===========================================
pam_yubico 2.19: tests/test-suite.log
===========================================
# TOTAL: 3
# PASS: 2
# SKIP: 0
# XFAIL: 0
# FAIL: 1
# XPASS: 0
# ERROR: 0
.. contents:: :depth: 2
FAIL: pam_test
==============
[pam_yubico.c:parse_cfg(729)] called.
[pam_yubico.c:parse_cfg(730)] flags 0 argc 4
[pam_yubico.c:parse_cfg(732)] argv[0]=id=1
[pam_yubico.c:parse_cfg(732)] argv[1]=url=http://localhost:17502/wsapi/2/verify?id=%d&otp=%s
[pam_yubico.c:parse_cfg(732)] argv[2]=authfile=./aux/authfile
[pam_yubico.c:parse_cfg(732)] argv[3]=debug
[pam_yubico.c:parse_cfg(733)] id=1
[pam_yubico.c:parse_cfg(734)] key=(null)
[pam_yubico.c:parse_cfg(735)] debug=1
[pam_yubico.c:parse_cfg(736)] alwaysok=0
[pam_yubico.c:parse_cfg(737)] verbose_otp=0
[pam_yubico.c:parse_cfg(738)] try_first_pass=0
[pam_yubico.c:parse_cfg(739)] use_first_pass=0
[pam_yubico.c:parse_cfg(740)] authfile=./aux/authfile
[pam_yubico.c:parse_cfg(741)] ldapserver=(null)
[pam_yubico.c:parse_cfg(742)] ldap_uri=(null)
[pam_yubico.c:parse_cfg(743)] ldap_bind_user=(null)
[pam_yubico.c:parse_cfg(744)] ldap_bind_password=(null)
[pam_yubico.c:parse_cfg(745)] ldap_filter=(null)
[pam_yubico.c:parse_cfg(746)] ldap_cacertfile=(null)
[pam_yubico.c:parse_cfg(747)] ldapdn=(null)
[pam_yubico.c:parse_cfg(748)] user_attr=(null)
[pam_yubico.c:parse_cfg(749)] yubi_attr=(null)
[pam_yubico.c:parse_cfg(750)] yubi_attr_prefix=(null)
[pam_yubico.c:parse_cfg(751)] url=http://localhost:17502/wsapi/2/verify?id=%d&otp=%s
[pam_yubico.c:parse_cfg(752)] urllist=(null)
[pam_yubico.c:parse_cfg(753)] capath=(null)
[pam_yubico.c:parse_cfg(754)] token_id_length=12
[pam_yubico.c:parse_cfg(755)] mode=client
[pam_yubico.c:parse_cfg(756)] chalresp_path=(null)
[pam_yubico.c:pam_sm_authenticate(787)] pam_yubico version: 2.19
in pam_get_user()
[pam_yubico.c:pam_sm_authenticate(802)] get user returned: foo
in pam_get_item() 5
in conv_func()
[pam_yubico.c:pam_sm_authenticate(949)] conv returned 44 bytes
[pam_yubico.c:pam_sm_authenticate(967)] Skipping first 0 bytes. Length is 44, token_id set to 12 and token OTP always 32.
[pam_yubico.c:pam_sm_authenticate(974)] OTP: vvincredibletrerdegkkrkkneieultcjdghrejjbckh ID: vvincredible
[pam_yubico.c:pam_sm_authenticate(1004)] ykclient return value (0): Success
[pam_yubico.c:authorize_user_token(151)] Using system-wide auth_file ./aux/authfile
[util.c:check_user_token(151)] Authorization line: foo:vvincredible
[util.c:check_user_token(156)] Matched user: foo
[util.c:check_user_token(162)] Authorization token: vvincredible
[util.c:check_user_token(166)] Match user/token as foo/vvincredible
[pam_yubico.c:pam_sm_authenticate(1072)] in pam_strerror()
done. [error]
in pam_set_data() yubico_setcred_return
[pam_yubico.c:parse_cfg(729)] called.
[pam_yubico.c:parse_cfg(730)] flags 0 argc 4
[pam_yubico.c:parse_cfg(732)] argv[0]=id=1
[pam_yubico.c:parse_cfg(732)] argv[1]=urllist=http://localhost:17502/wsapi/2/verify;http://localhost:30559/wsapi/2/verify
[pam_yubico.c:parse_cfg(732)] argv[2]=authfile=./aux/authfile
[pam_yubico.c:parse_cfg(732)] argv[3]=debug
[pam_yubico.c:parse_cfg(733)] id=1
[pam_yubico.c:parse_cfg(734)] key=(null)
[pam_yubico.c:parse_cfg(735)] debug=1
[pam_yubico.c:parse_cfg(736)] alwaysok=0
[pam_yubico.c:parse_cfg(737)] verbose_otp=0
[pam_yubico.c:parse_cfg(738)] try_first_pass=0
[pam_yubico.c:parse_cfg(739)] use_first_pass=0
[pam_yubico.c:parse_cfg(740)] authfile=./aux/authfile
[pam_yubico.c:parse_cfg(741)] ldapserver=(null)
[pam_yubico.c:parse_cfg(742)] ldap_uri=(null)
[pam_yubico.c:parse_cfg(743)] ldap_bind_user=(null)
[pam_yubico.c:parse_cfg(744)] ldap_bind_password=(null)
[pam_yubico.c:parse_cfg(745)] ldap_filter=(null)
[pam_yubico.c:parse_cfg(746)] ldap_cacertfile=(null)
[pam_yubico.c:parse_cfg(747)] ldapdn=(null)
[pam_yubico.c:parse_cfg(748)] user_attr=(null)
[pam_yubico.c:parse_cfg(749)] yubi_attr=(null)
[pam_yubico.c:parse_cfg(750)] yubi_attr_prefix=(null)
[pam_yubico.c:parse_cfg(751)] url=(null)
[pam_yubico.c:parse_cfg(752)] urllist=http://localhost:17502/wsapi/2/verify;http://localhost:30559/wsapi/2/verify
[pam_yubico.c:parse_cfg(753)] capath=(null)
[pam_yubico.c:parse_cfg(754)] token_id_length=12
[pam_yubico.c:parse_cfg(755)] mode=client
[pam_yubico.c:parse_cfg(756)] chalresp_path=(null)
[pam_yubico.c:pam_sm_authenticate(787)] pam_yubico version: 2.19
in pam_get_user()
[pam_yubico.c:pam_sm_authenticate(802)] get user returned: foo
in pam_get_item() 5
in conv_func()
[pam_yubico.c:pam_sm_authenticate(949)] conv returned 44 bytes
[pam_yubico.c:pam_sm_authenticate(967)] Skipping first 0 bytes. Length is 44, token_id set to 12 and token OTP always 32.
[pam_yubico.c:pam_sm_authenticate(974)] OTP: vvincredibletrerdegkkrkkneieultcjdghrejjbckh ID: vvincredible
[pam_yubico.c:pam_sm_authenticate(1004)] ykclient return value (0): Success
[pam_yubico.c:authorize_user_token(151)] Using system-wide auth_file ./aux/authfile
[util.c:check_user_token(151)] Authorization line: foo:vvincredible
[util.c:check_user_token(156)] Matched user: foo
[util.c:check_user_token(162)] Authorization token: vvincredible
[util.c:check_user_token(166)] Match user/token as foo/vvincredible
[pam_yubico.c:pam_sm_authenticate(1072)] in pam_strerror()
done. [error]
in pam_set_data() yubico_setcred_return
[pam_yubico.c:parse_cfg(729)] called.
[pam_yubico.c:parse_cfg(730)] flags 0 argc 4
[pam_yubico.c:parse_cfg(732)] argv[0]=id=1
[pam_yubico.c:parse_cfg(732)] argv[1]=urllist=http://localhost:30559/wsapi/2/verify;http://localhost:17502/wsapi/2/verify
[pam_yubico.c:parse_cfg(732)] argv[2]=authfile=./aux/authfile
[pam_yubico.c:parse_cfg(732)] argv[3]=debug
[pam_yubico.c:parse_cfg(733)] id=1
[pam_yubico.c:parse_cfg(734)] key=(null)
[pam_yubico.c:parse_cfg(735)] debug=1
[pam_yubico.c:parse_cfg(736)] alwaysok=0
[pam_yubico.c:parse_cfg(737)] verbose_otp=0
[pam_yubico.c:parse_cfg(738)] try_first_pass=0
[pam_yubico.c:parse_cfg(739)] use_first_pass=0
[pam_yubico.c:parse_cfg(740)] authfile=./aux/authfile
[pam_yubico.c:parse_cfg(741)] ldapserver=(null)
[pam_yubico.c:parse_cfg(742)] ldap_uri=(null)
[pam_yubico.c:parse_cfg(743)] ldap_bind_user=(null)
[pam_yubico.c:parse_cfg(744)] ldap_bind_password=(null)
[pam_yubico.c:parse_cfg(745)] ldap_filter=(null)
[pam_yubico.c:parse_cfg(746)] ldap_cacertfile=(null)
[pam_yubico.c:parse_cfg(747)] ldapdn=(null)
[pam_yubico.c:parse_cfg(748)] user_attr=(null)
[pam_yubico.c:parse_cfg(749)] yubi_attr=(null)
[pam_yubico.c:parse_cfg(750)] yubi_attr_prefix=(null)
[pam_yubico.c:parse_cfg(751)] url=(null)
[pam_yubico.c:parse_cfg(752)] urllist=http://localhost:30559/wsapi/2/verify;http://localhost:17502/wsapi/2/verify
[pam_yubico.c:parse_cfg(753)] capath=(null)
[pam_yubico.c:parse_cfg(754)] token_id_length=12
[pam_yubico.c:parse_cfg(755)] mode=client
[pam_yubico.c:parse_cfg(756)] chalresp_path=(null)
[pam_yubico.c:pam_sm_authenticate(787)] pam_yubico version: 2.19
in pam_get_user()
[pam_yubico.c:pam_sm_authenticate(802)] get user returned: bar
in pam_get_item() 5
in conv_func()
[pam_yubico.c:pam_sm_authenticate(949)] conv returned 44 bytes
[pam_yubico.c:pam_sm_authenticate(967)] Skipping first 0 bytes. Length is 44, token_id set to 12 and token OTP always 32.
[pam_yubico.c:pam_sm_authenticate(974)] OTP: vvincredibletrerdegkkrkkneieultcjdghrejjbckh ID: vvincredible
[pam_yubico.c:pam_sm_authenticate(1004)] ykclient return value (0): Success
[pam_yubico.c:authorize_user_token(151)] Using system-wide auth_file ./aux/authfile
[util.c:check_user_token(151)] Authorization line: foo:vvincredible
[util.c:check_user_token(151)] Authorization line: test:cccccccfhcbe:ccccccbchvth:
[pam_yubico.c:pam_sm_authenticate(1041)] Unknown user
[pam_yubico.c:pam_sm_authenticate(1072)] in pam_strerror()
done. [error]
in pam_set_data() yubico_setcred_return
[pam_yubico.c:parse_cfg(729)] called.
[pam_yubico.c:parse_cfg(730)] flags 0 argc 4
[pam_yubico.c:parse_cfg(732)] argv[0]=id=1
[pam_yubico.c:parse_cfg(732)] argv[1]=urllist=http://localhost:30559/wsapi/2/verify;http://localhost:17502/wsapi/2/verify
[pam_yubico.c:parse_cfg(732)] argv[2]=authfile=./aux/authfile
[pam_yubico.c:parse_cfg(732)] argv[3]=debug
[pam_yubico.c:parse_cfg(733)] id=1
[pam_yubico.c:parse_cfg(734)] key=(null)
[pam_yubico.c:parse_cfg(735)] debug=1
[pam_yubico.c:parse_cfg(736)] alwaysok=0
[pam_yubico.c:parse_cfg(737)] verbose_otp=0
[pam_yubico.c:parse_cfg(738)] try_first_pass=0
[pam_yubico.c:parse_cfg(739)] use_first_pass=0
[pam_yubico.c:parse_cfg(740)] authfile=./aux/authfile
[pam_yubico.c:parse_cfg(741)] ldapserver=(null)
[pam_yubico.c:parse_cfg(742)] ldap_uri=(null)
[pam_yubico.c:parse_cfg(743)] ldap_bind_user=(null)
[pam_yubico.c:parse_cfg(744)] ldap_bind_password=(null)
[pam_yubico.c:parse_cfg(745)] ldap_filter=(null)
[pam_yubico.c:parse_cfg(746)] ldap_cacertfile=(null)
[pam_yubico.c:parse_cfg(747)] ldapdn=(null)
[pam_yubico.c:parse_cfg(748)] user_attr=(null)
[pam_yubico.c:parse_cfg(749)] yubi_attr=(null)
[pam_yubico.c:parse_cfg(750)] yubi_attr_prefix=(null)
[pam_yubico.c:parse_cfg(751)] url=(null)
[pam_yubico.c:parse_cfg(752)] urllist=http://localhost:30559/wsapi/2/verify;http://localhost:17502/wsapi/2/verify
[pam_yubico.c:parse_cfg(753)] capath=(null)
[pam_yubico.c:parse_cfg(754)] token_id_length=12
[pam_yubico.c:parse_cfg(755)] mode=client
[pam_yubico.c:parse_cfg(756)] chalresp_path=(null)
[pam_yubico.c:pam_sm_authenticate(787)] pam_yubico version: 2.19
in pam_get_user()
[pam_yubico.c:pam_sm_authenticate(802)] get user returned: foo
in pam_get_item() 5
in conv_func()
[pam_yubico.c:pam_sm_authenticate(949)] conv returned 44 bytes
[pam_yubico.c:pam_sm_authenticate(967)] Skipping first 0 bytes. Length is 44, token_id set to 12 and token OTP always 32.
[pam_yubico.c:pam_sm_authenticate(974)] OTP: vvincrediblltrerdegkkrkkneieultcjdghrejjbckh ID: vvincredibll
[pam_yubico.c:pam_sm_authenticate(1004)] ykclient return value (0): Success
[pam_yubico.c:authorize_user_token(151)] Using system-wide auth_file ./aux/authfile
[util.c:check_user_token(151)] Authorization line: foo:vvincredible
[util.c:check_user_token(156)] Matched user: foo
[util.c:check_user_token(162)] Authorization token: vvincredible
[util.c:check_user_token(162)] Authorization token: (null)
[util.c:check_user_token(151)] Authorization line: test:cccccccfhcbe:ccccccbchvth:
[pam_yubico.c:pam_sm_authenticate(1037)] Unauthorized token for this user
[pam_yubico.c:pam_sm_authenticate(1072)] in pam_strerror()
done. [error]
in pam_set_data() yubico_setcred_return
[pam_yubico.c:parse_cfg(729)] called.
[pam_yubico.c:parse_cfg(730)] flags 0 argc 4
[pam_yubico.c:parse_cfg(732)] argv[0]=id=1
[pam_yubico.c:parse_cfg(732)] argv[1]=urllist=http://localhost:30559/wsapi/2/verify
[pam_yubico.c:parse_cfg(732)] argv[2]=authfile=./aux/authfile
[pam_yubico.c:parse_cfg(732)] argv[3]=debug
[pam_yubico.c:parse_cfg(733)] id=1
[pam_yubico.c:parse_cfg(734)] key=(null)
[pam_yubico.c:parse_cfg(735)] debug=1
[pam_yubico.c:parse_cfg(736)] alwaysok=0
[pam_yubico.c:parse_cfg(737)] verbose_otp=0
[pam_yubico.c:parse_cfg(738)] try_first_pass=0
[pam_yubico.c:parse_cfg(739)] use_first_pass=0
[pam_yubico.c:parse_cfg(740)] authfile=./aux/authfile
[pam_yubico.c:parse_cfg(741)] ldapserver=(null)
[pam_yubico.c:parse_cfg(742)] ldap_uri=(null)
[pam_yubico.c:parse_cfg(743)] ldap_bind_user=(null)
[pam_yubico.c:parse_cfg(744)] ldap_bind_password=(null)
[pam_yubico.c:parse_cfg(745)] ldap_filter=(null)
[pam_yubico.c:parse_cfg(746)] ldap_cacertfile=(null)
[pam_yubico.c:parse_cfg(747)] ldapdn=(null)
[pam_yubico.c:parse_cfg(748)] user_attr=(null)
[pam_yubico.c:parse_cfg(749)] yubi_attr=(null)
[pam_yubico.c:parse_cfg(750)] yubi_attr_prefix=(null)
[pam_yubico.c:parse_cfg(751)] url=(null)
[pam_yubico.c:parse_cfg(752)] urllist=http://localhost:30559/wsapi/2/verify
[pam_yubico.c:parse_cfg(753)] capath=(null)
[pam_yubico.c:parse_cfg(754)] token_id_length=12
[pam_yubico.c:parse_cfg(755)] mode=client
[pam_yubico.c:parse_cfg(756)] chalresp_path=(null)
[pam_yubico.c:pam_sm_authenticate(787)] pam_yubico version: 2.19
in pam_get_user()
[pam_yubico.c:pam_sm_authenticate(802)] get user returned: foo
in pam_get_item() 5
in conv_func()
[pam_yubico.c:pam_sm_authenticate(949)] conv returned 44 bytes
[pam_yubico.c:pam_sm_authenticate(967)] Skipping first 0 bytes. Length is 44, token_id set to 12 and token OTP always 32.
[pam_yubico.c:pam_sm_authenticate(974)] OTP: vvincredibletrerdegkkrkkneieultcjdghrejjbckl ID: vvincredible
[pam_yubico.c:pam_sm_authenticate(1004)] ykclient return value (1): Yubikey OTP was bad (BAD_OTP)
[pam_yubico.c:pam_sm_authenticate(1072)] in pam_strerror()
done. [error]
in pam_set_data() yubico_setcred_return
[pam_yubico.c:parse_cfg(729)] called.
[pam_yubico.c:parse_cfg(730)] flags 0 argc 4
[pam_yubico.c:parse_cfg(732)] argv[0]=id=1
[pam_yubico.c:parse_cfg(732)] argv[1]=urllist=http://localhost:17502/wsapi/2/verify
[pam_yubico.c:parse_cfg(732)] argv[2]=authfile=./aux/authfile
[pam_yubico.c:parse_cfg(732)] argv[3]=debug
[pam_yubico.c:parse_cfg(733)] id=1
[pam_yubico.c:parse_cfg(734)] key=(null)
[pam_yubico.c:parse_cfg(735)] debug=1
[pam_yubico.c:parse_cfg(736)] alwaysok=0
[pam_yubico.c:parse_cfg(737)] verbose_otp=0
[pam_yubico.c:parse_cfg(738)] try_first_pass=0
[pam_yubico.c:parse_cfg(739)] use_first_pass=0
[pam_yubico.c:parse_cfg(740)] authfile=./aux/authfile
[pam_yubico.c:parse_cfg(741)] ldapserver=(null)
[pam_yubico.c:parse_cfg(742)] ldap_uri=(null)
[pam_yubico.c:parse_cfg(743)] ldap_bind_user=(null)
[pam_yubico.c:parse_cfg(744)] ldap_bind_password=(null)
[pam_yubico.c:parse_cfg(745)] ldap_filter=(null)
[pam_yubico.c:parse_cfg(746)] ldap_cacertfile=(null)
[pam_yubico.c:parse_cfg(747)] ldapdn=(null)
[pam_yubico.c:parse_cfg(748)] user_attr=(null)
[pam_yubico.c:parse_cfg(749)] yubi_attr=(null)
[pam_yubico.c:parse_cfg(750)] yubi_attr_prefix=(null)
[pam_yubico.c:parse_cfg(751)] url=(null)
[pam_yubico.c:parse_cfg(752)] urllist=http://localhost:17502/wsapi/2/verify
[pam_yubico.c:parse_cfg(753)] capath=(null)
[pam_yubico.c:parse_cfg(754)] token_id_length=12
[pam_yubico.c:parse_cfg(755)] mode=client
[pam_yubico.c:parse_cfg(756)] chalresp_path=(null)
[pam_yubico.c:pam_sm_authenticate(787)] pam_yubico version: 2.19
in pam_get_user()
[pam_yubico.c:pam_sm_authenticate(802)] get user returned: test
in pam_get_item() 5
in conv_func()
[pam_yubico.c:pam_sm_authenticate(949)] conv returned 44 bytes
[pam_yubico.c:pam_sm_authenticate(967)] Skipping first 0 bytes. Length is 44, token_id set to 12 and token OTP always 32.
[pam_yubico.c:pam_sm_authenticate(974)] OTP: ccccccbchvthlivuitriujjifivbvtrjkjfirllluurj ID: ccccccbchvth
[pam_yubico.c:pam_sm_authenticate(1004)] ykclient return value (0): Success
[pam_yubico.c:authorize_user_token(151)] Using system-wide auth_file ./aux/authfile
[util.c:check_user_token(151)] Authorization line: foo:vvincredible
[util.c:check_user_token(151)] Authorization line: test:cccccccfhcbe:ccccccbchvth:
[util.c:check_user_token(156)] Matched user: test
[util.c:check_user_token(162)] Authorization token: cccccccfhcbe
[util.c:check_user_token(162)] Authorization token: ccccccbchvth
[util.c:check_user_token(166)] Match user/token as test/ccccccbchvth
[pam_yubico.c:pam_sm_authenticate(1072)] in pam_strerror()
done. [error]
in pam_set_data() yubico_setcred_return
[pam_yubico.c:parse_cfg(729)] called.
[pam_yubico.c:parse_cfg(730)] flags 0 argc 7
[pam_yubico.c:parse_cfg(732)] argv[0]=id=1
[pam_yubico.c:parse_cfg(732)] argv[1]=urllist=http://localhost:30559/wsapi/2/verify;http://localhost:17502/wsapi/2/verify
[pam_yubico.c:parse_cfg(732)] argv[2]=ldap_uri=ldap://localhost:52825
[pam_yubico.c:parse_cfg(732)] argv[3]=ldapdn=ou=users,dc=example,dc=com
[pam_yubico.c:parse_cfg(732)] argv[4]=user_attr=uid
[pam_yubico.c:parse_cfg(732)] argv[5]=yubi_attr=yubiKeyId
[pam_yubico.c:parse_cfg(732)] argv[6]=debug
[pam_yubico.c:parse_cfg(733)] id=1
[pam_yubico.c:parse_cfg(734)] key=(null)
[pam_yubico.c:parse_cfg(735)] debug=1
[pam_yubico.c:parse_cfg(736)] alwaysok=0
[pam_yubico.c:parse_cfg(737)] verbose_otp=0
[pam_yubico.c:parse_cfg(738)] try_first_pass=0
[pam_yubico.c:parse_cfg(739)] use_first_pass=0
[pam_yubico.c:parse_cfg(740)] authfile=(null)
[pam_yubico.c:parse_cfg(741)] ldapserver=(null)
[pam_yubico.c:parse_cfg(742)] ldap_uri=ldap://localhost:52825
[pam_yubico.c:parse_cfg(743)] ldap_bind_user=(null)
[pam_yubico.c:parse_cfg(744)] ldap_bind_password=(null)
[pam_yubico.c:parse_cfg(745)] ldap_filter=(null)
[pam_yubico.c:parse_cfg(746)] ldap_cacertfile=(null)
[pam_yubico.c:parse_cfg(747)] ldapdn=ou=users,dc=example,dc=com
[pam_yubico.c:parse_cfg(748)] user_attr=uid
[pam_yubico.c:parse_cfg(749)] yubi_attr=yubiKeyId
[pam_yubico.c:parse_cfg(750)] yubi_attr_prefix=(null)
[pam_yubico.c:parse_cfg(751)] url=(null)
[pam_yubico.c:parse_cfg(752)] urllist=http://localhost:30559/wsapi/2/verify;http://localhost:17502/wsapi/2/verify
[pam_yubico.c:parse_cfg(753)] capath=(null)
[pam_yubico.c:parse_cfg(754)] token_id_length=12
[pam_yubico.c:parse_cfg(755)] mode=client
[pam_yubico.c:parse_cfg(756)] chalresp_path=(null)
[pam_yubico.c:pam_sm_authenticate(787)] pam_yubico version: 2.19
in pam_get_user()
[pam_yubico.c:pam_sm_authenticate(802)] get user returned: foo
in pam_get_item() 5
in conv_func()
[pam_yubico.c:pam_sm_authenticate(949)] conv returned 44 bytes
[pam_yubico.c:pam_sm_authenticate(967)] Skipping first 0 bytes. Length is 44, token_id set to 12 and token OTP always 32.
[pam_yubico.c:pam_sm_authenticate(974)] OTP: vvincredibletrerdegkkrkkneieultcjdghrejjbckh ID: vvincredible
[pam_yubico.c:pam_sm_authenticate(1004)] ykclient return value (0): Success
[pam_yubico.c:authorize_user_token_ldap(238)] called
[pam_yubico.c:authorize_user_token_ldap(282)] try bind anonymous
[pam_yubico.c:authorize_user_token_ldap(312)] LDAP : look up object base='uid=foo,ou=users,dc=example,dc=com' filter='(null)', ask for attribute 'yubiKeyId'
[pam_yubico.c:authorize_user_token_ldap(348)] LDAP : Found 1 values - checking if any of them match 'person::vvincredible'
[pam_yubico.c:authorize_user_token_ldap(348)] LDAP : Found 1 values - checking if any of them match 'vvincredible::vvincredible'
[pam_yubico.c:authorize_user_token_ldap(355)] Token Found :: vvincredible
[pam_yubico.c:pam_sm_authenticate(1072)] in pam_strerror()
done. [error]
in pam_set_data() yubico_setcred_return
[pam_yubico.c:parse_cfg(729)] called.
[pam_yubico.c:parse_cfg(730)] flags 0 argc 7
[pam_yubico.c:parse_cfg(732)] argv[0]=id=1
[pam_yubico.c:parse_cfg(732)] argv[1]=urllist=http://localhost:30559/wsapi/2/verify;http://localhost:17502/wsapi/2/verify
[pam_yubico.c:parse_cfg(732)] argv[2]=ldap_uri=ldap://localhost:52825
[pam_yubico.c:parse_cfg(732)] argv[3]=ldapdn=ou=users,dc=example,dc=com
[pam_yubico.c:parse_cfg(732)] argv[4]=user_attr=uid
[pam_yubico.c:parse_cfg(732)] argv[5]=yubi_attr=yubiKeyId
[pam_yubico.c:parse_cfg(732)] argv[6]=debug
[pam_yubico.c:parse_cfg(733)] id=1
[pam_yubico.c:parse_cfg(734)] key=(null)
[pam_yubico.c:parse_cfg(735)] debug=1
[pam_yubico.c:parse_cfg(736)] alwaysok=0
[pam_yubico.c:parse_cfg(737)] verbose_otp=0
[pam_yubico.c:parse_cfg(738)] try_first_pass=0
[pam_yubico.c:parse_cfg(739)] use_first_pass=0
[pam_yubico.c:parse_cfg(740)] authfile=(null)
[pam_yubico.c:parse_cfg(741)] ldapserver=(null)
[pam_yubico.c:parse_cfg(742)] ldap_uri=ldap://localhost:52825
[pam_yubico.c:parse_cfg(743)] ldap_bind_user=(null)
[pam_yubico.c:parse_cfg(744)] ldap_bind_password=(null)
[pam_yubico.c:parse_cfg(745)] ldap_filter=(null)
[pam_yubico.c:parse_cfg(746)] ldap_cacertfile=(null)
[pam_yubico.c:parse_cfg(747)] ldapdn=ou=users,dc=example,dc=com
[pam_yubico.c:parse_cfg(748)] user_attr=uid
[pam_yubico.c:parse_cfg(749)] yubi_attr=yubiKeyId
[pam_yubico.c:parse_cfg(750)] yubi_attr_prefix=(null)
[pam_yubico.c:parse_cfg(751)] url=(null)
[pam_yubico.c:parse_cfg(752)] urllist=http://localhost:30559/wsapi/2/verify;http://localhost:17502/wsapi/2/verify
[pam_yubico.c:parse_cfg(753)] capath=(null)
[pam_yubico.c:parse_cfg(754)] token_id_length=12
[pam_yubico.c:parse_cfg(755)] mode=client
[pam_yubico.c:parse_cfg(756)] chalresp_path=(null)
[pam_yubico.c:pam_sm_authenticate(787)] pam_yubico version: 2.19
in pam_get_user()
[pam_yubico.c:pam_sm_authenticate(802)] get user returned: bar
in pam_get_item() 5
in conv_func()
[pam_yubico.c:pam_sm_authenticate(949)] conv returned 44 bytes
[pam_yubico.c:pam_sm_authenticate(967)] Skipping first 0 bytes. Length is 44, token_id set to 12 and token OTP always 32.
[pam_yubico.c:pam_sm_authenticate(974)] OTP: vvincredibletrerdegkkrkkneieultcjdghrejjbckh ID: vvincredible
[pam_yubico.c:pam_sm_authenticate(1004)] ykclient return value (0): Success
[pam_yubico.c:authorize_user_token_ldap(238)] called
[pam_yubico.c:authorize_user_token_ldap(282)] try bind anonymous
[pam_yubico.c:authorize_user_token_ldap(312)] LDAP : look up object base='uid=bar,ou=users,dc=example,dc=com' filter='(null)', ask for attribute 'yubiKeyId'
[pam_yubico.c:authorize_user_token_ldap(328)] No result from LDAP search
[pam_yubico.c:pam_sm_authenticate(1041)] Unknown user
[pam_yubico.c:pam_sm_authenticate(1072)] in pam_strerror()
done. [error]
in pam_set_data() yubico_setcred_return
[pam_yubico.c:parse_cfg(729)] called.
[pam_yubico.c:parse_cfg(730)] flags 0 argc 7
[pam_yubico.c:parse_cfg(732)] argv[0]=id=1
[pam_yubico.c:parse_cfg(732)] argv[1]=urllist=http://localhost:30559/wsapi/2/verify;http://localhost:17502/wsapi/2/verify
[pam_yubico.c:parse_cfg(732)] argv[2]=ldap_uri=ldap://localhost:52825
[pam_yubico.c:parse_cfg(732)] argv[3]=ldapdn=ou=users,dc=example,dc=com
[pam_yubico.c:parse_cfg(732)] argv[4]=user_attr=uid
[pam_yubico.c:parse_cfg(732)] argv[5]=yubi_attr=yubiKeyId
[pam_yubico.c:parse_cfg(732)] argv[6]=debug
[pam_yubico.c:parse_cfg(733)] id=1
[pam_yubico.c:parse_cfg(734)] key=(null)
[pam_yubico.c:parse_cfg(735)] debug=1
[pam_yubico.c:parse_cfg(736)] alwaysok=0
[pam_yubico.c:parse_cfg(737)] verbose_otp=0
[pam_yubico.c:parse_cfg(738)] try_first_pass=0
[pam_yubico.c:parse_cfg(739)] use_first_pass=0
[pam_yubico.c:parse_cfg(740)] authfile=(null)
[pam_yubico.c:parse_cfg(741)] ldapserver=(null)
[pam_yubico.c:parse_cfg(742)] ldap_uri=ldap://localhost:52825
[pam_yubico.c:parse_cfg(743)] ldap_bind_user=(null)
[pam_yubico.c:parse_cfg(744)] ldap_bind_password=(null)
[pam_yubico.c:parse_cfg(745)] ldap_filter=(null)
[pam_yubico.c:parse_cfg(746)] ldap_cacertfile=(null)
[pam_yubico.c:parse_cfg(747)] ldapdn=ou=users,dc=example,dc=com
[pam_yubico.c:parse_cfg(748)] user_attr=uid
[pam_yubico.c:parse_cfg(749)] yubi_attr=yubiKeyId
[pam_yubico.c:parse_cfg(750)] yubi_attr_prefix=(null)
[pam_yubico.c:parse_cfg(751)] url=(null)
[pam_yubico.c:parse_cfg(752)] urllist=http://localhost:30559/wsapi/2/verify;http://localhost:17502/wsapi/2/verify
[pam_yubico.c:parse_cfg(753)] capath=(null)
[pam_yubico.c:parse_cfg(754)] token_id_length=12
[pam_yubico.c:parse_cfg(755)] mode=client
[pam_yubico.c:parse_cfg(756)] chalresp_path=(null)
[pam_yubico.c:pam_sm_authenticate(787)] pam_yubico version: 2.19
in pam_get_user()
[pam_yubico.c:pam_sm_authenticate(802)] get user returned: foo
in pam_get_item() 5
in conv_func()
[pam_yubico.c:pam_sm_authenticate(949)] conv returned 44 bytes
[pam_yubico.c:pam_sm_authenticate(967)] Skipping first 0 bytes. Length is 44, token_id set to 12 and token OTP always 32.
[pam_yubico.c:pam_sm_authenticate(974)] OTP: vvincrediblltrerdegkkrkkneieultcjdghrejjbckh ID: vvincredibll
[pam_yubico.c:pam_sm_authenticate(1004)] ykclient return value (0): Success
[pam_yubico.c:authorize_user_token_ldap(238)] called
[pam_yubico.c:authorize_user_token_ldap(282)] try bind anonymous
[pam_yubico.c:authorize_user_token_ldap(312)] LDAP : look up object base='uid=foo,ou=users,dc=example,dc=com' filter='(null)', ask for attribute 'yubiKeyId'
[pam_yubico.c:authorize_user_token_ldap(348)] LDAP : Found 1 values - checking if any of them match 'person::vvincredibll'
[pam_yubico.c:authorize_user_token_ldap(348)] LDAP : Found 1 values - checking if any of them match 'vvincredible::vvincredibll'
[pam_yubico.c:pam_sm_authenticate(1037)] Unauthorized token for this user
[pam_yubico.c:pam_sm_authenticate(1072)] in pam_strerror()
done. [error]
in pam_set_data() yubico_setcred_return
[pam_yubico.c:parse_cfg(729)] called.
[pam_yubico.c:parse_cfg(730)] flags 0 argc 7
[pam_yubico.c:parse_cfg(732)] argv[0]=id=1
[pam_yubico.c:parse_cfg(732)] argv[1]=urllist=http://localhost:30559/wsapi/2/verify;http://localhost:17502/wsapi/2/verify
[pam_yubico.c:parse_cfg(732)] argv[2]=ldap_uri=ldap://localhost:52825
[pam_yubico.c:parse_cfg(732)] argv[3]=ldapdn=ou=users,dc=example,dc=com
[pam_yubico.c:parse_cfg(732)] argv[4]=user_attr=uid
[pam_yubico.c:parse_cfg(732)] argv[5]=yubi_attr=yubiKeyId
[pam_yubico.c:parse_cfg(732)] argv[6]=debug
[pam_yubico.c:parse_cfg(733)] id=1
[pam_yubico.c:parse_cfg(734)] key=(null)
[pam_yubico.c:parse_cfg(735)] debug=1
[pam_yubico.c:parse_cfg(736)] alwaysok=0
[pam_yubico.c:parse_cfg(737)] verbose_otp=0
[pam_yubico.c:parse_cfg(738)] try_first_pass=0
[pam_yubico.c:parse_cfg(739)] use_first_pass=0
[pam_yubico.c:parse_cfg(740)] authfile=(null)
[pam_yubico.c:parse_cfg(741)] ldapserver=(null)
[pam_yubico.c:parse_cfg(742)] ldap_uri=ldap://localhost:52825
[pam_yubico.c:parse_cfg(743)] ldap_bind_user=(null)
[pam_yubico.c:parse_cfg(744)] ldap_bind_password=(null)
[pam_yubico.c:parse_cfg(745)] ldap_filter=(null)
[pam_yubico.c:parse_cfg(746)] ldap_cacertfile=(null)
[pam_yubico.c:parse_cfg(747)] ldapdn=ou=users,dc=example,dc=com
[pam_yubico.c:parse_cfg(748)] user_attr=uid
[pam_yubico.c:parse_cfg(749)] yubi_attr=yubiKeyId
[pam_yubico.c:parse_cfg(750)] yubi_attr_prefix=(null)
[pam_yubico.c:parse_cfg(751)] url=(null)
[pam_yubico.c:parse_cfg(752)] urllist=http://localhost:30559/wsapi/2/verify;http://localhost:17502/wsapi/2/verify
[pam_yubico.c:parse_cfg(753)] capath=(null)
[pam_yubico.c:parse_cfg(754)] token_id_length=12
[pam_yubico.c:parse_cfg(755)] mode=client
[pam_yubico.c:parse_cfg(756)] chalresp_path=(null)
[pam_yubico.c:pam_sm_authenticate(787)] pam_yubico version: 2.19
in pam_get_user()
[pam_yubico.c:pam_sm_authenticate(802)] get user returned: test
in pam_get_item() 5
in conv_func()
[pam_yubico.c:pam_sm_authenticate(949)] conv returned 44 bytes
[pam_yubico.c:pam_sm_authenticate(967)] Skipping first 0 bytes. Length is 44, token_id set to 12 and token OTP always 32.
[pam_yubico.c:pam_sm_authenticate(974)] OTP: ccccccbchvthlivuitriujjifivbvtrjkjfirllluurj ID: ccccccbchvth
[pam_yubico.c:pam_sm_authenticate(1004)] ykclient return value (0): Success
[pam_yubico.c:authorize_user_token_ldap(238)] called
[pam_yubico.c:authorize_user_token_ldap(282)] try bind anonymous
[pam_yubico.c:authorize_user_token_ldap(312)] LDAP : look up object base='uid=test,ou=users,dc=example,dc=com' filter='(null)', ask for attribute 'yubiKeyId'
[pam_yubico.c:authorize_user_token_ldap(348)] LDAP : Found 1 values - checking if any of them match 'person::ccccccbchvth'
[pam_yubico.c:authorize_user_token_ldap(348)] LDAP : Found 2 values - checking if any of them match 'cccccccfhcbe::ccccccbchvth'
[pam_yubico.c:authorize_user_token_ldap(348)] LDAP : Found 2 values - checking if any of them match 'ccccccbchvth::ccccccbchvth'
[pam_yubico.c:authorize_user_token_ldap(355)] Token Found :: ccccccbchvth
[pam_yubico.c:pam_sm_authenticate(1072)] in pam_strerror()
done. [error]
in pam_set_data() yubico_setcred_return
[pam_yubico.c:parse_cfg(729)] called.
[pam_yubico.c:parse_cfg(730)] flags 0 argc 6
[pam_yubico.c:parse_cfg(732)] argv[0]=id=1
[pam_yubico.c:parse_cfg(732)] argv[1]=urllist=http://localhost:17502/wsapi/2/verify;http://localhost:30559/wsapi/2/verify
[pam_yubico.c:parse_cfg(732)] argv[2]=ldap_uri=ldap://localhost:52825
[pam_yubico.c:parse_cfg(732)] argv[3]=ldap_filter=(uid=%u)
[pam_yubico.c:parse_cfg(732)] argv[4]=yubi_attr=yubiKeyId
[pam_yubico.c:parse_cfg(732)] argv[5]=debug
[pam_yubico.c:parse_cfg(733)] id=1
[pam_yubico.c:parse_cfg(734)] key=(null)
[pam_yubico.c:parse_cfg(735)] debug=1
[pam_yubico.c:parse_cfg(736)] alwaysok=0
[pam_yubico.c:parse_cfg(737)] verbose_otp=0
[pam_yubico.c:parse_cfg(738)] try_first_pass=0
[pam_yubico.c:parse_cfg(739)] use_first_pass=0
[pam_yubico.c:parse_cfg(740)] authfile=(null)
[pam_yubico.c:parse_cfg(741)] ldapserver=(null)
[pam_yubico.c:parse_cfg(742)] ldap_uri=ldap://localhost:52825
[pam_yubico.c:parse_cfg(743)] ldap_bind_user=(null)
[pam_yubico.c:parse_cfg(744)] ldap_bind_password=(null)
[pam_yubico.c:parse_cfg(745)] ldap_filter=(uid=%u)
[pam_yubico.c:parse_cfg(746)] ldap_cacertfile=(null)
[pam_yubico.c:parse_cfg(747)] ldapdn=(null)
[pam_yubico.c:parse_cfg(748)] user_attr=(null)
[pam_yubico.c:parse_cfg(749)] yubi_attr=yubiKeyId
[pam_yubico.c:parse_cfg(750)] yubi_attr_prefix=(null)
[pam_yubico.c:parse_cfg(751)] url=(null)
[pam_yubico.c:parse_cfg(752)] urllist=http://localhost:17502/wsapi/2/verify;http://localhost:30559/wsapi/2/verify
[pam_yubico.c:parse_cfg(753)] capath=(null)
[pam_yubico.c:parse_cfg(754)] token_id_length=12
[pam_yubico.c:parse_cfg(755)] mode=client
[pam_yubico.c:parse_cfg(756)] chalresp_path=(null)
[pam_yubico.c:pam_sm_authenticate(787)] pam_yubico version: 2.19
in pam_get_user()
[pam_yubico.c:pam_sm_authenticate(802)] get user returned: test
in pam_get_item() 5
in conv_func()
[pam_yubico.c:pam_sm_authenticate(949)] conv returned 44 bytes
[pam_yubico.c:pam_sm_authenticate(967)] Skipping first 0 bytes. Length is 44, token_id set to 12 and token OTP always 32.
[pam_yubico.c:pam_sm_authenticate(974)] OTP: ccccccbchvthlivuitriujjifivbvtrjkjfirllluurj ID: ccccccbchvth
[pam_yubico.c:pam_sm_authenticate(1004)] ykclient return value (0): Success
[pam_yubico.c:authorize_user_token_ldap(238)] called
[pam_yubico.c:authorize_user_token_ldap(282)] try bind anonymous
[pam_yubico.c:authorize_user_token_ldap(312)] LDAP : look up object base='(null)' filter='(uid=test)', ask for attribute 'yubiKeyId'
[pam_yubico.c:authorize_user_token_ldap(319)] ldap_search_ext_s: Operations error
[pam_yubico.c:pam_sm_authenticate(1033)] Internal error while validating user
[pam_yubico.c:pam_sm_authenticate(1072)] in pam_strerror()
done. [error]
in pam_set_data() yubico_setcred_return
test 1005 failed!
killed 105910, 105911 and 105912
FAIL pam_test (exit status: 237)