Advertisement
jkroepke

Untitled

Jul 15th, 2014
54
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.28 KB | None | 0 0
  1. [pam_yubico.c:parse_cfg(764)] called.
  2. [pam_yubico.c:parse_cfg(765)] flags 1 argc 4
  3. [pam_yubico.c:parse_cfg(767)] argv[0]=id=1
  4. [pam_yubico.c:parse_cfg(767)] argv[1]=urllist=http://hajvmyk01/wsapi/2.0/verify;http://hajvmyk03/wsapi/2.0/verify
  5. [pam_yubico.c:parse_cfg(767)] argv[2]=authfile=/etc/yubikey_mappings/authorized_yubikeys
  6. [pam_yubico.c:parse_cfg(767)] argv[3]=debug
  7. [pam_yubico.c:parse_cfg(768)] id=1
  8. [pam_yubico.c:parse_cfg(769)] key=(null)
  9. [pam_yubico.c:parse_cfg(770)] debug=1
  10. [pam_yubico.c:parse_cfg(771)] alwaysok=0
  11. [pam_yubico.c:parse_cfg(772)] verbose_otp=0
  12. [pam_yubico.c:parse_cfg(773)] try_first_pass=0
  13. [pam_yubico.c:parse_cfg(774)] use_first_pass=0
  14. [pam_yubico.c:parse_cfg(775)] authfile=/etc/yubikey_mappings/authorized_yubikeys
  15. [pam_yubico.c:parse_cfg(776)] ldapserver=(null)
  16. [pam_yubico.c:parse_cfg(777)] ldap_uri=(null)
  17. [pam_yubico.c:parse_cfg(778)] ldapdn=(null)
  18. [pam_yubico.c:parse_cfg(779)] user_attr=(null)
  19. [pam_yubico.c:parse_cfg(780)] yubi_attr=(null)
  20. [pam_yubico.c:parse_cfg(781)] yubi_attr_prefix=(null)
  21. [pam_yubico.c:parse_cfg(782)] url=(null)
  22. [pam_yubico.c:parse_cfg(783)] urllist=http://hajvmyk01/wsapi/2.0/verify;http://hajvmyk03/wsapi/2.0/verify
  23. [pam_yubico.c:parse_cfg(784)] capath=(null)
  24. [pam_yubico.c:parse_cfg(785)] token_id_length=12
  25. [pam_yubico.c:parse_cfg(786)] mode=client
  26. [pam_yubico.c:parse_cfg(787)] chalresp_path=(null)
  27. [pam_yubico.c:pam_sm_authenticate(829)] get user returned: root
  28. [pam_yubico.c:pam_sm_authenticate(972)] conv returned 53 bytes
  29. [pam_yubico.c:pam_sm_authenticate(990)] Skipping first 9 bytes. Length is 53, token_id set to 12 and token OTP always 32.
  30. [pam_yubico.c:pam_sm_authenticate(997)] OTP: vvuficteuultjkhibvulejeeckvtubghtkbgdvjegtgu ID: vvuficteuult
  31. [pam_yubico.c:pam_sm_authenticate(1012)] Extracted a probable system password entered before the OTP - setting item PAM_AUTHTOK
  32. [pam_yubico.c:pam_sm_authenticate(1028)] ykclient return value (0): Success
  33. [pam_yubico.c:authorize_user_token(222)] Using system-wide auth_file /etc/yubikey_mappings/authorized_yubikeys
  34. [pam_yubico.c:check_user_token(179)] Authorization line: root:vvuficteuult
  35. [pam_yubico.c:check_user_token(183)] Matched user: root
  36. [pam_yubico.c:check_user_token(188)] Authorization token: vvuficteuult
  37. [pam_yubico.c:check_user_token(191)] Match user/token as root/vvuficteuult
  38. [pam_yubico.c:pam_sm_authenticate(1089)] done. [Success]
  39. [pam_yubico.c:parse_cfg(764)] called.
  40. [pam_yubico.c:parse_cfg(765)] flags 1 argc 4
  41. [pam_yubico.c:parse_cfg(767)] argv[0]=id=1
  42. [pam_yubico.c:parse_cfg(767)] argv[1]=urllist=http://hajvmyk01/wsapi/2.0/verify;http://hajvmyk03/wsapi/2.0/verify
  43. [pam_yubico.c:parse_cfg(767)] argv[2]=authfile=/etc/yubikey_mappings/authorized_yubikeys
  44. [pam_yubico.c:parse_cfg(767)] argv[3]=debug
  45. [pam_yubico.c:parse_cfg(768)] id=1
  46. [pam_yubico.c:parse_cfg(769)] key=(null)
  47. [pam_yubico.c:parse_cfg(770)] debug=1
  48. [pam_yubico.c:parse_cfg(771)] alwaysok=0
  49. [pam_yubico.c:parse_cfg(772)] verbose_otp=0
  50. [pam_yubico.c:parse_cfg(773)] try_first_pass=0
  51. [pam_yubico.c:parse_cfg(774)] use_first_pass=0
  52. [pam_yubico.c:parse_cfg(775)] authfile=/etc/yubikey_mappings/authorized_yubikeys
  53. [pam_yubico.c:parse_cfg(776)] ldapserver=(null)
  54. [pam_yubico.c:parse_cfg(777)] ldap_uri=(null)
  55. [pam_yubico.c:parse_cfg(778)] ldapdn=(null)
  56. [pam_yubico.c:parse_cfg(779)] user_attr=(null)
  57. [pam_yubico.c:parse_cfg(780)] yubi_attr=(null)
  58. [pam_yubico.c:parse_cfg(781)] yubi_attr_prefix=(null)
  59. [pam_yubico.c:parse_cfg(782)] url=(null)
  60. [pam_yubico.c:parse_cfg(783)] urllist=http://hajvmyk01/wsapi/2.0/verify;http://hajvmyk03/wsapi/2.0/verify
  61. [pam_yubico.c:parse_cfg(784)] capath=(null)
  62. [pam_yubico.c:parse_cfg(785)] token_id_length=12
  63. [pam_yubico.c:parse_cfg(786)] mode=client
  64. [pam_yubico.c:parse_cfg(787)] chalresp_path=(null)
  65. [pam_yubico.c:pam_sm_authenticate(829)] get user returned: root
  66. [pam_yubico.c:pam_sm_authenticate(972)] conv returned 53 bytes
  67. [pam_yubico.c:pam_sm_authenticate(990)] Skipping first 9 bytes. Length is 53, token_id set to 12 and token OTP always 32.
  68. [pam_yubico.c:pam_sm_authenticate(997)] OTP: vvuficteuultjkhibvulejeeckvtubghtkbgdvjegtgu ID: vvuficteuult
  69. [pam_yubico.c:pam_sm_authenticate(1012)] Extracted a probable system password entered before the OTP - setting item PAM_AUTHTOK
  70. [pam_yubico.c:pam_sm_authenticate(1028)] ykclient return value (2): Yubikey OTP was replayed (REPLAYED_OTP)
  71. [pam_yubico.c:pam_sm_authenticate(1089)] done. [Authentication failure]
  72. [pam_yubico.c:parse_cfg(764)] called.
  73. [pam_yubico.c:parse_cfg(765)] flags 1 argc 4
  74. [pam_yubico.c:parse_cfg(767)] argv[0]=id=1
  75. [pam_yubico.c:parse_cfg(767)] argv[1]=urllist=http://hajvmyk01/wsapi/2.0/verify;http://hajvmyk03/wsapi/2.0/verify
  76. [pam_yubico.c:parse_cfg(767)] argv[2]=authfile=/etc/yubikey_mappings/authorized_yubikeys
  77. [pam_yubico.c:parse_cfg(767)] argv[3]=debug
  78. [pam_yubico.c:parse_cfg(768)] id=1
  79. [pam_yubico.c:parse_cfg(769)] key=(null)
  80. [pam_yubico.c:parse_cfg(770)] debug=1
  81. [pam_yubico.c:parse_cfg(771)] alwaysok=0
  82. [pam_yubico.c:parse_cfg(772)] verbose_otp=0
  83. [pam_yubico.c:parse_cfg(773)] try_first_pass=0
  84. [pam_yubico.c:parse_cfg(774)] use_first_pass=0
  85. [pam_yubico.c:parse_cfg(775)] authfile=/etc/yubikey_mappings/authorized_yubikeys
  86. [pam_yubico.c:parse_cfg(776)] ldapserver=(null)
  87. [pam_yubico.c:parse_cfg(777)] ldap_uri=(null)
  88. [pam_yubico.c:parse_cfg(778)] ldapdn=(null)
  89. [pam_yubico.c:parse_cfg(779)] user_attr=(null)
  90. [pam_yubico.c:parse_cfg(780)] yubi_attr=(null)
  91. [pam_yubico.c:parse_cfg(781)] yubi_attr_prefix=(null)
  92. [pam_yubico.c:parse_cfg(782)] url=(null)
  93. [pam_yubico.c:parse_cfg(783)] urllist=http://hajvmyk01/wsapi/2.0/verify;http://hajvmyk03/wsapi/2.0/verify
  94. [pam_yubico.c:parse_cfg(784)] capath=(null)
  95. [pam_yubico.c:parse_cfg(785)] token_id_length=12
  96. [pam_yubico.c:parse_cfg(786)] mode=client
  97. [pam_yubico.c:parse_cfg(787)] chalresp_path=(null)
  98. [pam_yubico.c:pam_sm_authenticate(829)] get user returned: root
  99. [pam_yubico.c:pam_sm_authenticate(972)] conv returned 53 bytes
  100. [pam_yubico.c:pam_sm_authenticate(990)] Skipping first 9 bytes. Length is 53, token_id set to 12 and token OTP always 32.
  101. [pam_yubico.c:pam_sm_authenticate(997)] OTP: vvuficteuultjkhibvulejeeckvtubghtkbgdvjegtgu ID: vvuficteuult
  102. [pam_yubico.c:pam_sm_authenticate(1012)] Extracted a probable system password entered before the OTP - setting item PAM_AUTHTOK
  103. [pam_yubico.c:pam_sm_authenticate(1028)] ykclient return value (2): Yubikey OTP was replayed (REPLAYED_OTP)
  104. [pam_yubico.c:pam_sm_authenticate(1089)] done. [Authentication failure]
  105. [pam_yubico.c:parse_cfg(764)] called.
  106. [pam_yubico.c:parse_cfg(765)] flags 1 argc 4
  107. [pam_yubico.c:parse_cfg(767)] argv[0]=id=1
  108. [pam_yubico.c:parse_cfg(767)] argv[1]=urllist=http://hajvmyk01/wsapi/2.0/verify
  109. [pam_yubico.c:parse_cfg(767)] argv[2]=authfile=/etc/yubikey_mappings/authorized_yubikeys
  110. [pam_yubico.c:parse_cfg(767)] argv[3]=debug
  111. [pam_yubico.c:parse_cfg(768)] id=1
  112. [pam_yubico.c:parse_cfg(769)] key=(null)
  113. [pam_yubico.c:parse_cfg(770)] debug=1
  114. [pam_yubico.c:parse_cfg(771)] alwaysok=0
  115. [pam_yubico.c:parse_cfg(772)] verbose_otp=0
  116. [pam_yubico.c:parse_cfg(773)] try_first_pass=0
  117. [pam_yubico.c:parse_cfg(774)] use_first_pass=0
  118. [pam_yubico.c:parse_cfg(775)] authfile=/etc/yubikey_mappings/authorized_yubikeys
  119. [pam_yubico.c:parse_cfg(776)] ldapserver=(null)
  120. [pam_yubico.c:parse_cfg(777)] ldap_uri=(null)
  121. [pam_yubico.c:parse_cfg(778)] ldapdn=(null)
  122. [pam_yubico.c:parse_cfg(779)] user_attr=(null)
  123. [pam_yubico.c:parse_cfg(780)] yubi_attr=(null)
  124. [pam_yubico.c:parse_cfg(781)] yubi_attr_prefix=(null)
  125. [pam_yubico.c:parse_cfg(782)] url=(null)
  126. [pam_yubico.c:parse_cfg(783)] urllist=http://hajvmyk01/wsapi/2.0/verify
  127. [pam_yubico.c:parse_cfg(784)] capath=(null)
  128. [pam_yubico.c:parse_cfg(785)] token_id_length=12
  129. [pam_yubico.c:parse_cfg(786)] mode=client
  130. [pam_yubico.c:parse_cfg(787)] chalresp_path=(null)
  131. [pam_yubico.c:pam_sm_authenticate(829)] get user returned: root
  132. [pam_yubico.c:pam_sm_authenticate(972)] conv returned 53 bytes
  133. [pam_yubico.c:pam_sm_authenticate(990)] Skipping first 9 bytes. Length is 53, token_id set to 12 and token OTP always 32.
  134. [pam_yubico.c:pam_sm_authenticate(997)] OTP: vvuficteuultjkhibvulejeeckvtubghtkbgdvjegtgu ID: vvuficteuult
  135. [pam_yubico.c:pam_sm_authenticate(1012)] Extracted a probable system password entered before the OTP - setting item PAM_AUTHTOK
  136. [pam_yubico.c:pam_sm_authenticate(1028)] ykclient return value (2): Yubikey OTP was replayed (REPLAYED_OTP)
  137. [pam_yubico.c:pam_sm_authenticate(1089)] done. [Authentication failure]
  138. [pam_yubico.c:parse_cfg(764)] called.
  139. [pam_yubico.c:parse_cfg(765)] flags 1 argc 4
  140. [pam_yubico.c:parse_cfg(767)] argv[0]=id=1
  141. [pam_yubico.c:parse_cfg(767)] argv[1]=urllist=http://hajvmyk01/wsapi/2.0/verify
  142. [pam_yubico.c:parse_cfg(767)] argv[2]=authfile=/etc/yubikey_mappings/authorized_yubikeys
  143. [pam_yubico.c:parse_cfg(767)] argv[3]=debug
  144. [pam_yubico.c:parse_cfg(768)] id=1
  145. [pam_yubico.c:parse_cfg(769)] key=(null)
  146. [pam_yubico.c:parse_cfg(770)] debug=1
  147. [pam_yubico.c:parse_cfg(771)] alwaysok=0
  148. [pam_yubico.c:parse_cfg(772)] verbose_otp=0
  149. [pam_yubico.c:parse_cfg(773)] try_first_pass=0
  150. [pam_yubico.c:parse_cfg(774)] use_first_pass=0
  151. [pam_yubico.c:parse_cfg(775)] authfile=/etc/yubikey_mappings/authorized_yubikeys
  152. [pam_yubico.c:parse_cfg(776)] ldapserver=(null)
  153. [pam_yubico.c:parse_cfg(777)] ldap_uri=(null)
  154. [pam_yubico.c:parse_cfg(778)] ldapdn=(null)
  155. [pam_yubico.c:parse_cfg(779)] user_attr=(null)
  156. [pam_yubico.c:parse_cfg(780)] yubi_attr=(null)
  157. [pam_yubico.c:parse_cfg(781)] yubi_attr_prefix=(null)
  158. [pam_yubico.c:parse_cfg(782)] url=(null)
  159. [pam_yubico.c:parse_cfg(783)] urllist=http://hajvmyk01/wsapi/2.0/verify
  160. [pam_yubico.c:parse_cfg(784)] capath=(null)
  161. [pam_yubico.c:parse_cfg(785)] token_id_length=12
  162. [pam_yubico.c:parse_cfg(786)] mode=client
  163. [pam_yubico.c:parse_cfg(787)] chalresp_path=(null)
  164. [pam_yubico.c:pam_sm_authenticate(829)] get user returned: root
  165. [pam_yubico.c:pam_sm_authenticate(972)] conv returned 53 bytes
  166. [pam_yubico.c:pam_sm_authenticate(990)] Skipping first 9 bytes. Length is 53, token_id set to 12 and token OTP always 32.
  167. [pam_yubico.c:pam_sm_authenticate(997)] OTP: vvuficteuultjkhibvulejeeckvtubghtkbgdvjegtgu ID: vvuficteuult
  168. [pam_yubico.c:pam_sm_authenticate(1012)] Extracted a probable system password entered before the OTP - setting item PAM_AUTHTOK
  169. [pam_yubico.c:pam_sm_authenticate(1028)] ykclient return value (2): Yubikey OTP was replayed (REPLAYED_OTP)
  170. [pam_yubico.c:pam_sm_authenticate(1089)] done. [Authentication failure]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement