Provided by: otpw-bin_1.5-2_amd64 bug

NAME

       otpw-gen - one-time password generator

SYNOPSIS

       otpw-gen [ options ]

DESCRIPTION

       OTPW  is  a one-time password authentication system. It can be plugged into any application that needs to
       authenticate users interactively.  One-time password authentication  is  a  valuable  protection  against
       password eavesdropping, especially for logins from untrusted terminals.

       Before  you  can  use  OTPW  to  log into your system, two preparation steps are necessary. Firstly, your
       system administrator has to enable it. (This is usually done by configuring your  login  software  (e.g.,
       sshd) to use OTPW via the Pluggable Authentication Module (PAM) configuration files in /etc/pam.d/.)

       Secondly, you need to generate a list of one-time passwords and print it out. This can be done by calling

              otpw-gen | lpr

       or something like

              otpw-gen -h 70 -s 2 | a2ps -1B -L 70 --borders no

       if more control over the layout is desired.

       You  will  be  asked  for a prefix password, which you need to memorize. It has to be entered immediately
       before the one-time password. The prefix password reduces the risk that anyone who finds or  steals  your
       password printout can use that alone to impersonate you.

       Each one-time password will be printed behind a three digit password number. Such a number will appear in
       the password prompt when OTPW has been activated:

              Password 026:

       When you see this prompt, enter the memorized prefix  password,  followed  immediately  by  the  one-time
       password  identified  by  the  number.  Any  spaces  within a password have only been inserted to improve
       legibility and do not have to be copied.  OTPW will ignore the difference  between  the  easily  confused
       characters 0O and Il1 in passwords.

       In  some  situations, for example if multiple logins occur simultaneously for the same user, OTPW defends
       itself against the possibility of various attacks by asking for three random passwords simultaneously.

              Password 047/192/210:

       You then have to enter the  prefix  password,  followed  immediately  by  the  three  requested  one-time
       passwords.  This  fall-back  mode is activated by the existence of the lock file ~/.otpw.lock.  If it was
       left over by some malfunction, it can safely be deleted manually using option -l.

       Call otpw-gen again when you have used up about half of the printed one-time passwords or when  you  have
       lost your password sheet. This will disable all remaining passwords on the previous sheet.

OPTIONS

       -h number     Specify the total number of lines per page to be sent to standard output. This number minus
                     four header lines determines the number of rows of passwords  on  each  page.  The  maximum
                     number of passwords that can be printed is 1000. (Minimum: 5, default: 60)

       -w number     Specify the maximum width of lines to be sent to standard output. This parameter determines
                     together with the password length the number of columns in  the  printed  password  matrix.
                     (Minimum: 64, default: 79)

       -s number     Specify the number of form-feed separated pages to be sent to standard output. (Default: 1)

       -e number     Specify  the minimum entropy of each one-time password in bits. The length of each password
                     will be chosen automatically, such that there  are  at  least  two  to  the  power  of  the
                     specified  number  possible passwords. A value below 30 might make the passwords vulnerable
                     to a brute-force guessing attack. If the attacker might have read  access  to  the  ~/.otpw
                     file,  the  value  should  be  at  least 48. Paranoid users might prefer long high-security
                     passwords with at least 60 bits of entropy.  (Default: 48)

       -p0           Generate passwords by transforming a random bit string  into  a  sequence  of  letters  and
                     digits, using a form of base-64 encoding (6 bits per character). (Default)

       -p1           Generate  passwords  by  transforming  a random bit string into a sequence of English four-
                     letter words, each chosen from a fixed list of 2048 words (2.75 bits per character).

       -p2           Generate passwords by transforming a random bit string into a sequence of lowercase letters
                     and  digits  (5  bits per character). These are easier to communicate by voice (e.g., using
                     the NATO alphabet).

       -f filename   Specify a file to be used instead of ~/.otpw for storing the hash values of  the  generated
                     one-time passwords.

       -n            Suppress  the  addition  of a header and footer line to each output page.  This reduces the
                     minimum value for option -h to 1.

       -m            Instead of generating each password randomly, generate a random master key and then  derive
                     each password from that in a deterministic way.  The master key will be printed to standard
                     error. It can later be used with option -k to recreate another copy of  the  same  one-time
                     password  list.  (Each  password  is  generated  from  the output of a secure hash function
                     applied to the master key and the challenge string.)

       -E number     Specify the minimum entropy of the master key in bits. (It contains in addition  four  bits
                     redundancy for error checking.)

       -P number     Choose the text format in which the master key will be displayed.  The supported values are
                     the same as with option -p.

       -k            Ask for a master key, as it was generated by option -m, and then recreate the same password
                     list  from  that. With this option, only a password list will be generated; the hash values
                     in ~/.otpw remain unmodified.

       -r            Output a suggestion for a random password, then exit. The length and type of  password  can
                     be selected with options -e and -p.

       -l            Remove any lock file left by previous authentication attempts, then exit.

PSEUDO-USER INSTALLATION

       If the otpw-gen binary, owned by some system pseudo user (e.g., “otpw”), has the SETUID bit set, then the
       password hash file will be owned by and  stored  in  the  home  directory  of  that  pseudo  user  (e.g.,
       “/var/lib/otpw”),  using  the  user's  name instead of “.otpw”. This way, the hash files are out of reach
       from the users, and cannot be manipulated by tools  other  than  otpw-gen,  which  can  help  to  enforce
       policies  about  how  passwords  are  generated.  Storing the password hash files outside the user's home
       directory can also be useful where the home directory may not yet be accessible during login.

AUTHOR

       The OTPW package, which includes the otpw-gen program, has been developed by Markus Kuhn. The most recent
       version is available from <http://www.cl.cam.ac.uk/~mgk25/otpw.html>.

SEE ALSO

       pam(8), pam_otpw(8)

                                                   2014-08-07                                        OTPW-GEN(1)