Annotation of src/usr.bin/skey/skey.1, Revision 1.20
1.20 ! aaron 1: .\" $OpenBSD: skey.1,v 1.19 2000/03/10 20:17:52 aaron Exp $
1.1 deraadt 2: .\" @(#)skey.1 1.1 10/28/93
3: .\"
1.17 millert 4: .Dd October 28, 1993
1.1 deraadt 5: .Dt SKEY 1
1.6 michaels 6: .Os
1.1 deraadt 7: .Sh NAME
1.9 millert 8: .Nm skey, otp-md4, otp-md5, otp-sha1, otp-rmd160
1.13 aaron 9: .Nd respond to an OTP challenge
1.4 millert 10: .Sh SYNOPSIS
11: .Nm skey
12: .Op Fl x
1.16 aaron 13: .Oo
14: .Fl md4 | Fl md5 | Fl sha1 |
15: .Fl rmd160
16: .Oc
1.7 millert 17: .Op Fl n Ar count
1.4 millert 18: .Op Fl p Ar passwd
19: <sequence#>[/] key
1.1 deraadt 20: .Sh DESCRIPTION
21: .Nm S/key
1.12 aaron 22: is a procedure for using one-time passwords to authenticate access to
1.20 ! aaron 23: computer systems.
! 24: It uses 64 bits of information transformed by the
! 25: MD4, MD5, SHA1, or RIPEMD-160 algorithms.
! 26: The user supplies the 64 bits
1.17 millert 27: in the form of 6 English words that are generated by a secure computer.
28: This implementation of
1.8 millert 29: .Nm s/key
30: is RFC 1938 compliant.
1.5 millert 31: .Pp
32: When
33: .Nm skey
1.15 aaron 34: is invoked as
1.5 millert 35: .Nm otp-method ,
36: .Nm skey
37: will use
38: .Ar method
39: as the hash function where
40: .Ar method
1.9 millert 41: is currently one of md4, md5, sha1, or rmd160.
1.5 millert 42: .Pp
43: If you misspell your password while running
44: .Nm skey ,
45: you will get a list of passwords
1.18 millert 46: that will not work, and no indication of the problem.
1.3 millert 47: .Pp
1.18 millert 48: Password sequence numbers count backwards.
1.5 millert 49: You can enter the passwords using small letters, even though
50: .Nm skey
51: prints them capitalized.
1.19 aaron 52: .Pp
53: The options are as follows:
1.10 millert 54: .Bl -tag -width XXXXXXX
1.3 millert 55: .It Fl n Ar count
56: Prints out
57: .Ar count
1.19 aaron 58: one-time passwords.
59: The default is to print one.
1.3 millert 60: .It Fl p Ar password
61: Uses
62: .Ar password
1.19 aaron 63: as the secret password.
64: Use of this option is discouraged as
1.3 millert 65: your secret password could be visible in a process listing.
1.4 millert 66: .It Fl x
1.12 aaron 67: Causes output to be in hexadecimal instead of ASCII.
1.4 millert 68: .It Fl md4
69: Selects MD4 as the hash algorithm.
70: .It Fl md5
71: Selects MD5 as the hash algorithm.
72: .It Fl sha1
1.9 millert 73: Selects SHA-1 (NIST Secure Hash Algorithm Revision 1) as the hash algorithm.
74: .It Fl rmd160
75: Selects RMD-160 (160 bit Ripe Message Digest) as the hash algorithm.
1.3 millert 76: .El
1.19 aaron 77: .Sh EXAMPLES
1.5 millert 78: .sp 0
79: % skey 99 th91334
80: .sp 0
81: Enter secret password: <your secret password is entered here>
82: .sp 0
83: OMEN US HORN OMIT BACK AHOY
84: .sp 0
1.15 aaron 85: %
1.1 deraadt 86: .Sh SEE ALSO
1.14 alex 87: .Xr login 1 ,
1.12 aaron 88: .Xr skeyinfo 1 ,
1.14 alex 89: .Xr skeyinit 1
1.12 aaron 90: .Pp
1.8 millert 91: .Em RFC1938
1.11 deraadt 92: .Sh TRADEMARKS AND PATENTS
93: S/Key is a Trademark of Bellcore.
1.1 deraadt 94: .Sh AUTHORS
95: Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin