On Thu, 19 Feb 2004 08:35:28 +0000, Nick Ing-Simmons wrote:
> 
> How about layering it on ssh then?
> That has done all authentication stuff already.

        I agree. With empty passphrases and/or ssh-agent it is very
        easy to set up automated commands. Add forced commands (an
        under-appreciated feature of ssh) to restrict what can be
        done on the remote host and you've excellent security control
        over the entire environment.

                Scott

Reply via email to