KartheeK <[EMAIL PROTECTED]> writes: Hi!
Sorry about the wait -- I had hoped one of the other regulars on the list would have answered you by now... I currently don't have much Internet access in the evenings, but have now setup my computer for offline mail reading/writing. This mail will be the test :-) > I am in the process of designing a app that will verify the > Fingerprint thats generated when a person generates ssh keys. > > The end user has his public key uploaded on to a centralised > directory. He has his finger print with him. The security admin call > him on his office number and ask him to read out the finger print, > so as to make sure if indeed he was the one who had uploaded that > particular public key. Sounds good, but I'm afraid that VIFF does completely different things. VIFF allows a number of servers to securely evaluate some function of their inputs. It has nothing to do with SSH keys. > Now i want to automate the above process in a secured manner. How > can VIIF help me in this process? what is the mode of communication > it uses? VIFF uses normal TLS (SSL) tunnels -- no SSH tunnels in sight :-) -- Martin Geisler _______________________________________________ viff-devel mailing list (http://viff.dk/) viff-devel@viff.dk http://lists.viff.dk/listinfo.cgi/viff-devel-viff.dk