On Tue, Mar 04, 2008 at 10:31:05AM -0600, Nicolas Williams wrote:
> Network security requires the deployment of authentication
> infrastructure or ad-hoc, SSH publickey-like leap-of-faith
> authentication.  The files backend of publickey(4) != either.

I should note too, before someone begins picking nits, that I didn't and
don't mean to give network security an exhaustive treatment here.  So
yes, I didn't mention pre-sharing of keys.

:)

Reply via email to