diff options
author | Jason McIntyre <jmc@cvs.openbsd.org> | 2004-06-06 21:30:39 +0000 |
---|---|---|
committer | Jason McIntyre <jmc@cvs.openbsd.org> | 2004-06-06 21:30:39 +0000 |
commit | 8a9c04475ae22ab1fe8f7f01a56b2850d2d2b05b (patch) | |
tree | ac132237db2c4a9364e501c77de20b0288ed75d2 /usr.bin | |
parent | c7a354572d2d3bb7899e6aed0b4ec771f843531a (diff) |
- skeyprune is section 8, not 1
- kill whitespace
- -offset for display
Diffstat (limited to 'usr.bin')
-rw-r--r-- | usr.bin/skeyinit/skeyinit.1 | 44 |
1 files changed, 22 insertions, 22 deletions
diff --git a/usr.bin/skeyinit/skeyinit.1 b/usr.bin/skeyinit/skeyinit.1 index d4cef334301..dba1dd51bdc 100644 --- a/usr.bin/skeyinit/skeyinit.1 +++ b/usr.bin/skeyinit/skeyinit.1 @@ -1,4 +1,4 @@ -.\" $OpenBSD: skeyinit.1,v 1.28 2004/06/06 11:23:25 otto Exp $ +.\" $OpenBSD: skeyinit.1,v 1.29 2004/06/06 21:30:38 jmc Exp $ .\" $NetBSD: skeyinit.1,v 1.4 1995/07/07 22:24:09 jtc Exp $ .\" @(#)skeyinit.1 1.1 10/28/93 .\" @@ -25,13 +25,13 @@ .Op Ar user .Sh DESCRIPTION .Nm -initializes the system so you can use S/Key one-time passwords to login. +initializes the system so you can use S/Key one-time passwords to log in. The program will ask you to enter a secret passphrase which is used by .Xr skey 1 to generate one-time passwords; enter a phrase of several words in response. After the S/Key database -has been updated you can login using either your regular password +has been updated you can log in using either your regular password or using S/Key one-time passwords. .Pp .Nm @@ -54,7 +54,7 @@ should be used. The user will then be presented with the standard S/Key challenge and allowed to proceed if it is correct. .Pp -.Nm +.Nm prints a sequence number and a one-time password. This password can not be used to log in; one-time passwords should be generated using @@ -164,23 +164,23 @@ directory containing user entries for S/Key .El .Sh EXAMPLES .Bd -literal - $ skeyinit - Reminder - Only use this method if you are directly connected - or have an encrypted channel. If you are using telnet, - hit return now and use skeyinit -s. - Password: <enter your regular password here> - [Updating user with md5] - Old seed: [md5] host12377 - Enter new secret passphrase: <type a new passphrase here> - Again secret passphrase: <again> - ID user skey is otp-md5 100 host12378 - Next login password: CITE BREW IDLE CAIN ROD DOME - $ otp-md5 -n 3 100 host12378 - Reminder - Do not use this program while logged in via telnet. - Enter secret passphrase: <type your passphrase here> - 98: WERE TUG EDDY GEAR GILL TEE - 99: NEAR HA TILT FIN LONG SNOW - 100: CITE BREW IDLE CAIN ROD DOME +$ skeyinit +Reminder - Only use this method if you are directly connected + or have an encrypted channel. If you are using telnet, + hit return now and use skeyinit -s. +Password: <enter your regular password here> +[Updating user with md5] +Old seed: [md5] host12377 +Enter new secret passphrase: <type a new passphrase here> +Again secret passphrase: <again> +ID user skey is otp-md5 100 host12378 +Next login password: CITE BREW IDLE CAIN ROD DOME +$ otp-md5 -n 3 100 host12378 +Reminder - Do not use this program while logged in via telnet. +Enter secret passphrase: <type your passphrase here> +98: WERE TUG EDDY GEAR GILL TEE +99: NEAR HA TILT FIN LONG SNOW +100: CITE BREW IDLE CAIN ROD DOME .Ed .Pp The one-time password for the next login will have sequence number 99. @@ -199,6 +199,6 @@ flag. .Xr skey 1 , .Xr skeyaudit 1 , .Xr skeyinfo 1 , -.Xr skeyprune 1 +.Xr skeyprune 8 .Sh AUTHORS Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin, Todd Miller |