1.\" @(#)skey.1 1.1 10/28/93 2.\" $Id: skey.1,v 1.1.1.1 1995/10/18 08:46:07 deraadt Exp $ 3.\" 4.Dd 28 October 1993 5.Dt SKEY 1 6.Os NetBSD 4 7.Sh NAME 8.Nm S/key 9.Nd a one time password system 10.Sh DESCRIPTION 11.Nm S/key 12is a procedure for using one time passwords to authenticate access to 13computer systems. It uses 64 bits of information transformed by the 14MD4 algorithm. The user supplies the 64 bits in the form of 6 English 15words that are generated by a secure computer. 16Example use of the S/key program 17.Xr skey 1 : 18.sp 19.sp 0 20 % skey 99 th91334 21.sp 0 22 Enter password: <your secret password is entered here> 23.sp 0 24 OMEN US HORN OMIT BACK AHOY 25.sp 0 26 % 27.Pp 28The programs that are part of the S/Key system are: 29.Bl -tag -width skeyinit... 30.It Xr skeyinit 1 31used to setup your S/Key. 32.It Xr skey 1 33used to get the one time password each time. 34.It Xr skeyinfo 1 35used to extract information from the S/Key database. 36It tells you what your next challenge will be. 37.El 38.Pp 39When you run 40.Xr skeyinit 1 41you inform the system of your 42secret password. Running 43.Xr skey 1 44then generates the 45one-time passwords, and also requires your secret 46password. If however, you misspell your password 47while running 48.Xr skey 1 , 49you will get a list of passwords 50that will not work, and no indication about the problem. 51.Pp 52Password sequence numbers count backward from 99. 53You can enter the passwords using small letters, even though 54.Xr skey 1 55prints them capitalized. 56.Sh SEE ALSO 57.Xr skeyinit 1 , 58.Xr skeyinfo 1 59.Sh AUTHORS 60Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin 61