From f73e05eca801c3a3488caa3b6bf1585ab7e2c13a Mon Sep 17 00:00:00 2001 From: Ben Lindstrom Date: Thu, 19 Apr 2001 20:31:02 +0000 Subject: [PATCH] - ian@cvs.openbsd.org 2001/04/18 16:21:05 [ssh-keyscan.1] Fix typo reported in PR/1779 --- ChangeLog | 8 +++++++- ssh-keyscan.1 | 4 ++-- 2 files changed, 9 insertions(+), 3 deletions(-) diff --git a/ChangeLog b/ChangeLog index 05b67f373..f95234db9 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,9 @@ +20010420 + - OpenBSD CVS Sync + - ian@cvs.openbsd.org 2001/04/18 16:21:05 + [ssh-keyscan.1] + Fix typo reported in PR/1779 + 20010418 - OpenBSD CVS Sync - markus@cvs.openbsd.org 2001/04/17 19:34:25 @@ -5159,4 +5165,4 @@ - Wrote replacements for strlcpy and mkdtemp - Released 1.0pre1 -$Id: ChangeLog,v 1.1139 2001/04/18 18:04:21 mouring Exp $ +$Id: ChangeLog,v 1.1140 2001/04/19 20:31:02 mouring Exp $ diff --git a/ssh-keyscan.1 b/ssh-keyscan.1 index eace55dd6..4db8c5f15 100644 --- a/ssh-keyscan.1 +++ b/ssh-keyscan.1 @@ -1,4 +1,4 @@ -.\" $OpenBSD: ssh-keyscan.1,v 1.4 2001/03/01 03:38:33 deraadt Exp $ +.\" $OpenBSD: ssh-keyscan.1,v 1.5 2001/04/18 16:21:05 ian Exp $ .\" .\" Copyright 1995, 1996 by David Mazieres . .\" @@ -33,7 +33,7 @@ uses non-blocking socket I/O to contact as many hosts as possible in parallel, so it is very efficient. The keys from a domain of 1,000 hosts can be collected in tens of seconds, even when some of those hosts are down or do not run ssh. You do not need login access to the -machines you are scanning, nor does does the scanning process involve +machines you are scanning, nor does the scanning process involve any encryption. .Sh SECURITY If you make an ssh_known_hosts file using