From owner-freebsd-ports-bugs@FreeBSD.ORG Mon Jan 28 12:00:01 2013 Return-Path: Delivered-To: freebsd-ports-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id F353F96 for ; Mon, 28 Jan 2013 12:00:00 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id D9950288 for ; Mon, 28 Jan 2013 12:00:00 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.6/8.14.6) with ESMTP id r0SC00WC046504 for ; Mon, 28 Jan 2013 12:00:00 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.6/8.14.6/Submit) id r0SC005e046499; Mon, 28 Jan 2013 12:00:00 GMT (envelope-from gnats) Resent-Date: Mon, 28 Jan 2013 12:00:00 GMT Resent-Message-Id: <201301281200.r0SC005e046499@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Matt Stofko Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 495EDFD5 for ; Mon, 28 Jan 2013 11:56:03 +0000 (UTC) (envelope-from matts@phjeer.us) Received: from phjeer.us (phjeer.us [184.105.237.83]) by mx1.freebsd.org (Postfix) with ESMTP id 2B85325C for ; Mon, 28 Jan 2013 11:56:03 +0000 (UTC) Received: from phjeer.us (localhost [127.0.0.1]) by phjeer.us (8.14.5/8.14.5) with ESMTP id r0SBtucD025130 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 28 Jan 2013 03:55:56 -0800 (PST) (envelope-from matts@phjeer.us) Received: (from matts@localhost) by phjeer.us (8.14.5/8.14.5/Submit) id r0SBtur2025129; Mon, 28 Jan 2013 03:55:56 -0800 (PST) (envelope-from matts) Message-Id: <201301281155.r0SBtur2025129@phjeer.us> Date: Mon, 28 Jan 2013 03:55:56 -0800 (PST) From: Matt Stofko To: FreeBSD-gnats-submit@freebsd.org X-Send-Pr-Version: 3.113 Subject: ports/175650: New port: security/pam_yubico PAM module to auth with a YubiKey X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list Reply-To: Matt Stofko List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 28 Jan 2013 12:00:01 -0000 >Number: 175650 >Category: ports >Synopsis: New port: security/pam_yubico PAM module to auth with a YubiKey >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Mon Jan 28 12:00:00 UTC 2013 >Closed-Date: >Last-Modified: >Originator: Matt Stofko >Release: FreeBSD 8.3-RELEASE-p5 amd64 >Organization: mjslabs.com >Environment: System: FreeBSD phjeer.us 8.3-RELEASE-p5 FreeBSD 8.3-RELEASE-p5 #0: Fri Nov 23 12:36:33 PST 2012 root@phjeer.us:/usr/obj/usr/src/sys/DAEMON amd64 >Description: This module allows the use of a Yubico Yubikey device to authenticate to the PAM system. WWW: http://yubico.com >How-To-Repeat: >Fix: --- pam_yubico.shar begins here --- # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # pam_yubico # pam_yubico/Makefile # pam_yubico/distinfo # pam_yubico/pkg-descr # pam_yubico/pkg-message # echo c - pam_yubico mkdir -p pam_yubico > /dev/null 2>&1 echo x - pam_yubico/Makefile sed 's/^X//' >pam_yubico/Makefile << '710b84d5d18db093c3b32bfec8af9bb7' X# $FreeBSD$ X XPORTNAME= pam_yubico XPORTVERSION= 2.12 XCATEGORIES= security XMASTER_SITES= GOOGLE_CODE X XMAINTAINER= matt@mjslabs.com XCOMMENT= PAM module for authenticating with a Yubico YubiKey X XLICENSE= BSD X XLIB_DEPENDS= ykclient:${PORTSDIR}/security/ykclient \ X ykpers-1:${PORTSDIR}/security/ykpers \ X yubikey:${PORTSDIR}/security/libyubikey X XGNU_CONFIGURE= yes XUSE_PKGCONFIG= build X XPLIST_FILES= include/drop_privs.h \ X include/util.h \ X lib/security/pam_yubico.la \ X lib/security/pam_yubico.so XPLIST_DIRS= lib/security X XPROJECTHOST= yubico-pam X XOPTIONS_DEFINE= CR LDAP XCR_DESC= include challenge/response support XOPTIONS_DEFAULT=CR LDAP X X.include X X.if ! ${PORT_OPTIONS:MCR} XCONFIGURE_ARGS+=--without-cr X.else XMAN1= ykpamcfg.1 XPLIST_FILES+= bin/ykpamcfg X.endif X X.if ! ${PORT_OPTIONS:MLDAP} XCONFIGURE_ARGS+=--without-ldap X.endif X Xregression-test: build X @(cd ${WRKSRC}; ${MAKE} check) X Xpost-install: X @${CAT} ${PKGDIR}/pkg-message X X.include 710b84d5d18db093c3b32bfec8af9bb7 echo x - pam_yubico/distinfo sed 's/^X//' >pam_yubico/distinfo << '3f8771f8322edc47d8e2a6c7c209a57f' XSHA256 (pam_yubico-2.12.tar.gz) = b3efb41b72191b2ccb0b9cde691bd4ee6df5d8245254dd4f4c4e4bb8886c25c3 XSIZE (pam_yubico-2.12.tar.gz) = 367164 3f8771f8322edc47d8e2a6c7c209a57f echo x - pam_yubico/pkg-descr sed 's/^X//' >pam_yubico/pkg-descr << '9a213d19305ab13a1ae24657070496c5' XThe Yubico authentication device Yubikey generates one-time passwords that can Xbe used for authentication. This module allows you to use the Yubikey device to Xauthenticate to the PAM system. X XWWW: https://code.google.com/p/yubico-pam/ 9a213d19305ab13a1ae24657070496c5 echo x - pam_yubico/pkg-message sed 's/^X//' >pam_yubico/pkg-message << '0ce61b48a081002ed812e9163a61ce90' X XFor setup instructions on authenticating with your YubiKey, see: Xhttps://github.com/Yubico/yubico-pam/blob/master/README X 0ce61b48a081002ed812e9163a61ce90 exit --- pam_yubico.shar ends here --- >Release-Note: >Audit-Trail: >Unformatted: