1997-10-20 03:22:17 +04:00
|
|
|
.\" $NetBSD: skey.1,v 1.8 1997/10/19 23:22:17 lukem Exp $
|
1996-09-19 23:39:36 +04:00
|
|
|
.\"
|
|
|
|
.\" from: @(#)skey.1 1.1 10/28/93
|
1994-05-24 10:47:42 +04:00
|
|
|
.\"
|
|
|
|
.Dd 28 October 1993
|
|
|
|
.Dt SKEY 1
|
|
|
|
.Os NetBSD 4
|
|
|
|
.Sh NAME
|
1997-07-17 21:08:34 +04:00
|
|
|
.Nm skey
|
1997-10-20 03:20:15 +04:00
|
|
|
.Nd interface to the S/Key one time password system
|
|
|
|
.Sh SYNOPSIS
|
|
|
|
.Nm
|
1997-07-17 21:08:34 +04:00
|
|
|
.Op Fl n Ar count
|
|
|
|
.Op Fl p Ar password
|
|
|
|
.Ar sequence#
|
|
|
|
.Op /
|
|
|
|
.Ar key
|
1994-05-24 10:47:42 +04:00
|
|
|
.Sh DESCRIPTION
|
1997-10-20 03:20:15 +04:00
|
|
|
.Em S/key
|
1994-05-24 10:47:42 +04:00
|
|
|
is a procedure for using one time passwords to authenticate access to
|
|
|
|
computer systems. It uses 64 bits of information transformed by the
|
|
|
|
MD4 algorithm. The user supplies the 64 bits in the form of 6 English
|
|
|
|
words that are generated by a secure computer.
|
1997-10-20 03:20:15 +04:00
|
|
|
Example use of the
|
|
|
|
.Em S/key
|
|
|
|
program
|
|
|
|
.Nm "" :
|
1994-05-24 10:47:42 +04:00
|
|
|
.sp
|
|
|
|
.sp 0
|
1994-05-24 11:08:43 +04:00
|
|
|
% skey 99 th91334
|
1994-05-24 10:47:42 +04:00
|
|
|
.sp 0
|
|
|
|
Enter password: <your secret password is entered here>
|
|
|
|
.sp 0
|
|
|
|
OMEN US HORN OMIT BACK AHOY
|
|
|
|
.sp 0
|
|
|
|
%
|
|
|
|
.Pp
|
1997-10-20 03:20:15 +04:00
|
|
|
The programs that are part of the
|
|
|
|
.Em S/Key
|
|
|
|
system are:
|
1994-05-24 11:08:43 +04:00
|
|
|
.Bl -tag -width skeyinit...
|
|
|
|
.It Xr skeyinit 1
|
|
|
|
used to setup your S/Key.
|
1997-10-20 03:20:15 +04:00
|
|
|
.It Nm
|
1994-05-24 11:08:43 +04:00
|
|
|
used to get the one time password each time.
|
1994-06-24 12:06:23 +04:00
|
|
|
.It Xr skeyinfo 1
|
1994-05-24 11:08:43 +04:00
|
|
|
used to extract information from the S/Key database.
|
|
|
|
It tells you what your next challenge will be.
|
|
|
|
.El
|
1994-05-24 10:47:42 +04:00
|
|
|
.Pp
|
1994-05-24 11:08:43 +04:00
|
|
|
When you run
|
|
|
|
.Xr skeyinit 1
|
|
|
|
you inform the system of your
|
|
|
|
secret password. Running
|
1997-10-20 03:20:15 +04:00
|
|
|
.Nm skey
|
1994-05-24 11:08:43 +04:00
|
|
|
then generates the
|
1994-05-24 10:47:42 +04:00
|
|
|
one-time passwords, and also requires your secret
|
|
|
|
password. If however, you misspell your password
|
1994-05-24 11:08:43 +04:00
|
|
|
while running
|
|
|
|
.Xr skey 1 ,
|
|
|
|
you will get a list of passwords
|
1994-05-24 10:47:42 +04:00
|
|
|
that will not work, and no indication about the problem.
|
|
|
|
.Pp
|
1994-05-24 11:08:43 +04:00
|
|
|
Password sequence numbers count backward from 99.
|
|
|
|
You can enter the passwords using small letters, even though
|
|
|
|
.Xr skey 1
|
|
|
|
prints them capitalized.
|
1997-07-17 21:08:34 +04:00
|
|
|
.Pp
|
|
|
|
The
|
|
|
|
.Fl n Ar count
|
|
|
|
argument asks for
|
|
|
|
.Ar count
|
|
|
|
password sequences to be printed out ending with the requested
|
|
|
|
sequence number.
|
|
|
|
.Pp
|
|
|
|
The
|
|
|
|
.Fl p Ar password
|
|
|
|
allows the user to specify the
|
1997-10-20 03:20:15 +04:00
|
|
|
.Em S/key
|
1997-07-17 21:08:34 +04:00
|
|
|
password on the command line.
|
1994-05-24 10:47:42 +04:00
|
|
|
.Sh SEE ALSO
|
1997-10-20 03:22:17 +04:00
|
|
|
.Xr skeyaudit 1 ,
|
|
|
|
.Xr skeyinfo 1 ,
|
|
|
|
.Xr skeyinit 1
|
1994-05-24 10:47:42 +04:00
|
|
|
.Sh AUTHORS
|
|
|
|
Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin
|