Deleted Added
full compact
ssh-keyscan.0 (225825) ssh-keyscan.0 (239849)
1SSH-KEYSCAN(1) OpenBSD Reference Manual SSH-KEYSCAN(1)
2
3NAME
4 ssh-keyscan - gather ssh public keys
5
6SYNOPSIS
7 ssh-keyscan [-46Hv] [-f file] [-p port] [-T timeout] [-t type]
8 [host | addrlist namelist] ...

--- 36 unchanged lines hidden (view full) ---

45 is closed and the host in question considered unavailable.
46 Default is 5 seconds.
47
48 -t type
49 Specifies the type of the key to fetch from the scanned hosts.
50 The possible values are ``rsa1'' for protocol version 1 and
51 ``dsa'', ``ecdsa'' or ``rsa'' for protocol version 2. Multiple
52 values may be specified by separating them with commas. The
1SSH-KEYSCAN(1) OpenBSD Reference Manual SSH-KEYSCAN(1)
2
3NAME
4 ssh-keyscan - gather ssh public keys
5
6SYNOPSIS
7 ssh-keyscan [-46Hv] [-f file] [-p port] [-T timeout] [-t type]
8 [host | addrlist namelist] ...

--- 36 unchanged lines hidden (view full) ---

45 is closed and the host in question considered unavailable.
46 Default is 5 seconds.
47
48 -t type
49 Specifies the type of the key to fetch from the scanned hosts.
50 The possible values are ``rsa1'' for protocol version 1 and
51 ``dsa'', ``ecdsa'' or ``rsa'' for protocol version 2. Multiple
52 values may be specified by separating them with commas. The
53 default is ``rsa''.
53 default is to fetch ``rsa'' and ``ecdsa'' keys.
54
55 -v Verbose mode. Causes ssh-keyscan to print debugging messages
56 about its progress.
57
58SECURITY
59 If an ssh_known_hosts file is constructed using ssh-keyscan without
60 verifying the keys, users will be vulnerable to man in the middle
61 attacks. On the other hand, if the security model allows such a risk,

--- 39 unchanged lines hidden (view full) ---

101 2.
102
103BUGS
104 It generates "Connection closed by remote host" messages on the consoles
105 of all the machines it scans if the server is older than version 2.9.
106 This is because it opens a connection to the ssh port, reads the public
107 key, and drops the connection as soon as it gets the key.
108
54
55 -v Verbose mode. Causes ssh-keyscan to print debugging messages
56 about its progress.
57
58SECURITY
59 If an ssh_known_hosts file is constructed using ssh-keyscan without
60 verifying the keys, users will be vulnerable to man in the middle
61 attacks. On the other hand, if the security model allows such a risk,

--- 39 unchanged lines hidden (view full) ---

101 2.
102
103BUGS
104 It generates "Connection closed by remote host" messages on the consoles
105 of all the machines it scans if the server is older than version 2.9.
106 This is because it opens a connection to the ssh port, reads the public
107 key, and drops the connection as soon as it gets the key.
108
109OpenBSD 5.0 August 31, 2010 OpenBSD 5.0
109OpenBSD 5.2 April 11, 2012 OpenBSD 5.2