Hi list,

Maybe I missed something in the documentation, wiki, faq, forum, or in
the list archives, but besides adding ssh authentication in the dumptype
what steps does one take to use it?

I assume its using keys and the amanda backup user then runs a command
via ssh. Does it only use amandad over it? How about recovery? Does this
mean if use ssh, amanda will only use ssh for communication between the
two machines?

Thanks.

PS  Would any debian users/developers here please give me feedback on
the amanda 2.5 packages I built?

http://www.solutionsforprogress.com/~jcastonguay/

They still need a bit of polish, but work for me.

-- 
Jason Castonguay

Reply via email to