summaryrefslogtreecommitdiff
path: root/usr.bin
diff options
context:
space:
mode:
authorMike Pechkin <mpech@cvs.openbsd.org>2001-08-02 18:37:36 +0000
committerMike Pechkin <mpech@cvs.openbsd.org>2001-08-02 18:37:36 +0000
commitc73b0896d68640e2e4ddd292c98b791990d24961 (patch)
tree5ec55844407e19de326f6f6ddf2257bd9c1b42f1 /usr.bin
parent386e4aadd55a8ab2988d9b385b4ffcbf073c52ec (diff)
o) .Sh AUTHOR -> .Sh AUTHORS;
o) .Sh EXAMPLE -> .Sh EXAMPLES; o) Delete .Sh OPTIONS. Text moved to .Sh DESCRIPTION; millert@ ok
Diffstat (limited to 'usr.bin')
-rw-r--r--usr.bin/newsyslog/newsyslog.84
-rw-r--r--usr.bin/sectok/sectok.16
-rw-r--r--usr.bin/ssh/ssh-keyscan.125
3 files changed, 18 insertions, 17 deletions
diff --git a/usr.bin/newsyslog/newsyslog.8 b/usr.bin/newsyslog/newsyslog.8
index a3a0506db25..2443310701d 100644
--- a/usr.bin/newsyslog/newsyslog.8
+++ b/usr.bin/newsyslog/newsyslog.8
@@ -1,4 +1,4 @@
-.\" $OpenBSD: newsyslog.8,v 1.20 2001/03/01 20:34:10 aaron Exp $
+.\" $OpenBSD: newsyslog.8,v 1.21 2001/08/02 18:37:35 mpech Exp $
.\"
.\" Copyright (c) 1997, Jason Downs. All rights reserved.
.\"
@@ -236,7 +236,7 @@ default configuration file
.Xr gzip 1 ,
.Xr syslog 3 ,
.Xr syslogd 8
-.Sh AUTHOR
+.Sh AUTHORS
.Bd -unfilled
Theodore Ts'o, MIT Project Athena
Copyright 1987, Massachusetts Institute of Technology
diff --git a/usr.bin/sectok/sectok.1 b/usr.bin/sectok/sectok.1
index 8a169898020..8466f1baa72 100644
--- a/usr.bin/sectok/sectok.1
+++ b/usr.bin/sectok/sectok.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: sectok.1,v 1.5 2001/07/27 07:33:31 jakob Exp $
+.\" $OpenBSD: sectok.1,v 1.6 2001/08/02 18:37:35 mpech Exp $
.\"
.\" Copyright (C) 2001, Jakob Schlyter. All rights reserved.
.\"
@@ -46,7 +46,8 @@ is a command-line-like interface for communicating with smartcards.
APDUs can be sent to the card, and results are displayed. Some
commands are card-specific, and focus on the Schlumberger Cyberflex
Access Javacards.
-.Sh OPTIONS
+.Pp
+The options are as follows:
.Bl -tag -width Ds
.It Fl 0123
Select port.
@@ -57,7 +58,6 @@ Run commands from scriptfile.
.It Fl s Ar sleeptime
Set sleep (in milliseconds) between commands in the script.
.El
-.\"
.Sh COMMANDS
.Ss Non-card commands
.Pp
diff --git a/usr.bin/ssh/ssh-keyscan.1 b/usr.bin/ssh/ssh-keyscan.1
index 328d95ab1eb..80119aa217b 100644
--- a/usr.bin/ssh/ssh-keyscan.1
+++ b/usr.bin/ssh/ssh-keyscan.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: ssh-keyscan.1,v 1.8 2001/06/23 17:48:18 itojun Exp $
+.\" $OpenBSD: ssh-keyscan.1,v 1.9 2001/08/02 18:37:35 mpech Exp $
.\"
.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
.\"
@@ -34,17 +34,8 @@ hosts can be collected in tens of seconds, even when some of those
hosts are down or do not run ssh. You do not need login access to the
machines you are scanning, nor does the scanning process involve
any encryption.
-.Sh SECURITY
-If you make an ssh_known_hosts file using
-.Nm
-without verifying the keys, you will be vulnerable to
-.I man in the middle
-attacks.
-On the other hand, if your security model allows such a risk,
-.Nm
-can help you detect tampered keyfiles or man in the middle attacks which
-have begun after you created your ssh_known_hosts file.
-.Sh OPTIONS
+.Pp
+The options are as follows:
.Bl -tag -width Ds
.It Fl t
Set the timeout for connection attempts. If
@@ -65,6 +56,16 @@ will read hosts or
.Pa addrlist namelist
pairs from the standard input.
.El
+.Sh SECURITY
+If you make an ssh_known_hosts file using
+.Nm
+without verifying the keys, you will be vulnerable to
+.I man in the middle
+attacks.
+On the other hand, if your security model allows such a risk,
+.Nm
+can help you detect tampered keyfiles or man in the middle attacks which
+have begun after you created your ssh_known_hosts file.
.Sh EXAMPLES
Print the host key for machine
.Pa hostname :