[BACK]Return to skey.1 CVS log [TXT][DIR] Up to [local] / src / usr.bin / skey

Annotation of src/usr.bin/skey/skey.1, Revision 1.18

1.18    ! millert     1: .\" $OpenBSD: skey.1,v 1.17 1999/08/17 16:17:24 millert Exp $
1.1       deraadt     2: .\"    @(#)skey.1      1.1     10/28/93
                      3: .\"
1.17      millert     4: .Dd October 28, 1993
1.1       deraadt     5: .Dt SKEY 1
1.6       michaels    6: .Os
1.1       deraadt     7: .Sh NAME
1.9       millert     8: .Nm skey, otp-md4, otp-md5, otp-sha1, otp-rmd160
1.13      aaron       9: .Nd respond to an OTP challenge
1.4       millert    10: .Sh SYNOPSIS
                     11: .Nm skey
                     12: .Op Fl x
1.16      aaron      13: .Oo
                     14: .Fl md4 | Fl md5 | Fl sha1 |
                     15: .Fl rmd160
                     16: .Oc
1.7       millert    17: .Op Fl n Ar count
1.4       millert    18: .Op Fl p Ar passwd
                     19: <sequence#>[/] key
1.1       deraadt    20: .Sh DESCRIPTION
                     21: .Nm S/key
1.12      aaron      22: is a procedure for using one-time passwords to authenticate access to
1.1       deraadt    23: computer systems. It uses 64 bits of information transformed by the
1.17      millert    24: MD4, MD5, SHA1, or RIPEMD-160 algorithms. The user supplies the 64 bits
                     25: in the form of 6 English words that are generated by a secure computer.
                     26: This implementation of
1.8       millert    27: .Nm s/key
                     28: is RFC 1938 compliant.
1.5       millert    29: .Pp
                     30: When
                     31: .Nm skey
1.15      aaron      32: is invoked as
1.5       millert    33: .Nm otp-method ,
                     34: .Nm skey
                     35: will use
                     36: .Ar method
                     37: as the hash function where
                     38: .Ar method
1.9       millert    39: is currently one of md4, md5, sha1, or rmd160.
1.5       millert    40: .Pp
                     41: If you misspell your password while running
                     42: .Nm skey ,
                     43: you will get a list of passwords
1.18    ! millert    44: that will not work, and no indication of the problem.
1.3       millert    45: .Pp
1.18    ! millert    46: Password sequence numbers count backwards.
1.5       millert    47: You can enter the passwords using small letters, even though
                     48: .Nm skey
                     49: prints them capitalized.
                     50: .Sh OPTIONS
1.10      millert    51: .Bl -tag -width XXXXXXX
1.3       millert    52: .It Fl n Ar count
                     53: Prints out
                     54: .Ar count
1.12      aaron      55: one-time passwords.  The default is to print one.
1.3       millert    56: .It Fl p Ar password
                     57: Uses
                     58: .Ar password
                     59: as the secret password.  Use of this option is discouraged as
                     60: your secret password could be visible in a process listing.
1.4       millert    61: .It Fl x
1.12      aaron      62: Causes output to be in hexadecimal instead of ASCII.
1.4       millert    63: .It Fl md4
                     64: Selects MD4 as the hash algorithm.
                     65: .It Fl md5
                     66: Selects MD5 as the hash algorithm.
                     67: .It Fl sha1
1.9       millert    68: Selects SHA-1 (NIST Secure Hash Algorithm Revision 1) as the hash algorithm.
                     69: .It Fl rmd160
                     70: Selects RMD-160 (160 bit Ripe Message Digest) as the hash algorithm.
1.3       millert    71: .El
1.5       millert    72: .Sh EXAMPLE
                     73: .sp 0
                     74:     % skey 99 th91334
                     75: .sp 0
                     76:     Enter secret password: <your secret password is entered here>
                     77: .sp 0
                     78:     OMEN US HORN OMIT BACK AHOY
                     79: .sp 0
1.15      aaron      80:     %
1.1       deraadt    81: .Sh SEE ALSO
1.14      alex       82: .Xr login 1 ,
1.12      aaron      83: .Xr skeyinfo 1 ,
1.14      alex       84: .Xr skeyinit 1
1.12      aaron      85: .Pp
1.8       millert    86: .Em RFC1938
1.11      deraadt    87: .Sh TRADEMARKS AND PATENTS
                     88: S/Key is a Trademark of Bellcore.
1.1       deraadt    89: .Sh AUTHORS
                     90: Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin