Hi,

   +-From: Paul Ebermann <paul-eberm...@gmx.de> --
   |_Date: Tue, 10 May 2011 17:17:54 +0200 _______
   |
   |Yes, I understand that one normally don't want this. I think 
   |I described a usecase where this might be useful (not with the real host 
key),
   |though.

I could not understand the advantage of host-based auth over publickey auth in 
that
use-case.  What is the impossible thing with publickey auth, but possible with
host-based auth.


Sincerely,
--
Atsuhiko Yamanaka
JCraft,Inc.
1-14-20 HONCHO AOBA-KU,
SENDAI, MIYAGI 980-0014 Japan.
Tel +81-22-723-2150
    +1-415-578-3454
Skype callto://jcraft/

------------------------------------------------------------------------------
Achieve unprecedented app performance and reliability
What every C/C++ and Fortran developer should know.
Learn how Intel has extended the reach of its next-generation tools
to help boost performance applications - inlcuding clusters.
http://p.sf.net/sfu/intel-dev2devmay
_______________________________________________
JSch-users mailing list
JSch-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/jsch-users

Reply via email to