Package Details: duo_unix 2.0.3-1

Git Clone URL: (read-only, click to copy)
Package Base: duo_unix
Description: Login utility and PAM module for Duo Security two-factor authentication
Upstream URL:
Licenses: custom:GPL2
Submitter: None
Maintainer: nightah
Last Packager: nightah
Votes: 5
Popularity: 0.000984
First Submitted: 2015-12-14 14:25 (UTC)
Last Updated: 2024-02-28 01:05 (UTC)

Dependencies (1)

Required by (0)

Sources (1)

Latest Comments

zale24 commented on 2024-04-06 20:00 (UTC)

May we have support for aarch64 on this package please?

Kevdog commented on 2020-08-20 22:15 (UTC)

There hasn't been a comment on this package in awhile so I was skeptical it might not work, however as of 8-20-2020 the installations works successfully and the AUR package builds without problems. Use the instructions below given by dszryan and also watch the video found here: which is specific for PAM integration (you don't need to use PAM however I wanted PAM integrated). Good luck and thanks for maintaining the package!!

nightah commented on 2018-11-08 03:39 (UTC)

1.11.0 is out now:

student975 commented on 2018-08-29 20:31 (UTC)

1.10.4 is out

jstenback commented on 2017-05-04 04:59 (UTC)

This package works fine on armv7h, any chance that could be added as an officially supported architecture to avoid people needing to manually adding that in the PKGBUILD file? Thanks!

evana commented on 2017-04-24 19:44 (UTC) (edited on 2017-04-24 19:56 (UTC) by evana)

As of the openssl 1.1.0 release and subsequent rebuild, duo_unix no longer builds. To get duo building and working again, some of the code that handles ssl hmac must be updated. The updates needed are available here: I've submitted a pull request to the duo_unix repository so hopefully this will be included in the next release.

kgleason commented on 2016-08-08 20:14 (UTC)

I've got this installed, and used the config suggestions made by dszryan, but SSH is still allowing me to get in with just my key, no duo prompt. I've configured the login_duo stuff, and added it as a ForceCommand in /etc/ssh/sshd_config, but I'd prefer to be using pam. Anyone have any suggestions about what I may have missed?

dszryan commented on 2016-07-25 14:52 (UTC)

figured it out... it should be: ssh pam config (/etc/pam.d/sshd): #%PAM-1.0 auth required auth sufficient auth requisite uid >= 500 quiet auth required account include system-remote-login password include system-remote-login session include system-remote-login along with ssh config (/etc/ssh/sshd_config) PubkeyAuthentication yes PasswordAuthentication no UsePAM yes ChallengeResponseAuthentication yes UseDNS no

dszryan commented on 2016-07-25 14:01 (UTC)

what about the /etc/pam.d/sshd config?

dszryan commented on 2016-07-25 14:01 (UTC)

what about the /etc/pam.d/sshd config?