I have succeed solved the problem. It caused by the SELinux, and I close the SELinux. # /usr/sbin/setenforce 0. Then SSH works normally with *pam_oath.so.*
2011/11/21 Christian Hesse <[email protected]> > Simon Josefsson <[email protected]> on Mon, 21 Nov 2011 14:25:35 +0100: > > 谭中一 <[email protected]> writes: > > > > > Hi,all > > > > > > I seek a solution for ssh with otp,then I found oath toolkit. > > > > > > My machine : CentOS6.0(in Vbox4.1.6),OpenSSH_5.3p1, OpenSSL > > > 1.0.0-fips, > > > > > > follow the README, I Building and installation > > > oath-toolkit-1.10.4< > http://download.savannah.gnu.org/releases/oath-toolkit/oath-toolkit-1.10.4.tar.gz > > > > > . > > > I had successful configure the su and login use pam_oath two > > > factor authentication. > > > but when I configure the *ssh* and login use pam_oath, I can't pass the > > > authentication. > > > > > > this is my /etc/pam.d/sshd content. > > > > Hello and thanks for your interest! Are you sure that your OpenSSH uses > > PAM at all? Make sure /etc/ssh/sshd_config has 'UsePAM yes' in it. > > And it also needs: > > ChallengeResponseAuthentication yes > -- > Schoene Gruesse > Chris >
