From: dtucker Date: Sat, 17 Jul 2004 06:13:15 +0000 (+0000) Subject: - brad@cvs.openbsd.org 2004/07/12 23:34:25 X-Git-Tag: V_3_9_P1~42 X-Git-Url: http://andersk.mit.edu/gitweb/openssh.git/commitdiff_plain/95a071252433b494ac173575edfbab823311c557 - brad@cvs.openbsd.org 2004/07/12 23:34:25 [ssh-keyscan.1] Fix incorrect macro, .I -> .Em From: Eric S. Raymond ok jmc@ --- diff --git a/ChangeLog b/ChangeLog index ffcc9cca..31193d56 100644 --- a/ChangeLog +++ b/ChangeLog @@ -10,6 +10,11 @@ session.c sftp-client.c sftp.c ssh-agent.1 ssh-keygen.c ssh.c ssh1.h sshd.c ttymodes.h] spaces + - brad@cvs.openbsd.org 2004/07/12 23:34:25 + [ssh-keyscan.1] + Fix incorrect macro, .I -> .Em + From: Eric S. Raymond + ok jmc@ 20040711 - (dtucker) [auth-pam.c] Check for zero from waitpid() too, which allows diff --git a/ssh-keyscan.1 b/ssh-keyscan.1 index 572751f6..9efcf521 100644 --- a/ssh-keyscan.1 +++ b/ssh-keyscan.1 @@ -1,4 +1,4 @@ -.\" $OpenBSD: ssh-keyscan.1,v 1.17 2003/06/10 09:12:11 jmc Exp $ +.\" $OpenBSD: ssh-keyscan.1,v 1.18 2004/07/12 23:34:25 brad Exp $ .\" .\" Copyright 1995, 1996 by David Mazieres . .\" @@ -97,7 +97,7 @@ to use IPv6 addresses only. If a ssh_known_hosts file is constructed using .Nm without verifying the keys, users will be vulnerable to -.I man in the middle +.Em man in the middle attacks. On the other hand, if the security model allows such a risk, .Nm