Moving pam_ssh_agent_auth to github as primary development location
License
jbeverly/pam_ssh_agent_auth
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
master
Could not load branches
Nothing to show
Could not load tags
Nothing to show
{{ refName }}
default
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code
-
Clone
Use Git or checkout with SVN using the web URL.
Work fast with our official CLI. Learn more.
- Open with GitHub Desktop
- Download ZIP
Sign In Required
Please sign in to use Codespaces.
Launching GitHub Desktop
If nothing happens, download GitHub Desktop and try again.
Launching GitHub Desktop
If nothing happens, download GitHub Desktop and try again.
Launching Xcode
If nothing happens, download Xcode and try again.
Launching Visual Studio Code
Your codespace will open once ready.
There was a problem preparing your codespace, please try again.
Latest commit
This configuration option is always needed also with the current sudo.
099beb2
Git stats
Files
Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
pam_ssh_agent_auth is a PAM module which permits PAM authentication via your keyring in a forwarded ssh-agent. Release 0.10.3 is stable, and has been tested on FreeBSD, Solaris 10, Solaris 11, RHEL5, RHEL6, Debian Wheezy, Ubuntu 12.04 (LTS), Ubuntu 13.10, Ubuntu 14.04 and Mac OS-X 10.10, 10.11, and macos 10.12. This module can be used to provide authentication for anything run locally that supports PAM. It was written specifically with the intention of permitting authentication for sudo without password entry, and also has been proven useful for use with su as an alternative to wheel. It serves as middle ground between the two most common, and suboptimal alternatives for large-scale system administration: allowing rootlogin via ssh, or using NOPASSWD in sudoers. This module allows for ssh public-key authentication, and it does this by leveraging an authentication mechanism you are probably already using, ssh-agent. There are caveats of course, ssh-agent forwarding has it’s own security risks which must be carefully considered for your environment. In cases where there are not untrustworthy intermediate servers, and you wish to retain traceability, accountability, and required authentication for privileged command invocation, the benefits should outweigh the risks. Release 0.10.3 can be downloaded from SourceForge: https://sourceforge.net/project/showfiles.php?group_id=249556 And from github: https://github.com/jbeverly/pam_ssh_agent_auth If you encounter any issues with usability or security, please github issues https://github.com/jbeverly/pam_ssh_agent_auth/issues to report problems. Note that if you wish to use this for sudo, you will need a version of sudo that preserves the env_keep environment during authentication; and ideally a version incorporating my minor patch which ensures RUSER is set during PAM authentication. If building from github, ensure you populate the submodules with 'git submodule init; git submodule update' Also note that future development of this pam module is moving to a 2.0 repo located here: https://github.com/jbeverly/pam_ssh_agent_auth-2.0, which will remain based on openssh portable upstream, to hopefully avoid the kind of drift this module experienced over the many years. LEGACY NOTICE: (very old) sudo 1.6.8p12 does not work correctly with this PAM module, because it clears the environment (even env_keep variables) prior to attempting PAM authentication. sudo 1.7.2p1 or later is preferred, as it correctly sets PAM_RUSER for authentication.
About
Moving pam_ssh_agent_auth to github as primary development location
Resources
License
Stars
Watchers
Forks
Packages 0
No packages published