]> andersk Git - openssh.git/commit
- markus@cvs.openbsd.org 2002/07/24 16:11:18
authormouring <mouring>
Thu, 1 Aug 2002 01:21:56 +0000 (01:21 +0000)
committermouring <mouring>
Thu, 1 Aug 2002 01:21:56 +0000 (01:21 +0000)
commit8a48a7efc1218a4947a3f74ce5a721f392ee02d3
tree5015f36ee451293dca8b86bf101adec2792be062
parent13979d4722dd204ec4b4bb22483e54384d2e81f5
   - markus@cvs.openbsd.org 2002/07/24 16:11:18
     [hostfile.c hostfile.h sshconnect.c]
     print out all known keys for a host if we get a unknown host key,
     see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4

     the ssharp mitm tool attacks users in a similar way, so i'd like to
     pointed out again:
        A MITM attack is always possible if the ssh client prints:
        The authenticity of host 'bla' can't be established.
     (protocol version 2 with pubkey authentication allows you to detect
     MITM attacks)
ChangeLog
hostfile.c
hostfile.h
sshconnect.c
This page took 0.455057 seconds and 5 git commands to generate.