Annotation of src/usr.bin/skeyinfo/skeyinfo.1, Revision 1.5
1.5 ! millert 1: .\" $OpenBSD: skeyinfo.1,v 1.4 2001/06/17 22:44:51 millert Exp $
1.1 millert 2: .\"
1.4 millert 3: .Dd 17 June 2001
1.1 millert 4: .Dt SKEYINFO 1
5: .Os
6: .Sh NAME
7: .Nm skeyinfo
8: .Nd obtain the next S/Key challenge for a user
9: .Sh SYNOPSIS
10: .Nm skeyinfo
1.5 ! millert 11: .Op Fl a Ar auth-type
1.1 millert 12: .Op Fl v
13: .Op Ar user
14: .Sh DESCRIPTION
1.3 aaron 15: .Nm
1.1 millert 16: prints out the next S/Key challenge for the specified user or for the
1.3 aaron 17: current user if no user is specified.
18: .Pp
19: The options are as follows:
1.5 ! millert 20: .Bl -tag -width auth-typeXXXX
! 21: .It Fl a Ar auth-type
! 22: Specify an authentication type instead of the default
! 23: .Dq skey .
! 24: This can be used to get a challenge for a challenge/response authentication
! 25: mechanism other than S/Key, or if a remote S/Key server is in use.
! 26: Note that this will cause an error if the selected type
! 27: does not support challenge/response style authentication.
1.3 aaron 28: .It Fl v
29: Print the hash algorithm as well.
30: .El
31: .Sh EXAMPLES
1.1 millert 32: % skey -n <number of passwords to print> `skeyinfo` | lpr
1.3 aaron 33: .Pp
1.1 millert 34: This would print out a list of S/Key passwords for use over
35: an untrusted network (perhaps for use at a conference).
36: .Sh SEE ALSO
1.2 aaron 37: .Xr skey 1 ,
38: .Xr skeyinit 1
1.4 millert 39: .Sh CAVEATS
40: If the user does not have an entry in the S/Key database a fake
41: challenge will be printed.