summaryrefslogtreecommitdiff
path: root/security/duo-unix
AgeCommit message (Collapse)AuthorFilesLines
2020-12-04duo-unix: Update to 1.11.4.jperkin4-15/+35
Changes since 1.10.4: duo_unix-1.11.4 - May 18, 2020 Added support for Ubuntu 20.04. Added support tool to collect information (e.g. logs and PAM stacks) you can send to Duo Support when troubleshooting issues. Ubuntu 12.04 no longer supported. Updated GPG public key for downloading distribution packages. duo_unix-1.11.3 - October 2019 Support for CentOS 8, Red Hat 8, and Debian 10. Improved validation of BSON messages. Updated GPG public key for downloading distribution packages. duo_unix-1.11.2 - June 2019 Published a guide to recommended Kerberos configuration for Duo Unix. Thanks to Neal Poole at Facebook for bringing expertise and attention to this topic. Updated SELinux policy to allow local logins to use the pam_duo PAM module and made sshd configurable. This requires installation of selinux-policy-devel on CentOS and RHEL 7 as a prerequisite. Added support for spaces in group names when escaped with backslashes in pam_duo.conf and login_duo.conf Debian 7 no longer supported. duo_unix-1.11.1 - November 2018 Fixed bug causing console login to fail on certain systems. Debian 7 support is deprecated and will be removed in the next release. duo_unix-1.11.0 - October 2018 Added configuration options for parsing the Duo username out of the GECOS field: gecos_username_pos and gecos_delim. Support for Debian 9 (Stretch). CentOS 5 no longer supported. duo_unix-1.10.5 - September 2018 CentOS 5 Support is deprecated and will be removed in the next release. Fixed a bug that caused a segfault on systems where the hostname wasn't retrievable.
2020-01-18*: Recursive revision bump for openssl 1.1.1.jperkin1-1/+2
2018-09-04security/duo-unix: Update to 1.10.4.fhajny2-7/+7
duo_unix-1.10.4: - Removed failmode decision from auth endpoint and moved it to only preauth according to standards in our other integrations - Updated Duo Unix to speak up to TLS 1.2 - Support for LibreSSL 2.7.0 and up - Minor memory leak fixes - Output message when user is locked out duo_unix-1.10.3: - Added support for http_proxy with SELinux enabled duo_unix-1.10.2: - Added default failmode values in config files
2018-07-04*: Move SUBST_STAGE from post-patch to pre-configurejperkin1-2/+2
Performing substitutions during post-patch breaks tools such as mkpatches, making it very difficult to regenerate correct patches after making changes, and often leading to substituted string replacements being committed.
2018-02-16Import duo_unix 1.10.1 as security/duo_unix.fhajny6-0/+100
Duo two-factor authentication for Unix systems.