diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-04-19 20:31:02 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-04-19 20:31:02 +0000 |
commit | f73e05eca801c3a3488caa3b6bf1585ab7e2c13a (patch) | |
tree | b5f1450bd99eb0da15d42956dccf249691d25440 | |
parent | bc70992058852307479e08e98e286e9aa3566493 (diff) |
- ian@cvs.openbsd.org 2001/04/18 16:21:05
[ssh-keyscan.1]
Fix typo reported in PR/1779
-rw-r--r-- | ChangeLog | 8 | ||||
-rw-r--r-- | ssh-keyscan.1 | 4 |
2 files changed, 9 insertions, 3 deletions
@@ -1,3 +1,9 @@ | |||
1 | 20010420 | ||
2 | - OpenBSD CVS Sync | ||
3 | - ian@cvs.openbsd.org 2001/04/18 16:21:05 | ||
4 | [ssh-keyscan.1] | ||
5 | Fix typo reported in PR/1779 | ||
6 | |||
1 | 20010418 | 7 | 20010418 |
2 | - OpenBSD CVS Sync | 8 | - OpenBSD CVS Sync |
3 | - markus@cvs.openbsd.org 2001/04/17 19:34:25 | 9 | - markus@cvs.openbsd.org 2001/04/17 19:34:25 |
@@ -5159,4 +5165,4 @@ | |||
5159 | - Wrote replacements for strlcpy and mkdtemp | 5165 | - Wrote replacements for strlcpy and mkdtemp |
5160 | - Released 1.0pre1 | 5166 | - Released 1.0pre1 |
5161 | 5167 | ||
5162 | $Id: ChangeLog,v 1.1139 2001/04/18 18:04:21 mouring Exp $ | 5168 | $Id: ChangeLog,v 1.1140 2001/04/19 20:31:02 mouring Exp $ |
diff --git a/ssh-keyscan.1 b/ssh-keyscan.1 index eace55dd6..4db8c5f15 100644 --- a/ssh-keyscan.1 +++ b/ssh-keyscan.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ssh-keyscan.1,v 1.4 2001/03/01 03:38:33 deraadt Exp $ | 1 | .\" $OpenBSD: ssh-keyscan.1,v 1.5 2001/04/18 16:21:05 ian Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. | 3 | .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. |
4 | .\" | 4 | .\" |
@@ -33,7 +33,7 @@ uses non-blocking socket I/O to contact as many hosts as possible in | |||
33 | parallel, so it is very efficient. The keys from a domain of 1,000 | 33 | parallel, so it is very efficient. The keys from a domain of 1,000 |
34 | hosts can be collected in tens of seconds, even when some of those | 34 | hosts can be collected in tens of seconds, even when some of those |
35 | hosts are down or do not run ssh. You do not need login access to the | 35 | hosts are down or do not run ssh. You do not need login access to the |
36 | machines you are scanning, nor does does the scanning process involve | 36 | machines you are scanning, nor does the scanning process involve |
37 | any encryption. | 37 | any encryption. |
38 | .Sh SECURITY | 38 | .Sh SECURITY |
39 | If you make an ssh_known_hosts file using | 39 | If you make an ssh_known_hosts file using |