Hacking in ssh support

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




So I've now talked to a bunch of people outside of the project, and this is a *very* common comment:

"It's really cool. Can you use ssh instead of ssl, since I've already configured all my systems to use ssh?"

I wonder if it's time to consider adding ssh-based key management to the ssl-based key management.

The downside is that people are likely to already have set up their own funky systems for managing ssh keys, whereas *no one* has a decent system for managing ssl keys. But we may see broader adoption if ssh and ssl run side by side.

--g

--
Greg DeKoenigsberg
Community Development Manager
Red Hat, Inc. :: 1-919-754-4255
"To whomsoever much hath been given...
...from him much shall be asked"

_______________________________________________
Func-list mailing list
Func-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/func-list

[Index of Archives]     [Fedora Users]     [Linux Networking]     [Fedora Legacy List]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]

  Powered by Linux