Annotation of src/usr.bin/skey/skey.1, Revision 1.12
1.12 ! aaron 1: .\" $OpenBSD: skey.1,v 1.11 1998/08/17 17:41:50 deraadt Exp $
1.1 deraadt 2: .\" @(#)skey.1 1.1 10/28/93
3: .\"
4: .Dd 28 October 1993
5: .Dt SKEY 1
1.6 michaels 6: .Os
1.1 deraadt 7: .Sh NAME
1.9 millert 8: .Nm skey, otp-md4, otp-md5, otp-sha1, otp-rmd160
1.4 millert 9: .Nd Respond to a OTP challenge.
10: .Sh SYNOPSIS
11: .Nm skey
12: .Op Fl x
1.9 millert 13: .Op Fl md4 | Fl md5 | Fl sha1 | Fl rmd160
1.7 millert 14: .Op Fl n Ar count
1.4 millert 15: .Op Fl p Ar passwd
16: <sequence#>[/] key
1.1 deraadt 17: .Sh DESCRIPTION
18: .Nm S/key
1.12 ! aaron 19: is a procedure for using one-time passwords to authenticate access to
1.1 deraadt 20: computer systems. It uses 64 bits of information transformed by the
1.5 millert 21: MD4, MD5, or SHA1 algorithms. The user supplies the 64 bits in the form
1.8 millert 22: of 6 English words that are generated by a secure computer. This
23: implementation of
24: .Nm s/key
25: is RFC 1938 compliant.
1.5 millert 26: .Pp
27: When
28: .Nm skey
29: is invoked as
30: .Nm otp-method ,
31: .Nm skey
32: will use
33: .Ar method
34: as the hash function where
35: .Ar method
1.9 millert 36: is currently one of md4, md5, sha1, or rmd160.
1.5 millert 37: .Pp
38: If you misspell your password while running
39: .Nm skey ,
40: you will get a list of passwords
41: that will not work, and no indication about the problem.
1.3 millert 42: .Pp
1.5 millert 43: Password sequence numbers count backward from 99.
44: You can enter the passwords using small letters, even though
45: .Nm skey
46: prints them capitalized.
47: .Sh OPTIONS
1.10 millert 48: .Bl -tag -width XXXXXXX
1.3 millert 49: .It Fl n Ar count
50: Prints out
51: .Ar count
1.12 ! aaron 52: one-time passwords. The default is to print one.
1.3 millert 53: .It Fl p Ar password
54: Uses
55: .Ar password
56: as the secret password. Use of this option is discouraged as
57: your secret password could be visible in a process listing.
1.4 millert 58: .It Fl x
1.12 ! aaron 59: Causes output to be in hexadecimal instead of ASCII.
1.4 millert 60: .It Fl md4
61: Selects MD4 as the hash algorithm.
62: .It Fl md5
63: Selects MD5 as the hash algorithm.
64: .It Fl sha1
1.9 millert 65: Selects SHA-1 (NIST Secure Hash Algorithm Revision 1) as the hash algorithm.
66: .It Fl rmd160
67: Selects RMD-160 (160 bit Ripe Message Digest) as the hash algorithm.
1.3 millert 68: .El
1.5 millert 69: .Sh EXAMPLE
70: .sp 0
71: % skey 99 th91334
72: .sp 0
73: Enter secret password: <your secret password is entered here>
74: .sp 0
75: OMEN US HORN OMIT BACK AHOY
76: .sp 0
77: %
1.1 deraadt 78: .Sh SEE ALSO
1.12 ! aaron 79: .Xr skeyinfo 1 ,
1.1 deraadt 80: .Xr skeyinit 1 ,
1.12 ! aaron 81: .Xr login 1
! 82: .Pp
1.8 millert 83: .Em RFC1938
1.11 deraadt 84: .Sh TRADEMARKS AND PATENTS
85: S/Key is a Trademark of Bellcore.
1.1 deraadt 86: .Sh AUTHORS
87: Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin