-
Notifications
You must be signed in to change notification settings - Fork 81
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
More descriptive error messages #291
Comments
Hi, Thank you for your request! This has some similarity to the proposed solution to #209. The suggested implementation can be found under the experimental Note that some clients may display the messages later than expected, not at all, or immediately overwrite it with something else. While we can't do much about the clients themselves in this project, we'd nonetheless like to hear about your experience, preferably with as many clients as possible! |
After a lot of trial and error getting a development environment for this, in the end the proposed solution this not work. Still only |
|
I have copied it in place from I have tried plain linux authenthication: |
For sanity checking: Was the build out of the |
Here's the template of
Get rid of the curly statements and yes, cue flag is present. I am not asked to insert the pin though. I did not try the } else {
converse(pamh, PAM_TEXT_INFO, fido_strerr(r));
} Specificly: if (r == FIDO_OK) {
if (opts.pin == FIDO_OPT_TRUE || opts.uv == FIDO_OPT_TRUE) {
r = fido_assert_set_uv(assert, FIDO_OPT_TRUE);
if (r != FIDO_OK) {
debug_dbg(cfg, "Failed to set UV");
goto out;
}
}
r = fido_assert_verify(assert, 0, pk.type, pk.ptr);
if (r == FIDO_OK) {
retval = 1;
goto out;
}
} else {
converse(pamh, PAM_TEXT_INFO, fido_strerr(r));
} I did not test |
OK. Your modification will only print out an error if an authenticator is found but an error occurs when trying to authenticate using it (e.g. user presence is not collected, PIN does not verify, etc.). To also print out an error message when no authenticators are found, you need additional changes. |
Ok, with the |
Is your feature request related to a problem?
On a Fedora KDE install, using the following pam configuration
We get non-descriptive error messages like
invalid login
when the yubikey is not present, instead of a message like:Required yubikey not present
.Describe the solution that you'd like
Print out more descriptive errors:
Required yubikey not present
Invalid yubikey found
The text was updated successfully, but these errors were encountered: