summaryrefslogtreecommitdiff
path: root/usr.bin/skey/skey.1
blob: 019f27c3cd223329269be12552035452547cf134 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
.\" $OpenBSD: skey.1,v 1.9 1997/07/17 05:48:39 millert Exp $
.\"	@(#)skey.1	1.1 	10/28/93
.\"
.Dd 28 October 1993
.Dt SKEY 1
.Os
.Sh NAME
.Nm skey, otp-md4, otp-md5, otp-sha1, otp-rmd160
.Nd Respond to a OTP challenge.
.Sh SYNOPSIS
.Nm skey
.Op Fl x
.Op Fl md4 | Fl md5 | Fl sha1 | Fl rmd160
.Op Fl n Ar count
.Op Fl p Ar passwd
<sequence#>[/] key
.Sh DESCRIPTION
.Nm S/key
is a procedure for using one time passwords to authenticate access to
computer systems. It uses 64 bits of information transformed by the
MD4, MD5, or SHA1 algorithms. The user supplies the 64 bits in the form
of 6 English words that are generated by a secure computer.  This
implementation of
.Nm s/key
is RFC 1938 compliant.
.Pp
When
.Nm skey
is invoked as 
.Nm otp-method ,
.Nm skey
will use
.Ar method
as the hash function where
.Ar method
is currently one of md4, md5, sha1, or rmd160.
.Pp
If you misspell your password while running
.Nm skey ,
you will get a list of passwords
that will not work, and no indication about the problem.
.Pp
Password sequence numbers count backward from 99.
You can enter the passwords using small letters, even though
.Nm skey
prints them capitalized.
.Sh OPTIONS
.Bl -tag -width Ds
.It Fl n Ar count
Prints out
.Ar count
one time passwords.  The default is to print one.
.It Fl p Ar password
Uses
.Ar password
as the secret password.  Use of this option is discouraged as
your secret password could be visible in a process listing.
.It Fl x
causes output to be in hexidecimal instead of ASCII.
.It Fl md4
Selects MD4 as the hash algorithm.
.It Fl md5
Selects MD5 as the hash algorithm.
.It Fl sha1
Selects SHA-1 (NIST Secure Hash Algorithm Revision 1) as the hash algorithm.
.It Fl rmd160
Selects RMD-160 (160 bit Ripe Message Digest) as the hash algorithm.
.El
.Sh EXAMPLE
.sp 0
    % skey 99 th91334
.sp 0
    Enter secret password: <your secret password is entered here>
.sp 0
    OMEN US HORN OMIT BACK AHOY
.sp 0
    % 
.Sh SEE ALSO
.Xr skeyinit 1 ,
.Xr skeyinfo 1 ,
.Em RFC1938
.Sh AUTHORS
Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin