Great. I believe this question has come up before, so I added some notes to the pam_oath README:
http://git.savannah.gnu.org/cgit/oath-toolkit.git/commit/?id=3fa6aa595b76291db857522e6209bf0b1dd4399b Thanks, /Simon 谭中一 <[email protected]> writes: > I have succeed solved the problem. > It caused by the SELinux, and I close the SELinux. > # /usr/sbin/setenforce 0. > Then SSH works normally with *pam_oath.so.* > > 2011/11/21 Christian Hesse <[email protected]> > >> Simon Josefsson <[email protected]> on Mon, 21 Nov 2011 14:25:35 +0100: >> > 谭中一 <[email protected]> writes: >> > >> > > Hi,all >> > > >> > > I seek a solution for ssh with otp,then I found oath toolkit. >> > > >> > > My machine : CentOS6.0(in Vbox4.1.6),OpenSSH_5.3p1, OpenSSL >> > > 1.0.0-fips, >> > > >> > > follow the README, I Building and installation >> > > oath-toolkit-1.10.4< >> http://download.savannah.gnu.org/releases/oath-toolkit/oath-toolkit-1.10.4.tar.gz >> > >> > > . >> > > I had successful configure the su and login use pam_oath two >> > > factor authentication. >> > > but when I configure the *ssh* and login use pam_oath, I can't pass the >> > > authentication. >> > > >> > > this is my /etc/pam.d/sshd content. >> > >> > Hello and thanks for your interest! Are you sure that your OpenSSH uses >> > PAM at all? Make sure /etc/ssh/sshd_config has 'UsePAM yes' in it. >> >> And it also needs: >> >> ChallengeResponseAuthentication yes >> -- >> Schoene Gruesse >> Chris >>
