Skeyinit

LOGIN_SKEY(8) - System Manager's Manual

Skeyinfo, Login.conf, Login, Ftpd, Skeyinit, Skey, Login-Skey

LOGIN_SKEY(8) - System Manager’s Manual # LOGIN_SKEY(8) - System Manager’s Manual NAME # login_skey - provide S/Key authentication type SYNOPSIS # login_skey [-s service] [-v fd=number] user [class] DESCRIPTION # The login_skey utility is called by login(1), su(1), ftpd(8), and others to authenticate the user with S/Key authentication. The service argument specifies which protocol to use with the invoking program. The allowed protocols are login, challenge, and response. The default protocol is login. ...

SKEY(1) - General Commands Manual

Skeyinfo, Login, Skeyinit, Skeyaudit, Skeyprune, Skey

SKEY(1) - General Commands Manual # SKEY(1) - General Commands Manual NAME # skey, otp-md5, otp-rmd160, otp-sha1 - respond to an OTP challenge SYNOPSIS # skey [-x] [-md5 | -rmd160 | -sha1] [-n count] [-p passphrase] <sequence#> [/] key DESCRIPTION # S/Key is a procedure for using one-time passwords to authenticate access to computer systems. It uses 64 bits of information transformed by the MD5, RIPEMD-160, or SHA1 algorithms. The user supplies the 64 bits in the form of 6 English words that are generated by a secure computer. ...

SKEY(5) - File Formats Manual

Skeyinit, Skey

SKEY(5) - File Formats Manual # SKEY(5) - File Formats Manual NAME # skey - one-time password user database DESCRIPTION # The /etc/skey directory contains user records for the S/Key one-time password authentication system. Records take the form of files within /etc/skey, where each file is named for the user whose record it contains. For example, /etc/skey/root would hold root’s S/Key record. The mode for /etc/skey should be 01730 and it should be owned by root and group auth. ...

SKEYAUDIT(1) - General Commands Manual

Skeyinit, Skey, Skeyaudit

SKEYAUDIT(1) - General Commands Manual # SKEYAUDIT(1) - General Commands Manual NAME # skeyaudit - warn users if their S/Key will soon expire SYNOPSIS # skeyaudit [-ai] [-l limit] DESCRIPTION # skeyaudit searches through the files in /etc/skey for users whose S/Key sequence number is less than limit, and mails them a reminder to run skeyinit(1) soon. The options are as follows: -a Check all keys in /etc/skey. This option is only available to the superuser and is useful to run regularly via cron(8). ...

SKEYINFO(1) - General Commands Manual

Skeyinit, Skey, Skeyinfo

SKEYINFO(1) - General Commands Manual # SKEYINFO(1) - General Commands Manual NAME # skeyinfo - obtain the next S/Key challenge for a user SYNOPSIS # skeyinfo [-v] [user] DESCRIPTION # skeyinfo prints out the next S/Key challenge for the specified user or for the current user if no user is specified. The options are as follows: -v Print the hash algorithm as well. FILES # /etc/skey directory containing user entries for S/Key ...

SKEYINIT(1) - General Commands Manual

Skeyaudit, Skeyprune, Skeyinfo, Skey, Skeyinit

SKEYINIT(1) - General Commands Manual # SKEYINIT(1) - General Commands Manual NAME # skeyinit - change password or add user to S/Key authentication system SYNOPSIS # skeyinit [-DErsx] [-a auth-type] [-n count] [-md5 | -rmd160 | -sha1] [user] DESCRIPTION # skeyinit initializes the system so you can use S/Key one-time passwords to log in. The program will ask you to enter a secret passphrase which is used by skey(1) to generate one-time passwords: enter a phrase of several words in response. ...

SKEYPRUNE(8) - System Manager's Manual

Skeyinit, Skey, Skeyprune

SKEYPRUNE(8) - System Manager’s Manual # SKEYPRUNE(8) - System Manager’s Manual NAME # skeyprune - prune zeroed and old entries from S/Key database SYNOPSIS # skeyprune [days] DESCRIPTION # skeyprune searches through the S/Key database, /etc/skey, and prunes out entries that have been zeroed out via skeyinit(1) as well as entries that have not been modified in days days. If days is not specified, only invalid entries are pruned. ...