[BACK]Return to skey.1 CVS log [TXT][DIR] Up to [local] / src / usr.bin / skey

Annotation of src/usr.bin/skey/skey.1, Revision 1.7

1.7     ! millert     1: .\" $OpenBSD: skey.1,v 1.6 1996/10/08 01:20:55 michaels Exp $
1.1       deraadt     2: .\"    @(#)skey.1      1.1     10/28/93
                      3: .\"
                      4: .Dd 28 October 1993
                      5: .Dt SKEY 1
1.6       michaels    6: .Os
1.1       deraadt     7: .Sh NAME
1.4       millert     8: .Nm skey, otp-md4, otp-md5, otp-sha1
                      9: .Nd Respond to a OTP challenge.
                     10: .Sh SYNOPSIS
                     11: .Nm skey
                     12: .Op Fl x
                     13: .Op Fl md4 | Fl md5 | Fl sha1
1.7     ! millert    14: .Op Fl n Ar count
1.4       millert    15: .Op Fl p Ar passwd
                     16: <sequence#>[/] key
1.1       deraadt    17: .Sh DESCRIPTION
                     18: .Nm S/key
                     19: is a procedure for using one time passwords to authenticate access to
                     20: computer systems. It uses 64 bits of information transformed by the
1.5       millert    21: MD4, MD5, or SHA1 algorithms. The user supplies the 64 bits in the form
                     22: of 6 English words that are generated by a secure computer.
                     23: .Pp
                     24: When
                     25: .Nm skey
                     26: is invoked as
                     27: .Nm otp-method ,
                     28: .Nm skey
                     29: will use
                     30: .Ar method
                     31: as the hash function where
                     32: .Ar method
                     33: is currently one of md4, md5, or sha1.
                     34: .Pp
                     35: If you misspell your password while running
                     36: .Nm skey ,
                     37: you will get a list of passwords
                     38: that will not work, and no indication about the problem.
1.3       millert    39: .Pp
1.5       millert    40: Password sequence numbers count backward from 99.
                     41: You can enter the passwords using small letters, even though
                     42: .Nm skey
                     43: prints them capitalized.
                     44: .Sh OPTIONS
1.3       millert    45: .Bl -tag -width Ds
                     46: .It Fl n Ar count
                     47: Prints out
                     48: .Ar count
                     49: one time passwords.  The default is to print one.
                     50: .It Fl p Ar password
                     51: Uses
                     52: .Ar password
                     53: as the secret password.  Use of this option is discouraged as
                     54: your secret password could be visible in a process listing.
1.4       millert    55: .It Fl x
                     56: causes output to be in hexidecimal instead of ASCII.
                     57: .It Fl md4
                     58: Selects MD4 as the hash algorithm.
                     59: .It Fl md5
                     60: Selects MD5 as the hash algorithm.
                     61: .It Fl sha1
1.5       millert    62: Selects SHA1 (NIST Secure Hash Algorithm Revision 1) as the hash algorithm.
1.3       millert    63: .El
1.5       millert    64: .Sh EXAMPLE
                     65: .sp 0
                     66:     % skey 99 th91334
                     67: .sp 0
                     68:     Enter secret password: <your secret password is entered here>
                     69: .sp 0
                     70:     OMEN US HORN OMIT BACK AHOY
                     71: .sp 0
                     72:     %
1.1       deraadt    73: .Sh SEE ALSO
                     74: .Xr skeyinit 1 ,
                     75: .Xr skeyinfo 1
                     76: .Sh AUTHORS
                     77: Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin