summaryrefslogtreecommitdiff
path: root/ssh-keyscan.1
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-08-06 22:01:29 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-08-06 22:01:29 +0000
commit0b5afb98eba742712a30509778e3a1e73c16cea3 (patch)
tree032359bff326570085dba2b5c60129fd2a6450ac /ssh-keyscan.1
parentbcc1808bf26c36a393e0caf852d921cec59802c4 (diff)
- mpech@cvs.openbsd.org 2001/08/02 18:37:35
[ssh-keyscan.1] o) .Sh AUTHOR -> .Sh AUTHORS; o) .Sh EXAMPLE -> .Sh EXAMPLES; o) Delete .Sh OPTIONS. Text moved to .Sh DESCRIPTION; millert@ ok
Diffstat (limited to 'ssh-keyscan.1')
-rw-r--r--ssh-keyscan.125
1 files changed, 13 insertions, 12 deletions
diff --git a/ssh-keyscan.1 b/ssh-keyscan.1
index 328d95ab1..80119aa21 100644
--- a/ssh-keyscan.1
+++ b/ssh-keyscan.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keyscan.1,v 1.8 2001/06/23 17:48:18 itojun Exp $ 1.\" $OpenBSD: ssh-keyscan.1,v 1.9 2001/08/02 18:37:35 mpech Exp $
2.\" 2.\"
3.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. 3.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
4.\" 4.\"
@@ -34,17 +34,8 @@ hosts can be collected in tens of seconds, even when some of those
34hosts are down or do not run ssh. You do not need login access to the 34hosts are down or do not run ssh. You do not need login access to the
35machines you are scanning, nor does the scanning process involve 35machines you are scanning, nor does the scanning process involve
36any encryption. 36any encryption.
37.Sh SECURITY 37.Pp
38If you make an ssh_known_hosts file using 38The options are as follows:
39.Nm
40without verifying the keys, you will be vulnerable to
41.I man in the middle
42attacks.
43On the other hand, if your security model allows such a risk,
44.Nm
45can help you detect tampered keyfiles or man in the middle attacks which
46have begun after you created your ssh_known_hosts file.
47.Sh OPTIONS
48.Bl -tag -width Ds 39.Bl -tag -width Ds
49.It Fl t 40.It Fl t
50Set the timeout for connection attempts. If 41Set the timeout for connection attempts. If
@@ -65,6 +56,16 @@ will read hosts or
65.Pa addrlist namelist 56.Pa addrlist namelist
66pairs from the standard input. 57pairs from the standard input.
67.El 58.El
59.Sh SECURITY
60If you make an ssh_known_hosts file using
61.Nm
62without verifying the keys, you will be vulnerable to
63.I man in the middle
64attacks.
65On the other hand, if your security model allows such a risk,
66.Nm
67can help you detect tampered keyfiles or man in the middle attacks which
68have begun after you created your ssh_known_hosts file.
68.Sh EXAMPLES 69.Sh EXAMPLES
69Print the host key for machine 70Print the host key for machine
70.Pa hostname : 71.Pa hostname :