1 $DragonFly: src/secure/usr.bin/ssh/Attic/ssh.1.no_obj.patch,v 1.1 2004/07/31 20:05:00 geekgod Exp $
2 --- ssh.1.orig 2004-03-08 13:12:36.000000000 +0100
3 +++ ssh.1 2004-07-23 13:16:14.000000000 +0200
5 First, if the machine the user logs in from is listed in
9 +.Pa /etc/ssh/shosts.equiv
10 on the remote machine, and the user names are
11 the same on both sides, the user is immediately permitted to log in.
15 .Pa /etc/hosts.equiv ,
17 -.Pa /etc/shosts.equiv ,
18 +.Pa /etc/ssh/shosts.equiv ,
19 and if additionally the server can verify the client's
21 .Pa /etc/ssh/ssh_known_hosts
24 Forwarding of X11 connections can be
25 configured on the command line or in configuration files.
26 +Take note that X11 forwarding can represent a security hazard.
31 Additionally, successful RSA host authentication is normally
33 This file should only be writable by root.
34 -.It Pa /etc/shosts.equiv
35 +.It Pa /etc/ssh/shosts.equiv
36 This file is processed exactly as
37 .Pa /etc/hosts.equiv .
38 This file may be useful to permit logins using