sk-ed25519 support
Yes
This is a bug! /usr/bin/sudo -s --preserve-env=SSH_AUTH_SOCK preserves $SSH_AUTH_SOCK but still requires password.
But at leas I'm not able to run user shell with user's home. sudo -su user doesn't work and sudo -Esu user saves my $HOME (and all my other env).
Really I'm already not sure if this is a bug as sudo is alias to sudo -E, and $ /usr/bin/sudo -E ls works.
Really I'm already sure is this is a bug as sudo is alias to sudo -E, and $ /usr/bin/sudo -E ls works.
No ssh-agent could be contacted
Should be closed as ecdsa and ed25519 keys are supported, right?
Since this issue is still open, I guess it's as good a place as any to mention that the project is removed from testing and thus risk getting being dropped by Debian unless action is taken. Relevant links: Please migrate to openssl1.1 in buster, pam-ssh-agent-auth REMOVED from testing, https://packages.debian.org/libpam-ssh-agent-auth Actually covering the possible migration to openssl 1.1 is likely a topic for a separate issue. However, a relevant question could be whether targeting the newer openssl...
TL;DR Yes it seems development has moved. First to pam_ssh_agent_auth and then further to pam_ssh_agent_auth-2.0, both under https://github.com/jbeverly/. The full reasoning leading to above summary is that in the sourceforge svn repository the latest tag is as already written in this tickets' description indeed 0.10.2-rc1, and the latest commit is from March of 2014. It is however (currently) possible to download a tar-ball from sourceforge of version 0.10.3, which only lacks a few small commits,...
Can't find v0.10.3 in svn repo
Attempt to use pam_ssh_agent_auth without a keyfile present causes a SEGV
Discard 3072 bytes instead of 256 bytes
Patch used in Debian.
Hi, The project is now packaged in Debian, please file packaging related bugs/suggestions...
I've just encounted this issue with ed25519 keys on 0.10.2 Is ed25519 supported ...
Changelog is not updated for 0.10.3
I have no idea why my response to this was lost. I know this is several years late,...
First off, thank you so much for this! I have been remiss in attending to it. I had...
I've added ECDSA and ed25519 key support and sent the maintainer a note encouraging...
When we have FIPS mode enabled on our RHEL 7.2 server using the latest 0.10.2 version...
Ignores return value of seteuid() in two cases
Proposing patch for the first issue: getpwuid can return NULL and the return value...
As far as I know, what we do for Fedora is opensource and contribution to upstream...
@Jakub Any objections if I "borrow" that work. I have been porting to 7.2 myself...
@Jakub: I just built from the F23 sources, and it does indeed look a lot better....
Check pam_ssh_avent_auth package in Fedora/RHEL/CentOS. We rebase to current openssh...
support ecdsa and ed25519 keys
TOCTOU and NULL_RETURNS
SEVERE: allow_user_owned_authorized_keys_file permits privilege escalation
Bump... Any news about this one?
Doesn't work with NFS remote homes?
Support OpenSSH CA Signed Keys
WIll also support new ECs as part of this work.
Just an update; made progress last weekend, will be working more on it this week...
Add a gpg signature and/or checksums to downloads
Nice, thanks. If you need help testing this please dont hesitate to ask.
It is not currently supported. I will look at addressing this and a few others this...
Hi there, am I missing some configuration option, or does pam_ssh_agent_auth not...
Here's a patch for this bug, needs to be 2 spaces between details and date
merging 0.10.2-rc1 into trunk
tagging autoconf fixes for release
version bump in release files
sudo version correction
configure regeneration
typo in configure.ac preventing resulting confi...
keep-wire-format-independent-of-available-sysca...
valid points all. 1) I expect your patch looks like what I had intended to write,...
thank you, jamie. i've updated the debian copyright files accordingly. unused return...
Apparently several commits ago I fixed most of the issues with autoreconf; so only...
fixed configure.ac; now works with autoreconf a...
copyright: the following line from the current copyright file might be helpful: Files:...
In order: 1) Copyright notices: I knew I missed some, I'll go through and fix that...
suggestions from debian packaging
merging tags/jamie-pam_ssh_agent_auth-0.10.1-rc...
tagging 0.10.1 release
freebsd 10 fixes
solaris 10 fixes
Adding patches from chrysn with one minor fix; ...
Applied all 3, plus some more of my own. I'm going to go ahead and do my platform...
and the last one. in case you are using git internally, you can cherry-pick the patches...
it seems i can only upload a patch at a time, here's the second one.
thank you for fixing this; i didn't notice the dev/jamie branch until now. there...
Allow symlinks in $SSH_AUTH_SOCK
including authenticated action in signature request
support for AuthorizedKeysCommand
support command in authorized_keys
support command in authorized_keys
Unfortunately, pam has no insight itself into what the user is attempting to do during...
I won't be able to get to this for a little while, but patches are welcome. You can...
Support OpenSSH CA Signed Keys
distribution file update
portability fix, typo fix, and some debug cleanup
Hrmm... I'm actually unable to reproduce this. What platform are you on and can you...
* added support for authorized_keys_command and...
Simple fix; will include in next release
Allow symlinks in $SSH_AUTH_SOCK