[BACK]Return to skey.1 CVS log [TXT][DIR] Up to [local] / src / usr.bin / skey

Annotation of src/usr.bin/skey/skey.1, Revision 1.13

1.13    ! aaron       1: .\" $OpenBSD: skey.1,v 1.12 1998/09/27 16:57:53 aaron Exp $
1.1       deraadt     2: .\"    @(#)skey.1      1.1     10/28/93
                      3: .\"
                      4: .Dd 28 October 1993
                      5: .Dt SKEY 1
1.6       michaels    6: .Os
1.1       deraadt     7: .Sh NAME
1.9       millert     8: .Nm skey, otp-md4, otp-md5, otp-sha1, otp-rmd160
1.13    ! aaron       9: .Nd respond to an OTP challenge
1.4       millert    10: .Sh SYNOPSIS
                     11: .Nm skey
                     12: .Op Fl x
1.9       millert    13: .Op Fl md4 | Fl md5 | Fl sha1 | Fl rmd160
1.7       millert    14: .Op Fl n Ar count
1.4       millert    15: .Op Fl p Ar passwd
                     16: <sequence#>[/] key
1.1       deraadt    17: .Sh DESCRIPTION
                     18: .Nm S/key
1.12      aaron      19: is a procedure for using one-time passwords to authenticate access to
1.1       deraadt    20: computer systems. It uses 64 bits of information transformed by the
1.5       millert    21: MD4, MD5, or SHA1 algorithms. The user supplies the 64 bits in the form
1.8       millert    22: of 6 English words that are generated by a secure computer.  This
                     23: implementation of
                     24: .Nm s/key
                     25: is RFC 1938 compliant.
1.5       millert    26: .Pp
                     27: When
                     28: .Nm skey
                     29: is invoked as
                     30: .Nm otp-method ,
                     31: .Nm skey
                     32: will use
                     33: .Ar method
                     34: as the hash function where
                     35: .Ar method
1.9       millert    36: is currently one of md4, md5, sha1, or rmd160.
1.5       millert    37: .Pp
                     38: If you misspell your password while running
                     39: .Nm skey ,
                     40: you will get a list of passwords
                     41: that will not work, and no indication about the problem.
1.3       millert    42: .Pp
1.5       millert    43: Password sequence numbers count backward from 99.
                     44: You can enter the passwords using small letters, even though
                     45: .Nm skey
                     46: prints them capitalized.
                     47: .Sh OPTIONS
1.10      millert    48: .Bl -tag -width XXXXXXX
1.3       millert    49: .It Fl n Ar count
                     50: Prints out
                     51: .Ar count
1.12      aaron      52: one-time passwords.  The default is to print one.
1.3       millert    53: .It Fl p Ar password
                     54: Uses
                     55: .Ar password
                     56: as the secret password.  Use of this option is discouraged as
                     57: your secret password could be visible in a process listing.
1.4       millert    58: .It Fl x
1.12      aaron      59: Causes output to be in hexadecimal instead of ASCII.
1.4       millert    60: .It Fl md4
                     61: Selects MD4 as the hash algorithm.
                     62: .It Fl md5
                     63: Selects MD5 as the hash algorithm.
                     64: .It Fl sha1
1.9       millert    65: Selects SHA-1 (NIST Secure Hash Algorithm Revision 1) as the hash algorithm.
                     66: .It Fl rmd160
                     67: Selects RMD-160 (160 bit Ripe Message Digest) as the hash algorithm.
1.3       millert    68: .El
1.5       millert    69: .Sh EXAMPLE
                     70: .sp 0
                     71:     % skey 99 th91334
                     72: .sp 0
                     73:     Enter secret password: <your secret password is entered here>
                     74: .sp 0
                     75:     OMEN US HORN OMIT BACK AHOY
                     76: .sp 0
                     77:     %
1.1       deraadt    78: .Sh SEE ALSO
1.12      aaron      79: .Xr skeyinfo 1 ,
1.1       deraadt    80: .Xr skeyinit 1 ,
1.12      aaron      81: .Xr login 1
                     82: .Pp
1.8       millert    83: .Em RFC1938
1.11      deraadt    84: .Sh TRADEMARKS AND PATENTS
                     85: S/Key is a Trademark of Bellcore.
1.1       deraadt    86: .Sh AUTHORS
                     87: Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin