I have succeed solved the problem.
It caused by the SELinux, and   I close the SELinux.
# /usr/sbin/setenforce 0.
Then SSH works normally with *pam_oath.so.*

2011/11/21 Christian Hesse <[email protected]>

> Simon Josefsson <[email protected]> on Mon, 21 Nov 2011 14:25:35 +0100:
> > 谭中一 <[email protected]> writes:
> >
> > > Hi,all
> > >
> > > I seek a solution for ssh with otp,then I found oath toolkit.
> > >
> > >      My machine : CentOS6.0(in Vbox4.1.6),OpenSSH_5.3p1, OpenSSL
> > > 1.0.0-fips,
> > >
> > > follow the README, I Building and installation
> > > oath-toolkit-1.10.4<
> http://download.savannah.gnu.org/releases/oath-toolkit/oath-toolkit-1.10.4.tar.gz
> >
> > > .
> > > I had successful configure the su and login use pam_oath two
> > > factor authentication.
> > > but when I configure the *ssh* and login use pam_oath, I can't pass the
> > > authentication.
> > >
> > >      this is my /etc/pam.d/sshd content.
> >
> > Hello and thanks for your interest!  Are you sure that your OpenSSH uses
> > PAM at all?  Make sure /etc/ssh/sshd_config has 'UsePAM yes' in it.
>
> And it also needs:
>
> ChallengeResponseAuthentication yes
> --
> Schoene Gruesse
> Chris
>

Reply via email to