1) Added s/key support .
[unix-history] / usr.bin / key / skey.1
CommitLineData
05a0983d
GR
1.ll 6i
2.pl 10.5i
3.\" @(#)skey.1 1.1 10/28/93
4.\"
5.lt 6.0i
6.TH KEY 1 "28 October 1993"
7.AT 3
8.SH NAME
9S/key \- A proceedure to use one time passwords for accessing computer systems.
10.SH DESCRIPTION
11.I S/key
12is a proceedure for using one time password to authenticate access to
13compter systems. It uses 64 bits of information transformed by the
14MD4 algorithm. The user supplies the 64 bits in the form of 6 English
15words that are generated by a secure computer.
16Example use of the S/key program
17.I key
18.sp
19 Usage example:
20.sp 0
21 >key 99 th91334
22.sp 0
23 Enter password: <your secret password is intered here>
24.sp 0
25 OMEN US HORN OMIT BACK AHOY
26.sp 0
27 >
28.sp
29The programs that are part of the S/Key system are keyinit, key, and
30keyinfo. Keyinit is used to get your ID set up, key is
31used to get the one time password each time,
32keyinfo is used to extract information from the S/Key database.
33.sp
34When you run "keyinit" you inform the system of your
35secret password. Running "key" then generates the
36one-time passwords, and also requires your secret
37password. If however, you misspell your password
38while running "key", you will get a list of passwords
39that will not work, and no indication about the problem.
40.sp
41Password sequence numbers count backward from 99. If you
42don't know this, the syntax for "key" will be confusing.
43.sp
44You can enter the passwords using small letters, even
45though the "key" program gives them in caps.
46.sp
47Macintosh and a general purpose PC use
48are available.
49.sp
50Under FreeBSD, you can control, with /etc/skey.access, from which
51hosts and/or networks the use of S/Key passwords is obligated.
52.LP
53.SH SEE ALSO
54.BR keyinit(1),
55.BR key(1),
56.BR keyinfo(1)
57.BR skey.access(5)
58.SH AUTHOR
59Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin