In article <[email protected]>,
Harlan Stenn  <[email protected]> wrote:
>I'm trying to figure out if anybody is actively using autokey, in a
>production deployment.
>
>If you are, please let me know - I have some questions for you.

For what it's worth, I tried, but Dave's documentation wasn't enough
for me to understand how it was supposed to work, or indeed to make it
work without understanding it, and eventually I gave up.  I don't
think I ever quite figured out the scenario that the various types of
authentication were intended to work on, and the whole goofy
let's-use-the-X.509-data-structures-even-though-we're-not-really-doing-PKI
business left a sour taste.

-GAWollman
-- 
Garrett A. Wollman    | What intellectual phenomenon can be older, or more oft
[email protected]| repeated, than the story of a large research program
Opinions not shared by| that impaled itself upon a false central assumption
my employers.         | accepted by all practitioners? - S.J. Gould, 1993

_______________________________________________
questions mailing list
[email protected]
http://lists.ntp.org/listinfo/questions

Reply via email to