- ian@cvs.openbsd.org 2001/04/18 16:21:05

[ssh-keyscan.1]
     Fix typo reported in PR/1779
This commit is contained in:
Ben Lindstrom 2001-04-19 20:31:02 +00:00
parent bc70992058
commit f73e05eca8
2 changed files with 9 additions and 3 deletions

View File

@ -1,3 +1,9 @@
20010420
- OpenBSD CVS Sync
- ian@cvs.openbsd.org 2001/04/18 16:21:05
[ssh-keyscan.1]
Fix typo reported in PR/1779
20010418
- OpenBSD CVS Sync
- markus@cvs.openbsd.org 2001/04/17 19:34:25
@ -5159,4 +5165,4 @@
- Wrote replacements for strlcpy and mkdtemp
- Released 1.0pre1
$Id: ChangeLog,v 1.1139 2001/04/18 18:04:21 mouring Exp $
$Id: ChangeLog,v 1.1140 2001/04/19 20:31:02 mouring Exp $

View File

@ -1,4 +1,4 @@
.\" $OpenBSD: ssh-keyscan.1,v 1.4 2001/03/01 03:38:33 deraadt Exp $
.\" $OpenBSD: ssh-keyscan.1,v 1.5 2001/04/18 16:21:05 ian Exp $
.\"
.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
.\"
@ -33,7 +33,7 @@ uses non-blocking socket I/O to contact as many hosts as possible in
parallel, so it is very efficient. The keys from a domain of 1,000
hosts can be collected in tens of seconds, even when some of those
hosts are down or do not run ssh. You do not need login access to the
machines you are scanning, nor does does the scanning process involve
machines you are scanning, nor does the scanning process involve
any encryption.
.Sh SECURITY
If you make an ssh_known_hosts file using