Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

pam_oath-2.6.7-1.2 RPM for armv7hl

From OpenSuSE Ports Tumbleweed for armv7hl

Name: pam_oath Distribution: openSUSE Tumbleweed
Version: 2.6.7 Vendor: openSUSE
Release: 1.2 Build date: Thu May 27 22:26:03 2021
Group: Productivity/Networking/Security Build host: armbuild22
Size: 57813 Source RPM: oath-toolkit-2.6.7-1.2.src.rpm
Packager: http://bugs.opensuse.org
Url: http://www.nongnu.org/oath-toolkit/
Summary: PAM module for pluggable login authentication for OATH
The OATH Toolkit makes it possible to build one-time password
authentication systems.

This subpackage contains a module to integrate OATH into PAM.

Provides

Requires

License

GPL-3.0-or-later

Changelog

* Sun May 02 2021 Martin Hauke <mardnh@gmx.de>
  - Update to version 2.6.7
    * pam_oath: Support variables in usersfile string parameter.
      These changes introduce the ${USER} and ${HOME} placeholder
      values for the usersfile string in the pam_oath configuration
      file. The placeholder values allow the user credentials file
      to be stored in a file path that is relative to the user, and
      mimics similar behavior found in google-authenticator-libpam.
      The motivation for these changes is to allow for
      non-privileged processes to use pam_oath (e.g., for 2FA with
      xscreensaver). Non-privileged and non-suid programs are
      unable to use pam_oath. These changes are a proposed
      alternative to a suid helper binary as well.
    * doc: Fix project URL in man pages.
    * build: Drop use of libxml's AM_PATH_XML2 in favor of pkg-config.
    * build: Modernize autotools usage.
      Most importantly, no longer use -Werror with AM_INIT_AUTOMAKE
      to make rebuilding from source more safe with future automake
      versions.
    * Updated gnulib files.
* Wed Jan 20 2021 Martin Hauke <mardnh@gmx.de>
  - Update to version 2.6.6
    * oathtool: Support for reading KEY and OTP from standard input
      or filename.  KEY and OTP may now be given as '-' to mean
      stdin, or @FILE to read from a particular file.  This is
      recommended on multi-user systems, since secrets as command
      line parameters leak.
    * pam_oath: Fix unlikely logic fail on out of memory conditions.
* Tue Dec 29 2020 Martin Hauke <mardnh@gmx.de>
  - Update to version 2.6.5
    * oathtool: Support for reading KEY and OTP from standard input
      or filename.
      KEY and OTP may now be given as '-' to mean stdin, or @FILE to
      read from a particular file.  This is recommended on multi-user
      systems, since secrets as command line parameters leak.
    * pam_oath: Fix unlikely logic fail on out of memory conditions.
    * Doc fixes.
  - Update to version 2.6.4
    * libpskc: New --with-xmlsec-crypto-engine to hard-code crypto
      engine.  Use it like --with-xmlsec-crypto-engine=gnutls or
    - -with-xmlsec-crypto-engine=openssl if the default dynamic
      loading fails because of runtime linker search path issues.
    * oathtool --totp --verbose now prints TOTP hash mode.
    * oathtool: Hash names (e.g., SHA256) for --totp are now upper
      case.  Lower/mixed case hash names are supported for
      compatibility.
    * pam_oath: Fail gracefully for missing users.
      This allows you to incrementally add support for OATH
      authentication instead of forcing it on all users.
    * Fix libpskc memory corruption bug.
    * Fix man pages.
    * Build fixes.
  - Update to version 2.6.3
    * pam_oath: Fix self-tests.
  - Drop not longer needed patches:
    * 0001-Fix-no-return-in-nonvoid-function-errors-reported-by.patch
    * 0003-pam_oath-assign-safe-default-to-alwaysok-config-memb.patch
    * 0002-update_gnulibs_files.patch
    * gnulib-libio.patch
  - Use source verification
  - Use proper source URLs
* Mon Aug 06 2018 schwab@suse.de
  - gnulib-libio.patch: Update gnulib for libio.h removal
* Thu Jul 05 2018 matthias.gerstner@suse.com
  - Add patch 0003-pam_oath-assign-safe-default-to-alwaysok-config-memb.patch:
    - fix potential security issue in low memory situation (bsc#1089114)
* Sun May 20 2018 julio@juliogonzalez.es
  - Fix build for openSUSE Leap 42.2 and 42.3
* Wed Apr 18 2018 jengelh@inai.de
  - Trim/update descriptions. Fix RPM groups. Remove useless
    - -with-pic.
* Fri Apr 13 2018 mpluskal@suse.com
  - Run spe-cleaner
  - Drop useless conditions
* Wed Apr 11 2018 ncutler@suse.com
  - bring License line into closer accordance with actual licenses
    mentioned in the tarball
  - split off xml/pskc/ directory/files from liboath0 into a separate
    "oath-toolkit-xml" subpackage to prevent conflicts if two versions of the
    liboath library were ever installed at the same time
* Wed Apr 11 2018 ncutler@suse.com
  - use %license instead of %doc to package license-related files
* Tue Jan 16 2018 dmarcoux@posteo.de
  - Add patch (last commit which changed source, not released in 2.6.2):
    - 0002-update_gnulibs_files.patch
* Mon Aug 29 2016 mardnh@gmx.de
  - Update to Version 2.6.2
    - no changes in upstream code
  - Fix RPM groups for -devel packages
  - build with libpskc on supported suse-versions
  - Add patch:
    - 0001-Fix-no-return-in-nonvoid-function-errors-reported-by.patch
* Wed Sep 09 2015 t.gruner@katodev.de
  - Update to Version 2.6.1 (released 2015-07-31)
    - liboath: Fix 'make check' on 32-bit systems.
  - Version 2.6.0 (released 2015-05-19)
    - liboath: Support TOTP with HMAC-SHA256 and HMAC-SHA512.
      This adds new APIs oath_totp_generate2, oath_totp_validate4 and
      oath_totp_validate4_callback.
    - oathtool: The --totp parameter now take an optional argument to specify MAC.
      For example use --totp=sha256 to use HMAC-SHA256.  When --totp is used
      the default HMAC-SHA1 is used, as before.
    - pam_oath: Mention in README that you shouldn't use insecure keys.
    - pam_oath: Check return value from strdup.
    - The files 'gdoc' and 'expect.oath' are now included in the tarball.
* Sat Jan 24 2015 mardnh@gmx.de
  - Update to version 2.4.1:
    + liboath: Fix usersfile bug that caused it to update the wrong line.
      When an usersfile contain multiple lines for the same user but with an
      unparseable token type (e.g., HOTP vs TOTP), the code would update the
      wrong line of the file.  Since the then updated line could be a
      commented out line, this can lead to the same OTP being accepted
      multiple times which is a security vulnerability.  Reported by Bas van
      Schaik <bas@sj-vs.net> and patch provided by Ilkka Virta
      <itvirta@iki.fi>.  CVE-2013-7322
* Fri Jul 11 2014 darin@darins.net
  - Ran through spec-cleaner
* Wed Oct 23 2013 vuntz@opensuse.org
  - Update to version 2.4.0:
    + liboath: Add new API methods for validating TOTP OTPs
  - Changes from version 2.2.0:
    + libpskc: Add functions for setting PSKC data.
    + liboath: Permit different passwords for different tokens for
      the same user.
    + liboath: Make header file usable from C++ (extern "C" guard).
    + build: Improve building from git with most recent automake and
      gengetopt.
    + build: Valgrind is not enabled by default.
  - Fix license: libraries are LGPL-2.1+ and everything else is
    GPL-3.0+. Also properly package the COPYING files.
  - Prepare build libpskc, hidden under a %{build_pskc} define:
    + Add libxml2-devel and pkgconfig(xmlsec1) BuildRequires.
    + Create libpskc0 and libpskc-devel subpackages.
    + Define %{build_pskc} to 0 since we don't have libxmlsec1 yet.
  - Rework summaries and descriptions.
* Sat Jun 15 2013 bwiedemann@suse.com
  - Update to version 2.0.2
* Fri Feb 11 2011 cristian.rodriguez@opensuse.org
  - Update to version 1.4.6
* Sat Feb 05 2011 cristian.rodriguez@opensuse.org
  - Use libgcrypt for crypto
* Sat Feb 05 2011 cristian.rodriguez@opensuse.org
  - Initial version

Files

/lib/security/pam_oath.so
/usr/share/doc/packages/pam_oath
/usr/share/doc/packages/pam_oath/README
/usr/share/licenses/pam_oath
/usr/share/licenses/pam_oath/COPYING


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Nov 30 23:41:30 2021