In article <[email protected]>, Harlan Stenn <[email protected]> wrote: >I'm trying to figure out if anybody is actively using autokey, in a >production deployment. > >If you are, please let me know - I have some questions for you.
For what it's worth, I tried, but Dave's documentation wasn't enough for me to understand how it was supposed to work, or indeed to make it work without understanding it, and eventually I gave up. I don't think I ever quite figured out the scenario that the various types of authentication were intended to work on, and the whole goofy let's-use-the-X.509-data-structures-even-though-we're-not-really-doing-PKI business left a sour taste. -GAWollman -- Garrett A. Wollman | What intellectual phenomenon can be older, or more oft [email protected]| repeated, than the story of a large research program Opinions not shared by| that impaled itself upon a false central assumption my employers. | accepted by all practitioners? - S.J. Gould, 1993 _______________________________________________ questions mailing list [email protected] http://lists.ntp.org/listinfo/questions
