*** UNIX MANUAL PAGE BROWSER ***

A Nergahak database for man pages research.

Navigation

Directory Browser

1Browse 4.4BSD4.4BSD
1Browse Digital UNIXDigital UNIX 4.0e
1Browse FreeBSDFreeBSD 14.3
1Browse MINIXMINIX 3.4.0rc6-d5e4fc0
1Browse NetBSDNetBSD 10.1
1Browse OpenBSDOpenBSD 7.7
1Browse UNIX v7Version 7 UNIX
1Browse UNIX v10Version 10 UNIX

Manual Page Search

Manual Page Result

0 Command: skey | Section: 5 | Source: OpenBSD | File: skey.5
SKEY(5) FreeBSD File Formats Manual SKEY(5) NAME skey - one-time password user database DESCRIPTION The /etc/skey directory contains user records for the S/Key one-time password authentication system. Records take the form of files within /etc/skey, where each file is named for the user whose record it contains. For example, /etc/skey/root would hold root's S/Key record. The mode for /etc/skey should be 01730 and it should be owned by root and group auth. Individual records within /etc/skey should be owned by the user they describe and be mode 0600. To access S/Key records, a process must run as group auth. Each record consists of five lines: 1. The name of the user the record describes. This should be the same as the name of the file. 2. The hash type used for this entry: one of md5, sha1, or rmd160. The default is md5. 3. The sequence number. This is a decimal number between one and one thousand. Each time the user authenticates via S/Key this number is decremented by one. 4. A seed used along with the sequence number and the six S/Key words to compute the value. 5. The value expected from the crunching of the user's seed, sequence number, and the six S/Key words. When the result matches this value, authentication is considered to have been successful. FILES /etc/skey EXAMPLES Here is a sample /etc/skey file for root: root md5 99 obsd36521 1f4359a3764b675d SEE ALSO skey(1), skeyinit(1), skey(3) FreeBSD 14.1-RELEASE-p8 October 24, 2020 FreeBSD 14.1-RELEASE-p8

Navigation Options