Commit | Line | Data |
---|---|---|
05a0983d GR |
1 | .ll 6i |
2 | .pl 10.5i | |
3 | .\" @(#)skey.1 1.1 10/28/93 | |
4 | .\" | |
5 | .lt 6.0i | |
6 | .TH KEY 1 "28 October 1993" | |
7 | .AT 3 | |
8 | .SH NAME | |
9 | S/key \- A proceedure to use one time passwords for accessing computer systems. | |
10 | .SH DESCRIPTION | |
11 | .I S/key | |
12 | is a proceedure for using one time password to authenticate access to | |
13 | compter systems. It uses 64 bits of information transformed by the | |
14 | MD4 algorithm. The user supplies the 64 bits in the form of 6 English | |
15 | words that are generated by a secure computer. | |
16 | Example use of the S/key program | |
17 | .I key | |
18 | .sp | |
19 | Usage example: | |
20 | .sp 0 | |
21 | >key 99 th91334 | |
22 | .sp 0 | |
23 | Enter password: <your secret password is intered here> | |
24 | .sp 0 | |
25 | OMEN US HORN OMIT BACK AHOY | |
26 | .sp 0 | |
27 | > | |
28 | .sp | |
29 | The programs that are part of the S/Key system are keyinit, key, and | |
30 | keyinfo. Keyinit is used to get your ID set up, key is | |
31 | used to get the one time password each time, | |
32 | keyinfo is used to extract information from the S/Key database. | |
33 | .sp | |
34 | When you run "keyinit" you inform the system of your | |
35 | secret password. Running "key" then generates the | |
36 | one-time passwords, and also requires your secret | |
37 | password. If however, you misspell your password | |
38 | while running "key", you will get a list of passwords | |
39 | that will not work, and no indication about the problem. | |
40 | .sp | |
41 | Password sequence numbers count backward from 99. If you | |
42 | don't know this, the syntax for "key" will be confusing. | |
43 | .sp | |
44 | You can enter the passwords using small letters, even | |
45 | though the "key" program gives them in caps. | |
46 | .sp | |
47 | Macintosh and a general purpose PC use | |
48 | are available. | |
49 | .sp | |
50 | Under FreeBSD, you can control, with /etc/skey.access, from which | |
51 | hosts and/or networks the use of S/Key passwords is obligated. | |
52 | .LP | |
53 | .SH SEE ALSO | |
54 | .BR keyinit(1), | |
55 | .BR key(1), | |
56 | .BR keyinfo(1) | |
57 | .BR skey.access(5) | |
58 | .SH AUTHOR | |
59 | Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin |