Hi,
+-From: Paul Ebermann <[email protected]> --
|_Date: Tue, 10 May 2011 17:17:54 +0200 _______
|
|Yes, I understand that one normally don't want this. I think
|I described a usecase where this might be useful (not with the real host
key),
|though.
I could not understand the advantage of host-based auth over publickey auth in
that
use-case. What is the impossible thing with publickey auth, but possible with
host-based auth.
Sincerely,
--
Atsuhiko Yamanaka
JCraft,Inc.
1-14-20 HONCHO AOBA-KU,
SENDAI, MIYAGI 980-0014 Japan.
Tel +81-22-723-2150
+1-415-578-3454
Skype callto://jcraft/
------------------------------------------------------------------------------
Achieve unprecedented app performance and reliability
What every C/C++ and Fortran developer should know.
Learn how Intel has extended the reach of its next-generation tools
to help boost performance applications - inlcuding clusters.
http://p.sf.net/sfu/intel-dev2devmay
_______________________________________________
JSch-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/jsch-users