Cameron Simpson wrote:
>
> On Thu, May 04, 2000 at 10:18:34AM -0700, Sam Bayne wrote:
> | All this bash help aside, (And I missed the beginning of the thread, so
> | maybe this was discussed), but is there a reason you don't just use
> | .shosts authentication? It will prevent host spoofing and sniffing just
> | fine. Then all you need to distribute a .hosts file (The same one) to
> | all you client hosts.
> |
> | If you really want to do rsa auth, there also might be a solution using
> | the ssh-agent system.
>
> Sure. I use ssh-agent for most of my stuff (we don't us .shosts much -
> it turns out to interact badly with tcp-wrappers due to some obscure
> bug and our ssh build uses tcp-wrappers at work).
>
> | There's a good chance I'm totally missing the thrust of your original
> | questions though.
>
> Only that you should contact Mike Lewis, not me. It was his question...
Oops. How is it that your message escaped getting the reply-to: field
set
to the list, like all the other messages I have subsequently checked?
> --
> Cameron Simpson, DoD#743 [EMAIL PROTECTED] http://www.zip.com.au/~cs/
>
> Engineer Dave Haynie, of Commodore and BeBox fame, talking about PC clones
> and their operating systems: "Would you let a monkey drive a porsche?"
--
-------------------------------------
Sam Bayne - System Administrator
North Seattle Community College
[EMAIL PROTECTED] (206)527-3762
=====================================
--
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.