diff options
Diffstat (limited to 'ssh-keyscan.1')
-rw-r--r-- | ssh-keyscan.1 | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/ssh-keyscan.1 b/ssh-keyscan.1 index eace55dd6..4db8c5f15 100644 --- a/ssh-keyscan.1 +++ b/ssh-keyscan.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ssh-keyscan.1,v 1.4 2001/03/01 03:38:33 deraadt Exp $ | 1 | .\" $OpenBSD: ssh-keyscan.1,v 1.5 2001/04/18 16:21:05 ian Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. | 3 | .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. |
4 | .\" | 4 | .\" |
@@ -33,7 +33,7 @@ uses non-blocking socket I/O to contact as many hosts as possible in | |||
33 | parallel, so it is very efficient. The keys from a domain of 1,000 | 33 | parallel, so it is very efficient. The keys from a domain of 1,000 |
34 | hosts can be collected in tens of seconds, even when some of those | 34 | hosts can be collected in tens of seconds, even when some of those |
35 | hosts are down or do not run ssh. You do not need login access to the | 35 | hosts are down or do not run ssh. You do not need login access to the |
36 | machines you are scanning, nor does does the scanning process involve | 36 | machines you are scanning, nor does the scanning process involve |
37 | any encryption. | 37 | any encryption. |
38 | .Sh SECURITY | 38 | .Sh SECURITY |
39 | If you make an ssh_known_hosts file using | 39 | If you make an ssh_known_hosts file using |