<feed xmlns='http://www.w3.org/2005/Atom'>
<title>vyos-1x.git/src/pam-configs, branch current-merge-commit-handling</title>
<subtitle>VyOS command definitions, scripts, and utilities (mirror of https://github.com/vyos/vyos-1x.git)
</subtitle>
<id>https://git.amelek.net/vyos/vyos-1x.git/atom?h=current-merge-commit-handling</id>
<link rel='self' href='https://git.amelek.net/vyos/vyos-1x.git/atom?h=current-merge-commit-handling'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/'/>
<updated>2023-12-08T06:46:21+00:00</updated>
<entry>
<title>login: T4943: use pam-auth-update to enable/disable Google authenticator</title>
<updated>2023-12-08T06:46:21+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2023-12-07T20:30:57+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=e134dc4171b051d0f98c7151ef32a347bc4f87e2'/>
<id>urn:sha1:e134dc4171b051d0f98c7151ef32a347bc4f87e2</id>
<content type='text'>
The initial version always enabled Google authenticator (2FA/MFA) support by
hardcoding the PAM module for sshd and login.

This change only enables the PAM module on demand if any use has 2FA/MFA
configured. Enabling the module is done system wide via pam-auth-update by
using a predefined template.

Can be tested using:

set system login user vyos authentication plaintext-password vyos
set system login user vyos authentication otp key 'QY735IG5HDHBFHS5W7Y2A4EM274SMT3O'

See https://docs.vyos.io/en/latest/configuration/system/login.html for additional
details.
</content>
</entry>
<entry>
<title>pam: T5577: Improved PAM configs for RADIUS and TACACS+</title>
<updated>2023-09-19T18:03:51+00:00</updated>
<author>
<name>zsdc</name>
<email>taras@vyos.io</email>
</author>
<published>2023-09-19T18:03:51+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=784fb7dc2ccc63789ed85d803e3ae41eef0e0253'/>
<id>urn:sha1:784fb7dc2ccc63789ed85d803e3ae41eef0e0253</id>
<content type='text'>
After sources analysis, we found the next possible return statuses for PAM
modules:

1. pam_tacplus

    Auth:

    - PAM_AUTH_ERR
    - PAM_AUTHINFO_UNAVAIL
    - PAM_AUTHTOK_ERR
    - PAM_BUF_ERR
    - PAM_CRED_INSUFFICIENT
    - PAM_PERM_DENIED
    - PAM_SUCCESS
    - PAM_USER_UNKNOWN

    Account:

    - PAM_AUTH_ERR
    - PAM_AUTHINFO_UNAVAIL
    - PAM_PERM_DENIED
    - PAM_SUCCESS
    - PAM_USER_UNKNOWN

    Session:

    - PAM_AUTHINFO_UNAVAIL
    - PAM_SESSION_ERR
    - PAM_SUCCESS
    - PAM_USER_UNKNOWN

2. pam_radius_auth

    Auth:

    - PAM_ABORT
    - PAM_AUTH_ERR
    - PAM_AUTHINFO_UNAVAIL
    - PAM_AUTHTOK_ERR
    - PAM_BAD_ITEM
    - PAM_BUF_ERR
    - PAM_CONV_AGAIN
    - PAM_CONV_ERR
    - PAM_IGNORE
    - PAM_NO_MODULE_DATA
    - PAM_PERM_DENIED
    - PAM_SUCCESS
    - PAM_SYSTEM_ERR
    - PAM_USER_UNKNOWN

    Account:

    - PAM_SUCCESS

    Session:

    - PAM_ABORT
    - PAM_AUTHINFO_UNAVAIL
    - PAM_BAD_ITEM
    - PAM_BUF_ERR
    - PAM_CONV_AGAIN
    - PAM_CONV_ERR
    - PAM_IGNORE
    - PAM_NO_MODULE_DATA
    - PAM_PERM_DENIED
    - PAM_SUCCESS
    - PAM_SYSTEM_ERR
    - PAM_USER_UNKNOWN

PAM configurations were replaced with tuned versions to take this into account.
</content>
</entry>
<entry>
<title>TACACS: T5577: Added `mandatory` and `optional` modes for TACACS+</title>
<updated>2023-09-13T18:02:32+00:00</updated>
<author>
<name>zsdc</name>
<email>taras@vyos.io</email>
</author>
<published>2023-09-13T10:16:20+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=1c804685d05ad639bcb1a9ebce68a7a14268500f'/>
<id>urn:sha1:1c804685d05ad639bcb1a9ebce68a7a14268500f</id>
<content type='text'>
In CLI we can choose authentication logic:

  - `mandatory` - if TACACS+ answered with `REJECT`, authentication must be
  stopped and access denied immediately.
  - `optional` (default) - if TACACS+ answers with `REJECT`, authentication
  continues using the next module.

In `mandatory` mode authentication will be stopped only if TACACS+ clearly
answered that access should be denied (no user in TACACS+ database, wrong
password, etc.). If TACACS+ is not available or other errors happen, it will be
skipped and authentication will continue with the next module, like in
`optional` mode.
</content>
</entry>
<entry>
<title>RADIUS: T5577: Added `mandatory` and `optional` modes for RADIUS</title>
<updated>2023-09-13T17:41:43+00:00</updated>
<author>
<name>zsdc</name>
<email>taras@vyos.io</email>
</author>
<published>2023-09-13T09:41:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=5181ab60bb6d936505967d6667adc12c5ecb9b64'/>
<id>urn:sha1:5181ab60bb6d936505967d6667adc12c5ecb9b64</id>
<content type='text'>
In CLI we can choose authentication logic:

  - `mandatory` - if RADIUS answered with `Access-Reject`, authentication must
  be stopped and access denied immediately.
  - `optional` (default) - if RADIUS answers with `Access-Reject`,
  authentication continues using the next module.

In `mandatory` mode authentication will be stopped only if RADIUS clearly
answered that access should be denied (no user in RADIUS database, wrong
password, etc.). If RADIUS is not available or other errors happen, it will be
skipped and authentication will continue with the next module, like in
`optional` mode.
</content>
</entry>
<entry>
<title>T5554: Disable sudo for PAM RADIUS</title>
<updated>2023-09-08T12:24:16+00:00</updated>
<author>
<name>Viacheslav Hletenko</name>
<email>v.gletenko@vyos.io</email>
</author>
<published>2023-09-07T17:18:53+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=01b30eb6d83cdb2ae43b956d29ac7ac1d4445776'/>
<id>urn:sha1:01b30eb6d83cdb2ae43b956d29ac7ac1d4445776</id>
<content type='text'>
Disable sudo for PAM RADIUS template that slows down the CLI commands
To fix it add:

session [default=ignore success=2] pam_succeed_if.so service = sudo
</content>
</entry>
<entry>
<title>tacacs: T141: initial implementation</title>
<updated>2023-06-22T20:37:41+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2023-06-21T20:11:44+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=3ec727670de02cac06321719a0323650046d54a1'/>
<id>urn:sha1:3ec727670de02cac06321719a0323650046d54a1</id>
<content type='text'>
</content>
</entry>
<entry>
<title>tacacs: T141: create new UNIX group for aaa</title>
<updated>2023-06-21T21:17:27+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2023-06-21T20:08:16+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=edc753ad22c03a7e96c6e2323cd551f50588d686'/>
<id>urn:sha1:edc753ad22c03a7e96c6e2323cd551f50588d686</id>
<content type='text'>
</content>
</entry>
<entry>
<title>radius: T3510: authenticated users must use /sbin/radius_shell as shell</title>
<updated>2021-05-02T15:13:40+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2021-05-02T13:53:32+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=0e5a90ad70edbcc6334f1737a6855d02f8ffd130'/>
<id>urn:sha1:0e5a90ad70edbcc6334f1737a6855d02f8ffd130</id>
<content type='text'>
</content>
</entry>
<entry>
<title>login: radius: T2089: only query servers when uid matches ...</title>
<updated>2020-03-01T19:03:45+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2020-03-01T19:03:45+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=fb3eba1d4623e63323c439682e2c7cc2dcb949e1'/>
<id>urn:sha1:fb3eba1d4623e63323c439682e2c7cc2dcb949e1</id>
<content type='text'>
Do not query RADIUS servers when commit is running started from a non RADIUS
user (localuser, root). This should reduce the overall system boot time.
</content>
</entry>
<entry>
<title>radius: T2022: support both local and radius login at the same time</title>
<updated>2020-02-09T14:14:34+00:00</updated>
<author>
<name>Christian Poessinger</name>
<email>christian@poessinger.com</email>
</author>
<published>2020-02-09T14:14:34+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=e76325e6902b9a857b9e544accd5b020439aa8e7'/>
<id>urn:sha1:e76325e6902b9a857b9e544accd5b020439aa8e7</id>
<content type='text'>
</content>
</entry>
</feed>
