version 1.4, 2001/03/01 03:38:33 |
version 1.5, 2001/04/18 16:21:05 |
|
|
parallel, so it is very efficient. The keys from a domain of 1,000 |
parallel, so it is very efficient. The keys from a domain of 1,000 |
hosts can be collected in tens of seconds, even when some of those |
hosts can be collected in tens of seconds, even when some of those |
hosts are down or do not run ssh. You do not need login access to the |
hosts are down or do not run ssh. You do not need login access to the |
machines you are scanning, nor does does the scanning process involve |
machines you are scanning, nor does the scanning process involve |
any encryption. |
any encryption. |
.Sh SECURITY |
.Sh SECURITY |
If you make an ssh_known_hosts file using |
If you make an ssh_known_hosts file using |