- brad@cvs.openbsd.org 2004/07/12 23:34:25
[ssh-keyscan.1] Fix incorrect macro, .I -> .Em From: Eric S. Raymond <esr at thyrsus dot com> ok jmc@
This commit is contained in:
parent
fc9597034b
commit
3ca4508201
|
@ -10,6 +10,11 @@
|
||||||
session.c sftp-client.c sftp.c ssh-agent.1 ssh-keygen.c ssh.c ssh1.h
|
session.c sftp-client.c sftp.c ssh-agent.1 ssh-keygen.c ssh.c ssh1.h
|
||||||
sshd.c ttymodes.h]
|
sshd.c ttymodes.h]
|
||||||
spaces
|
spaces
|
||||||
|
- brad@cvs.openbsd.org 2004/07/12 23:34:25
|
||||||
|
[ssh-keyscan.1]
|
||||||
|
Fix incorrect macro, .I -> .Em
|
||||||
|
From: Eric S. Raymond <esr at thyrsus dot com>
|
||||||
|
ok jmc@
|
||||||
|
|
||||||
20040711
|
20040711
|
||||||
- (dtucker) [auth-pam.c] Check for zero from waitpid() too, which allows
|
- (dtucker) [auth-pam.c] Check for zero from waitpid() too, which allows
|
||||||
|
@ -1516,4 +1521,4 @@
|
||||||
- (djm) Trim deprecated options from INSTALL. Mention UsePAM
|
- (djm) Trim deprecated options from INSTALL. Mention UsePAM
|
||||||
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
|
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.3475 2004/07/17 06:12:08 dtucker Exp $
|
$Id: ChangeLog,v 1.3476 2004/07/17 06:13:15 dtucker Exp $
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
.\" $OpenBSD: ssh-keyscan.1,v 1.17 2003/06/10 09:12:11 jmc Exp $
|
.\" $OpenBSD: ssh-keyscan.1,v 1.18 2004/07/12 23:34:25 brad Exp $
|
||||||
.\"
|
.\"
|
||||||
.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
|
.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
|
||||||
.\"
|
.\"
|
||||||
|
@ -97,7 +97,7 @@ to use IPv6 addresses only.
|
||||||
If a ssh_known_hosts file is constructed using
|
If a ssh_known_hosts file is constructed using
|
||||||
.Nm
|
.Nm
|
||||||
without verifying the keys, users will be vulnerable to
|
without verifying the keys, users will be vulnerable to
|
||||||
.I man in the middle
|
.Em man in the middle
|
||||||
attacks.
|
attacks.
|
||||||
On the other hand, if the security model allows such a risk,
|
On the other hand, if the security model allows such a risk,
|
||||||
.Nm
|
.Nm
|
||||||
|
|
Loading…
Reference in New Issue