[BACK]Return to ssh-keyscan.1 CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/ssh-keyscan.1 between version 1.17 and 1.17.4.1

version 1.17, 2003/06/10 09:12:11 version 1.17.4.1, 2004/08/19 04:13:27
Line 97 
Line 97 
 If a ssh_known_hosts file is constructed using  If a ssh_known_hosts file is constructed using
 .Nm  .Nm
 without verifying the keys, users will be vulnerable to  without verifying the keys, users will be vulnerable to
 .I man in the middle  .Em man in the middle
 attacks.  attacks.
 On the other hand, if the security model allows such a risk,  On the other hand, if the security model allows such a risk,
 .Nm  .Nm

Legend:
Removed from v.1.17  
changed lines
  Added in v.1.17.4.1