Thanks for the reply. Actually I did ask what proof they wanted. She wanted a copy of the encrypted file. I explained "no can do" and suggested she go to the folks initiating the transfer and get a copy of their script to prove they are indeed using the OpenSSH functions. That appeased them for the moment. But, in case they come back for more , I wondered if there was a relatively straightforward way to prove it. Plus the question piqued my own curiosity.
On Thu, 9 Jun 2005 12:34:33 -0500, Tom Schmidt <[EMAIL PROTECTED]> wrote: >If you want to make this potentially long story short you really ought to >ask the auditor directly (perhaps in writing) exactly what "proof" she will >accept. > >Provide it. > >She should be satisfied, you will do what is actually required and all will >otherwise be right with the world. > >In my experience trying to do anything else is an exercise in pain. > >-- >Tom Schmidt >Madison, WI >(All auditor questions are strange at first glance. Only a few become less >strange over time. - Schmidt's Law) > >---------------------------------------------------------------------- >For IBM-MAIN subscribe / signoff / archive access instructions, >send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO >Search the archives at http://bama.ua.edu/archives/ibm-main.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html