revocations, or even basic key-to-identity binding (e.g. "host
foo.example.org has key X"). As a result, dealing with host keys is
usually a manual process with the possibility of tedium, room for
revocations, or even basic key-to-identity binding (e.g. "host
foo.example.org has key X"). As a result, dealing with host keys is
usually a manual process with the possibility of tedium, room for