NetBSD/usr.bin/skey/skey.1

87 lines
1.9 KiB
Groff
Raw Normal View History

1997-10-20 03:22:17 +04:00
.\" $NetBSD: skey.1,v 1.8 1997/10/19 23:22:17 lukem Exp $
1996-09-19 23:39:36 +04:00
.\"
.\" from: @(#)skey.1 1.1 10/28/93
1994-05-24 10:47:42 +04:00
.\"
.Dd 28 October 1993
.Dt SKEY 1
.Os NetBSD 4
.Sh NAME
.Nm skey
.Nd interface to the S/Key one time password system
.Sh SYNOPSIS
.Nm
.Op Fl n Ar count
.Op Fl p Ar password
.Ar sequence#
.Op /
.Ar key
1994-05-24 10:47:42 +04:00
.Sh DESCRIPTION
.Em S/key
1994-05-24 10:47:42 +04:00
is a procedure for using one time passwords to authenticate access to
computer systems. It uses 64 bits of information transformed by the
MD4 algorithm. The user supplies the 64 bits in the form of 6 English
words that are generated by a secure computer.
Example use of the
.Em S/key
program
.Nm "" :
1994-05-24 10:47:42 +04:00
.sp
.sp 0
1994-05-24 11:08:43 +04:00
% skey 99 th91334
1994-05-24 10:47:42 +04:00
.sp 0
Enter password: <your secret password is entered here>
.sp 0
OMEN US HORN OMIT BACK AHOY
.sp 0
%
.Pp
The programs that are part of the
.Em S/Key
system are:
1994-05-24 11:08:43 +04:00
.Bl -tag -width skeyinit...
.It Xr skeyinit 1
used to setup your S/Key.
.It Nm
1994-05-24 11:08:43 +04:00
used to get the one time password each time.
1994-06-24 12:06:23 +04:00
.It Xr skeyinfo 1
1994-05-24 11:08:43 +04:00
used to extract information from the S/Key database.
It tells you what your next challenge will be.
.El
1994-05-24 10:47:42 +04:00
.Pp
1994-05-24 11:08:43 +04:00
When you run
.Xr skeyinit 1
you inform the system of your
secret password. Running
.Nm skey
1994-05-24 11:08:43 +04:00
then generates the
1994-05-24 10:47:42 +04:00
one-time passwords, and also requires your secret
password. If however, you misspell your password
1994-05-24 11:08:43 +04:00
while running
.Xr skey 1 ,
you will get a list of passwords
1994-05-24 10:47:42 +04:00
that will not work, and no indication about the problem.
.Pp
1994-05-24 11:08:43 +04:00
Password sequence numbers count backward from 99.
You can enter the passwords using small letters, even though
.Xr skey 1
prints them capitalized.
.Pp
The
.Fl n Ar count
argument asks for
.Ar count
password sequences to be printed out ending with the requested
sequence number.
.Pp
The
.Fl p Ar password
allows the user to specify the
.Em S/key
password on the command line.
1994-05-24 10:47:42 +04:00
.Sh SEE ALSO
1997-10-20 03:22:17 +04:00
.Xr skeyaudit 1 ,
.Xr skeyinfo 1 ,
.Xr skeyinit 1
1994-05-24 10:47:42 +04:00
.Sh AUTHORS
Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin