1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149
|
.TH DONKEY 1 "October 4, 1995" "" ""
.\" NAME should be all caps, SECTION should be 1-8, maybe w/ subsection
.\" other parms are allowed: see man(7), man(1)
.SH NAME
donkey \- alternative for S/KEY's "key" command.
.SH SYNOPSIS
.B donkey
.I "[options] sequence seed"
.br
.B donkey
.I "\-i"
.P
.B key
.I "[option] sequence seed"
.br
.B key
.I "\-i"
.SH "DESCRIPTION"
.PP
This manual page documents briefly the
.BR donkey ,
and
.B key
commands.
This manual page was written for the Debian GNU/Linux distribution
because the original program does not have a manual page.
Instead, it has documentation in /usr/share/doc/donkey
.PP
.B donkey
is an alternative for S/KEY's "key" command. The new feature that
the original key doesn't have is print an entry for skeykeys as
follows;
.nf
.RS
kazu 0099 al02004 115d83956f1089b6 Apr 26,1995 22:13:27
.RE
.fi
This means that donkey is also an alternative for "keyinit". Since the
entry is printed to stdout (not to /etc/skeykeys), you can easily sent
it to a remote operator by e-mail (with a PGP signature or something).
So it is possible to initiate S/KEY without loginging onto the console of
the host.
.SH OPTIONS
.PP
A summary of options is included below.
.TP
.B \-n
.I num
specify the number of keys to be calculated.
.TP
.B \-f
.I func
choose a hash function \- one of
.B MD2
,
.B MD4
, or
.B MD5
.
.SH EXAMPLES
.PP
.SS (1) Calculate an One-Time-Password.
Execute Donkey with a sequence number and a seed, then input your passphrase.
.nf
.RS
% donkey 80 is12345
Enter passphrase : xxxxxxxxxxxxxxxxxxxxxxx
SOFT O SAW SWAB CON RODE
.RE
.fi
You can choose the hash function.
.nf
.RS
% donkey 80 is12345
Enter passphrase : xxxxxxxxxxxxxxxxxxxxxxx
SOFT O SAW SWAB CON RODE
%donkey \-f md5 80 is12345
Enter passphrase : xxxxxxxxxxxxxxxxxxxxxxx
LACK WIN ROSE ANNA STUN REEK
.RE
.fi
The default hash function is MD4 due to historical reasons.
.SS (2) Calculate several One-Time-Passwords at once.
Use the \-n option.
.nf
.RS
% donkey \-n 10 80 is12345
Enter passphrase : xxxxxxxxxxxxxxxxxxxxxxx
71: WORE HELL CUB FAR DORA MALE
72: SAIL DAN DONE BEER DAYS MOS
73: PAN TONE THAT TOUT BURY EST
74: KEN ROAM HEAT NAN MEAN HEN
75: MINI MARS HASH BOTH SITU SING
76: TOW SHIN FLUE ARID AHOY NE
77: SLID LEEK NO TREE STOW BEY
78: RUDY WINE GIFT FUSS AGEE SUE
79: GELD THIN MAID THIN BUD TURF
80: SOFT O SAW SWAB CON RODE
.RE
.fi
Note that though "Enter passphrase" is printed out to the standard
erorr stream, the One-Time-Passwords are written to the standard
output stream, so you can redirect the output safely.
.SS (3) Print an skeykeys entry.
Use the \-i option without argments. Then, enter the login name,
the sequence number and the seed. Input your passphrase twice to get
the entry.
.nf
.RS
% donkey \-i
Enter login name [default kazu]:
Enter sequence 1 to 999 [default 99]:
Enter new seed [default ur18122]:
Please choose passphrase between 8 and 256 characters.
Enter passphrase : xxxxxxxxxxxxxxxxxxxxxxxxxxx
Re-enter passphrase : xxxxxxxxxxxxxxxxxxxxxxxxxxx
kazu 0099 ur18122 fc5b023e684968ff Oct 02,1995 16:15:30
WINK SEAM GRAB ROAD HELL FEST
.RE
.fi
.SH BUGS
.PP
Things to do:
.TP
Support other one time passwords such as OTP.
.TP
Support other secure hash functions.
.SH AUTHOR
.PP
This program is developed by Kazuhiko Yamamoto <kazu@is.aist\-nara.ac.jp>.
This manual page was written by Fumitoshi UKAI <ukai@debian.or.jp>,
based on the documentation of this program, for the Debian GNU/Linux system
(but may be used by others).
|