summaryrefslogtreecommitdiff
path: root/ssh-keyscan.1
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2005-01-04 13:07:27 +0000
committerColin Watson <cjwatson@debian.org>2005-01-04 13:07:27 +0000
commitfd0f611b70a83d80fe8793af785542ee5541b7cd (patch)
treebededd22bb7eeec52e20083237ab7e4113445a16 /ssh-keyscan.1
parentc44fe9a5b9d3db96a7249b04d915f17e4a3a3b04 (diff)
parentebd2ce335af5861020c79fddb1ae35c03bf036cf (diff)
Merge 3.9p1 to the trunk.
Diffstat (limited to 'ssh-keyscan.1')
-rw-r--r--ssh-keyscan.14
1 files changed, 2 insertions, 2 deletions
diff --git a/ssh-keyscan.1 b/ssh-keyscan.1
index 572751f66..9efcf5213 100644
--- a/ssh-keyscan.1
+++ b/ssh-keyscan.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keyscan.1,v 1.17 2003/06/10 09:12:11 jmc Exp $ 1.\" $OpenBSD: ssh-keyscan.1,v 1.18 2004/07/12 23:34:25 brad Exp $
2.\" 2.\"
3.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. 3.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
4.\" 4.\"
@@ -97,7 +97,7 @@ to use IPv6 addresses only.
97If a ssh_known_hosts file is constructed using 97If a ssh_known_hosts file is constructed using
98.Nm 98.Nm
99without verifying the keys, users will be vulnerable to 99without verifying the keys, users will be vulnerable to
100.I man in the middle 100.Em man in the middle
101attacks. 101attacks.
102On the other hand, if the security model allows such a risk, 102On the other hand, if the security model allows such a risk,
103.Nm 103.Nm