On Tue, Mar 04, 2008 at 10:31:05AM -0600, Nicolas Williams wrote: > Network security requires the deployment of authentication > infrastructure or ad-hoc, SSH publickey-like leap-of-faith > authentication. The files backend of publickey(4) != either.
I should note too, before someone begins picking nits, that I didn't and don't mean to give network security an exhaustive treatment here. So yes, I didn't mention pre-sharing of keys. :)