Hi

On Mon, Jul 5, 2021 at 11:58 AM David Mehler <dave.meh...@gmail.com> wrote:

> Hello,
>
> Thank you for your reply. I do not have a plugin-auth-pam I've run a
> find for it.Where would this be at, this would be perfect, espeecially
> if I'm understanding your response right each client certificate would
> then be bound to a specific username and password which would have to
> be validated serverside.
>

The plugin location may depend on the distribution. In ubuntu and debian it
may be in
 /usr/lib/x86_64-linux-gnu/openvpn/plugins/openvpn-plugin-auth-pam.so

Note that you need a fairly recent version of OpenVPN (iirc 2.4.10 or
later) for the plugin to take apart the password and PIN and present it to
PAM. You will need:

In client config:
auth-user-pass
static challenge "Challenge text (eg., Enter the auth code)" 1

In server config

*plugin /usr/lib/openvpn/openvpn-plugin-auth-pam.so
"openvpn login:USERNAME Password: PASSWORD Verification OTP"*

This assumes your PAM module prompts for login:, Password: and, say,
Verification code:
(See README.auth-pam distributed with OpenVPN for how to format the
above line to match your pam setup).

There is a lot of discussion of this in the users-list. Search the list
archive. One of the latest threads is
https://sourceforge.net/p/openvpn/mailman/message/37266238/

For older versions of PAM plugin which does not understand OTP, one option
is to ask the user to input the password and OTP as a single string and
then take it apart in your PAM module. In that case remove static challenge
from user config. But this is no longer required, nor recommended -- use
2.4.10+ or 2.5.x on the server.

Selva
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to