agent_auth`, but hasn't been updated since 2016. While this repo seems to have activity. Should the former be archived and the...
This was already perfectly explained in https://sourceforge.net/p/pamsshagentauth/bugs/21/, so I'll just quote it here: > **The option "allow_user_owned_authorized_keys_file" is very dangerous, and should be removed from the code as it has...