Releases: duosecurity/duo_unix
Releases · duosecurity/duo_unix
Version 2.2.3
Version 2.2.3
Bug Fixes:
- RHEL 10 and CentOS Stream 10 packages correctly include an SELinux module.
Version 2.2.2
Version 2.2.2
Changes:
- Log all invalid pam_duo configuration options before failing
- Test maintenance: removed dependency on deprecated Python cgi module
- Added support for Debian 13
- Added support for Fedora 43
Duo Unix 2.2.1
Version 2.2.1
Changes:
- Verified Push option is now documented in the man pages.
- Enrollment message now includes the enrollment URL.
Duo Unix 2.2.0
Version 2.2.0
Changes:
- Added support for Verified Push
- Updated the Duo API calls to use the Auth API v2
- SSL failures will cause API calls fail over to additional IPs when the host resolves to multiple addresses
Duo Unix 2.1.0
Duo Unix 2.1.0
Changes:
- Improves certificate validation for IP hostnames to mitigate CVE-2014-0139
- Duo Unix obeys rate limiting replies from the Duo cloud service
- The full path to the configuration file is logged out when Duo Unix is invoked
- API calls to Duo will account for possible time drift between Duo and the local server
- Adds support for new Duo certificate authorities
Duo Unix 2.0.4
Duo Unix 2.0.4
- Fixed multiple memory allocation leaks
- Removed some unused and unreachable code
- Addressed multiple code cleanliness issues
- Removed support for Fedora 38
- Removed support for Debian 10
- Removed support for CentOS 7
- Removed support for CentOS Stream 8
- Added support for Fedora 39
- Added support for Fedora 40
- Added support for Ubuntu 24
- Added support for Amazon Linux 2023
Duo Unix 2.0.3
Duo Unix 2.0.3
- Fixed AIX compilation bug
- Support script now fetches correct log and PAM files for Solaris and AIX
- Removed support for Fedora 37
- Removed support for Fedora 34
Duo Unix 2.0.2
Duo Unix 2.0.2
Changes:
- make check now successfully runs on Solaris
- Discontinued packages + distro support as of this version:
- Ubuntu 18
- Debian 9
Duo Unix 2.0.1
Duo Unix 2.0.1
Changes:
- The support script collects a few additional files for troubleshooting
- Duo API calls now use SHA512 instead of SHA1 as the HMAC algorithm
Duo Unix 2.0.0
Duo Unix 2.0.0
Release notes:
- Changed the behavior of
suwhen the target user is not root. The target user will need to complete 2FA rather than the original user. - login_duo resets the SIGPIPE handler when it closes its connection.
- Added logging when Duo is invoked, to assist troubleshooting.
- Updated package signing to SHA512