diff options
Diffstat (limited to 'ChangeLog')
-rw-r--r-- | ChangeLog | 16 |
1 files changed, 15 insertions, 1 deletions
@@ -1,3 +1,17 @@ | |||
1 | 20020731 | ||
2 | - (bal) OpenBSD CVS Sync | ||
3 | - markus@cvs.openbsd.org 2002/07/24 16:11:18 | ||
4 | [hostfile.c hostfile.h sshconnect.c] | ||
5 | print out all known keys for a host if we get a unknown host key, | ||
6 | see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4 | ||
7 | |||
8 | the ssharp mitm tool attacks users in a similar way, so i'd like to | ||
9 | pointed out again: | ||
10 | A MITM attack is always possible if the ssh client prints: | ||
11 | The authenticity of host 'bla' can't be established. | ||
12 | (protocol version 2 with pubkey authentication allows you to detect | ||
13 | MITM attacks) | ||
14 | |||
1 | 20020730 | 15 | 20020730 |
2 | - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de | 16 | - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de |
3 | 17 | ||
@@ -1465,4 +1479,4 @@ | |||
1465 | - (stevesk) entropy.c: typo in debug message | 1479 | - (stevesk) entropy.c: typo in debug message |
1466 | - (djm) ssh-keygen -i needs seeded RNG; report from markus@ | 1480 | - (djm) ssh-keygen -i needs seeded RNG; report from markus@ |
1467 | 1481 | ||
1468 | $Id: ChangeLog,v 1.2409 2002/07/30 19:32:07 mouring Exp $ | 1482 | $Id: ChangeLog,v 1.2410 2002/08/01 01:21:56 mouring Exp $ |