summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/compress.h
diff options
context:
space:
mode:
authorMarkus Friedl <markus@cvs.openbsd.org>2002-07-24 16:11:19 +0000
committerMarkus Friedl <markus@cvs.openbsd.org>2002-07-24 16:11:19 +0000
commit79dff1f60d6b26f2a43b35194569ffeff968e916 (patch)
tree1cc8602d6a4030e1c01b8e5767ce2e95ddf93043 /usr.bin/ssh/compress.h
parent1ea57f96111c12077292df7bcb853800a61fd53b (diff)
print out all known keys for a host if we get a unknown host key,
see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4 the ssharp mitm tool attacks users in a similar way, so i'd like to pointed out again: A MITM attack is always possible if the ssh client prints: The authenticity of host 'bla' can't be established. (protocol version 2 with pubkey authentication allows you to detect MITM attacks)
Diffstat (limited to 'usr.bin/ssh/compress.h')
0 files changed, 0 insertions, 0 deletions