|
NAMEopiekey, otp-md4, otp-md5 - Programs for computing responses to OTP challenges.SYNOPSISopiekey | otp-md4 | otp-md5 [-v] [-h] [-f] [-x][-t type ] [-4|-5] [-a] [-n count ] sequence_number seed DESCRIPTIONopiekey takes the optional count of the number of responses to print along with a (maximum) sequence number and seed as command line args. It prompts for the user's secret pass phrase and produces an OPIE response as six words. If compiled to do so, it can prompt for the user's secret pass phrase twice to help reduce errors due to mistypes. The second password entry can be circumvented by entering only an end of line. opiekey is downward compatible with the key(1) program from the Bellcore S/Key Version 1 distribution and several of its variants.OPTIONS
EXAMPLEwintermute$ opiekey -5 -n 5 495 wi01309Using MD5 algorithm to compute response. Reminder: Don't use opiekey from telnet or dial-in sessions. Enter secret pass phrase: 491: HOST VET FOWL SEEK IOWA YAP 492: JOB ARTS WERE FEAT TILE IBIS 493: TRUE BRED JOEL USER HALT EBEN 494: HOOD WED MOLT PAN FED RUBY 495: SUB YAW BILE GLEE OWE NOR wintermute$ BUGSopiekey(1) can lull a user into revealing his/her password when remotely logged in, thus defeating the purpose of OPIE. This is especially a problem with xterm. opiekey(1) implements simple checks to reduce the risk of a user making this mistake. Better checks are needed.SEE ALSOftpd(8), login(1), opie(4), opiepasswd(1), opieinfo(1), opiekeys(5), opieaccess(5), su(1)AUTHORBellcore's S/Key was written by Phil Karn, Neil M. Haller, and John S. Walden of Bellcore. OPIE was created at NRL by Randall Atkinson, Dan McDonald, and Craig Metz.S/Key is a trademark of Bell Communications Research (Bellcore). CONTACTOPIE is discussed on the Bellcore "S/Key Users" mailing list. To join, send an email request to:skey-users-request@thumper.bellcore.com
Visit the GSP FreeBSD Man Page Interface. |