Thanks for the reply.

     Actually I did ask what proof they wanted.  She wanted a copy of the
encrypted file.  I explained "no can do" and suggested she go to the folks
initiating the transfer and get a copy of their script to prove they are
indeed using the OpenSSH functions.  That appeased them for the moment.
     But, in case they come back for more , I wondered if there was a
relatively straightforward way to prove it.  Plus the question piqued my own
curiosity.


On Thu, 9 Jun 2005 12:34:33 -0500, Tom Schmidt <[EMAIL PROTECTED]>
wrote:

>If you want to make this potentially long story short you really ought to
>ask the auditor directly (perhaps in writing) exactly what "proof" she will
>accept.
>
>Provide it.
>
>She should be satisfied, you will do what is actually required and all will
>otherwise be right with the world.
>
>In my experience trying to do anything else is an exercise in pain.
>
>--
>Tom Schmidt
>Madison, WI
>(All auditor questions are strange at first glance.  Only a few become less
>strange over time.  - Schmidt's Law)
>
>----------------------------------------------------------------------
>For IBM-MAIN subscribe / signoff / archive access instructions,
>send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
>Search the archives at http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to