Package Details: duo_unix 1.11.4-1

Git Clone URL: (read-only, click to copy)
Package Base: duo_unix
Description: Login utility and PAM module for Duo Security two-factor authentication
Upstream URL:
Licenses: custom:GPL2
Submitter: None
Maintainer: MarcinWieczorek (nightah)
Last Packager: nightah
Votes: 3
Popularity: 0.000000
First Submitted: 2015-12-14 14:25
Last Updated: 2020-05-27 02:34

Dependencies (1)

Required by (0)

Sources (1)

Latest Comments

Kevdog commented on 2020-08-20 22:15

There hasn't been a comment on this package in awhile so I was skeptical it might not work, however as of 8-20-2020 the installations works successfully and the AUR package builds without problems. Use the instructions below given by dszryan and also watch the video found here: which is specific for PAM integration (you don't need to use PAM however I wanted PAM integrated). Good luck and thanks for maintaining the package!!

nightah commented on 2018-11-08 03:39

1.11.0 is out now:

student975 commented on 2018-08-29 20:31

1.10.4 is out

jstenback commented on 2017-05-04 04:59

This package works fine on armv7h, any chance that could be added as an officially supported architecture to avoid people needing to manually adding that in the PKGBUILD file? Thanks!

evana commented on 2017-04-24 19:44

As of the openssl 1.1.0 release and subsequent rebuild, duo_unix no longer builds. To get duo building and working again, some of the code that handles ssl hmac must be updated. The updates needed are available here:

I've submitted a pull request to the duo_unix repository so hopefully this will be included in the next release.

kgleason commented on 2016-08-08 20:14

I've got this installed, and used the config suggestions made by dszryan, but SSH is still allowing me to get in with just my key, no duo prompt.

I've configured the login_duo stuff, and added it as a ForceCommand in /etc/ssh/sshd_config, but I'd prefer to be using pam. Anyone have any suggestions about what I may have missed?

dszryan commented on 2016-07-25 14:52

figured it out... it should be:

ssh pam config (/etc/pam.d/sshd):
auth required
auth sufficient
auth requisite uid >= 500 quiet
auth required
account include system-remote-login
password include system-remote-login
session include system-remote-login

along with ssh config (/etc/ssh/sshd_config)
PubkeyAuthentication yes
PasswordAuthentication no
UsePAM yes
ChallengeResponseAuthentication yes
UseDNS no

dszryan commented on 2016-07-25 14:01

what about the /etc/pam.d/sshd config?

dszryan commented on 2016-07-25 14:01

what about the /etc/pam.d/sshd config?