Annotation of src/usr.bin/skey/skey.1, Revision 1.7
1.7 ! millert 1: .\" $OpenBSD: skey.1,v 1.6 1996/10/08 01:20:55 michaels Exp $
1.1 deraadt 2: .\" @(#)skey.1 1.1 10/28/93
3: .\"
4: .Dd 28 October 1993
5: .Dt SKEY 1
1.6 michaels 6: .Os
1.1 deraadt 7: .Sh NAME
1.4 millert 8: .Nm skey, otp-md4, otp-md5, otp-sha1
9: .Nd Respond to a OTP challenge.
10: .Sh SYNOPSIS
11: .Nm skey
12: .Op Fl x
13: .Op Fl md4 | Fl md5 | Fl sha1
1.7 ! millert 14: .Op Fl n Ar count
1.4 millert 15: .Op Fl p Ar passwd
16: <sequence#>[/] key
1.1 deraadt 17: .Sh DESCRIPTION
18: .Nm S/key
19: is a procedure for using one time passwords to authenticate access to
20: computer systems. It uses 64 bits of information transformed by the
1.5 millert 21: MD4, MD5, or SHA1 algorithms. The user supplies the 64 bits in the form
22: of 6 English words that are generated by a secure computer.
23: .Pp
24: When
25: .Nm skey
26: is invoked as
27: .Nm otp-method ,
28: .Nm skey
29: will use
30: .Ar method
31: as the hash function where
32: .Ar method
33: is currently one of md4, md5, or sha1.
34: .Pp
35: If you misspell your password while running
36: .Nm skey ,
37: you will get a list of passwords
38: that will not work, and no indication about the problem.
1.3 millert 39: .Pp
1.5 millert 40: Password sequence numbers count backward from 99.
41: You can enter the passwords using small letters, even though
42: .Nm skey
43: prints them capitalized.
44: .Sh OPTIONS
1.3 millert 45: .Bl -tag -width Ds
46: .It Fl n Ar count
47: Prints out
48: .Ar count
49: one time passwords. The default is to print one.
50: .It Fl p Ar password
51: Uses
52: .Ar password
53: as the secret password. Use of this option is discouraged as
54: your secret password could be visible in a process listing.
1.4 millert 55: .It Fl x
56: causes output to be in hexidecimal instead of ASCII.
57: .It Fl md4
58: Selects MD4 as the hash algorithm.
59: .It Fl md5
60: Selects MD5 as the hash algorithm.
61: .It Fl sha1
1.5 millert 62: Selects SHA1 (NIST Secure Hash Algorithm Revision 1) as the hash algorithm.
1.3 millert 63: .El
1.5 millert 64: .Sh EXAMPLE
65: .sp 0
66: % skey 99 th91334
67: .sp 0
68: Enter secret password: <your secret password is entered here>
69: .sp 0
70: OMEN US HORN OMIT BACK AHOY
71: .sp 0
72: %
1.1 deraadt 73: .Sh SEE ALSO
74: .Xr skeyinit 1 ,
75: .Xr skeyinfo 1
76: .Sh AUTHORS
77: Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin