Annotation of src/usr.bin/skey/skey.1, Revision 1.1.1.1
1.1 deraadt 1: .\" @(#)skey.1 1.1 10/28/93
2: .\" $Id: skey.1,v 1.4 1994/11/09 21:17:34 jtc Exp $
3: .\"
4: .Dd 28 October 1993
5: .Dt SKEY 1
6: .Os NetBSD 4
7: .Sh NAME
8: .Nm S/key
9: .Nd a one time password system
10: .Sh DESCRIPTION
11: .Nm S/key
12: is a procedure for using one time passwords to authenticate access to
13: computer systems. It uses 64 bits of information transformed by the
14: MD4 algorithm. The user supplies the 64 bits in the form of 6 English
15: words that are generated by a secure computer.
16: Example use of the S/key program
17: .Xr skey 1 :
18: .sp
19: .sp 0
20: % skey 99 th91334
21: .sp 0
22: Enter password: <your secret password is entered here>
23: .sp 0
24: OMEN US HORN OMIT BACK AHOY
25: .sp 0
26: %
27: .Pp
28: The programs that are part of the S/Key system are:
29: .Bl -tag -width skeyinit...
30: .It Xr skeyinit 1
31: used to setup your S/Key.
32: .It Xr skey 1
33: used to get the one time password each time.
34: .It Xr skeyinfo 1
35: used to extract information from the S/Key database.
36: It tells you what your next challenge will be.
37: .El
38: .Pp
39: When you run
40: .Xr skeyinit 1
41: you inform the system of your
42: secret password. Running
43: .Xr skey 1
44: then generates the
45: one-time passwords, and also requires your secret
46: password. If however, you misspell your password
47: while running
48: .Xr skey 1 ,
49: you will get a list of passwords
50: that will not work, and no indication about the problem.
51: .Pp
52: Password sequence numbers count backward from 99.
53: You can enter the passwords using small letters, even though
54: .Xr skey 1
55: prints them capitalized.
56: .Sh SEE ALSO
57: .Xr skeyinit 1 ,
58: .Xr skeyinfo 1
59: .Sh AUTHORS
60: Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin