Return to ssh-keyscan.1 CVS log | Up to [local] / src / usr.bin / ssh |
version 1.17, 2003/06/10 09:12:11 | version 1.17.2.1, 2004/08/19 22:37:32 | ||
---|---|---|---|
|
|
||
If a ssh_known_hosts file is constructed using | If a ssh_known_hosts file is constructed using | ||
.Nm | .Nm | ||
without verifying the keys, users will be vulnerable to | without verifying the keys, users will be vulnerable to | ||
.I man in the middle | .Em man in the middle | ||
attacks. | attacks. | ||
On the other hand, if the security model allows such a risk, | On the other hand, if the security model allows such a risk, | ||
.Nm | .Nm |