=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/ssh.1,v retrieving revision 1.419 retrieving revision 1.420 diff -u -r1.419 -r1.420 --- src/usr.bin/ssh/ssh.1 2021/02/15 20:43:15 1.419 +++ src/usr.bin/ssh/ssh.1 2021/06/25 06:20:39 1.420 @@ -33,8 +33,8 @@ .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.\" $OpenBSD: ssh.1,v 1.419 2021/02/15 20:43:15 markus Exp $ -.Dd $Mdocdate: February 15 2021 $ +.\" $OpenBSD: ssh.1,v 1.420 2021/06/25 06:20:39 dtucker Exp $ +.Dd $Mdocdate: June 25 2021 $ .Dt SSH 1 .Os .Sh NAME @@ -88,7 +88,7 @@ .No ssh:// Oo user @ Oc hostname Op : port . .Sm on The user must prove -his/her identity to the remote machine using one of several methods +their identity to the remote machine using one of several methods (see below). .Pp If a @@ -908,7 +908,7 @@ .Fl v flag). .Pp -The user creates his/her key pair by running +The user creates their key pair by running .Xr ssh-keygen 1 . This stores the private key in .Pa ~/.ssh/id_dsa @@ -942,7 +942,7 @@ The user should then copy the public key to .Pa ~/.ssh/authorized_keys -in his/her home directory on the remote machine. +in their home directory on the remote machine. The .Pa authorized_keys file corresponds to the conventional