diff options
author | 2006-09-25 04:55:38 +0000 | |
---|---|---|
committer | 2006-09-25 04:55:38 +0000 | |
commit | 878c0067ff4b0ce0611e1acc3fe0f29dc2cfa123 (patch) | |
tree | f0498e4699bc0d2c1940a460d3781722d719c5a8 | |
parent | Also accept "HTTP/1.1 200" as a success response. (diff) | |
download | wireguard-openbsd-878c0067ff4b0ce0611e1acc3fe0f29dc2cfa123.tar.xz wireguard-openbsd-878c0067ff4b0ce0611e1acc3fe0f29dc2cfa123.zip |
Change "a SSH" to "an SSH". Hurray, I'm not the only one who
pronounces "SSH" as "ess-ess-aich".
OK jmc@ and stevesk@.
-rw-r--r-- | usr.bin/ssh/ssh-keyscan.1 | 4 | ||||
-rw-r--r-- | usr.bin/ssh/ssh.1 | 4 |
2 files changed, 4 insertions, 4 deletions
diff --git a/usr.bin/ssh/ssh-keyscan.1 b/usr.bin/ssh/ssh-keyscan.1 index 80fc8cd9603..a3656fc779f 100644 --- a/usr.bin/ssh/ssh-keyscan.1 +++ b/usr.bin/ssh/ssh-keyscan.1 @@ -1,4 +1,4 @@ -.\" $OpenBSD: ssh-keyscan.1,v 1.21 2005/09/30 20:34:26 jaredy Exp $ +.\" $OpenBSD: ssh-keyscan.1,v 1.22 2006/09/25 04:55:38 ray Exp $ .\" .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. .\" @@ -102,7 +102,7 @@ Causes to print debugging messages about its progress. .El .Sh SECURITY -If a ssh_known_hosts file is constructed using +If an ssh_known_hosts file is constructed using .Nm without verifying the keys, users will be vulnerable to .Em man in the middle diff --git a/usr.bin/ssh/ssh.1 b/usr.bin/ssh/ssh.1 index 6e41bcd8bae..b6f09f4007c 100644 --- a/usr.bin/ssh/ssh.1 +++ b/usr.bin/ssh/ssh.1 @@ -34,7 +34,7 @@ .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.\" $OpenBSD: ssh.1,v 1.263 2006/07/11 18:50:48 markus Exp $ +.\" $OpenBSD: ssh.1,v 1.264 2006/09/25 04:55:38 ray Exp $ .Dd September 25, 1999 .Dt SSH 1 .Os @@ -1105,7 +1105,7 @@ tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... jane tunnel="2",command="sh /etc/netstart tun2" ssh-rsa ... john .Ed .Pp -Since a SSH-based setup entails a fair amount of overhead, +Since an SSH-based setup entails a fair amount of overhead, it may be more suited to temporary setups, such as for wireless VPNs. More permanent VPNs are better provided by tools such as |