Search all pages
Professions, Sciences, Humanities, Business, ...
Text-based, GUI, Audio, Video, Keyboards, Mouse, Images,...
Conversions, tests, processing, manipulation,...
Integer, Floating point, Matrix, Statistics, Boolean, ...
Algorithms, Memory, Process control, Debugging, ...
Data storage, Integrity, Encryption, Compression, ...
Networks, protocols, Interprocess, Remote, Client Server, ...
Timing, Calendar and Clock, Audio, Video, Printer, Controls...
Management, Filtering, File & Directory access, Viewers, ...
RocketLink!--> Man page versions:
SKEYINIT(1) OpenBSD Reference Manual SKEYINIT(1)
skeyinit - change password or add user to S/Key authentication system
skeyinit [-s] [-z] [-n count] [-md4 | -md5 | -sha1 | -rmd160] [user]
skeyinit initializes the system so you can use S/Key one-time passwords
to login. The program will ask you to enter a secret pass phrase; enter
a phrase of several words in response. After the S/Key database has been
updated you can login using either your regular password or using S/Key
skeyinit requires you to type a secret password, so it should be used on-
ly on a secure terminal. For example, on the console of a workstation or
over an encrypted network session. If you are using skeyinit while
logged in over an untrusted network, follow the instructions given below
with the -s option.
Before initializing an S/Key entry, the user must authenticate using ei-
ther a standard password or an S/Key challenge. When used over an un-
trusted network, a password of `s/key' should be used. The user will
then be presented with the standard S/Key challenge and allowed to pro-
ceed if it is correct.
-x Displays pass phrase in hexadecimal instead of ASCII.
-s Set secure mode where the user is expected to have used a secure
machine to generate the first one-time password. Without the -s
option the system will assume you are directly connected over
secure communications and prompt you for your secret password.
The -s option also allows one to set the seed and count for com-
plete control of the parameters. You can use ``skeyinit -s'' in
combination with the skey command to set the seed and count if
you do not like the defaults. To do this run skeyinit in one
window and put in your count and seed, then run skey in another
window to generate the correct 6 English words for that count
and seed. You can then "cut-and-paste" or type the words into
the skeyinit window.
-z Allows the user to zero their S/Key entry.
Start the skey sequence at count (default is 100).
-md4 Selects MD4 as the hash algorithm.
-md5 Selects MD5 as the hash algorithm.
-sha1 Selects SHA (NIST Secure Hash Algorithm Revision 1) as the hash
-rmd160 Selects RMD-160 (160 bit Ripe Message Digest) as the hash algo-
user The username to be changed/added. By default the current user is
skey disabled /etc/skeykeys does not exist. It must be created by the
superuser in order to use skeyinit.
/etc/skeykeys database of information for S/Key system
Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin
OpenBSD 2.6 February 24, 1998 2
Source: OpenBSD 2.6 man pages. Copyright: Portions are copyrighted by BERKELEY
SOFTWARE DESIGN, INC., The Regents of the University of California, Massachusetts
Institute of Technology, Free Software Foundation, FreeBSD Inc., and others.
(Corrections, notes, and links courtesy of RocketAware.com)
OpenBSD sources for skeyinit(1)
Up to: Identity Authentication - verifying the identity of the originator of a connection (passwords, radius, identd, crypto methods, et al.)
RocketLink!--> Man page versions:
Search | About | Comments | Submit Path: RocketAware >
RocketAware.com is a service of Mib Software
Copyright 1999, Forrest J. Cavalier III. All Rights Reserved.
We welcome submissions and comments