View | Details | Raw Unified | Return to bug 1843 | Differences between
and this patch

Collapse All | Expand All

(-)openssh.orig/sshconnect.c (-1 / +4 lines)
Lines 908-921 Link Here
908
			error("%s. This could either mean that", key_msg);
908
			error("%s. This could either mean that", key_msg);
909
			error("DNS SPOOFING is happening or the IP address for the host");
909
			error("DNS SPOOFING is happening or the IP address for the host");
910
			error("and its host key have changed at the same time.");
910
			error("and its host key have changed at the same time.");
911
			if (ip_status != HOST_NEW)
911
			if (ip_status != HOST_NEW) {
912
				error("Offending key for IP in %s:%d", ip_file, ip_line);
912
				error("Offending key for IP in %s:%d", ip_file, ip_line);
913
				error("  remove with: ssh-keygen -f \"%s\" -R %d", ip_file, ip_line);
914
			}
913
		}
915
		}
914
		/* The host key has changed. */
916
		/* The host key has changed. */
915
		warn_changed_key(host_key);
917
		warn_changed_key(host_key);
916
		error("Add correct host key in %.100s to get rid of this message.",
918
		error("Add correct host key in %.100s to get rid of this message.",
917
		    user_hostfile);
919
		    user_hostfile);
918
		error("Offending key in %s:%d", host_file, host_line);
920
		error("Offending key in %s:%d", host_file, host_line);
921
		error("  remove with: ssh-keygen -f \"%s\" -R %d", host_file, host_line);
919
922
920
		/*
923
		/*
921
		 * If strict host key checking is in use, the user will have
924
		 * If strict host key checking is in use, the user will have

Return to bug 1843