X-Git-Url: https://codewiz.org/gitweb?a=blobdiff_plain;f=website%2Fbugs%2Finstall-seckey2sshagent-in-usr-bin.mdwn;h=04322a45c38d8a86f674ebba9161610a6ae1ef8f;hb=b602ccf1795ff8f07f2b534c1995163d4c79aefa;hp=8044ce5ec994be6d1d052cd50f8855789d770597;hpb=8d5e0b0a27548e2bdf6345f0bebcdb98d5f18d75;p=monkeysphere.git diff --git a/website/bugs/install-seckey2sshagent-in-usr-bin.mdwn b/website/bugs/install-seckey2sshagent-in-usr-bin.mdwn index 8044ce5..04322a4 100644 --- a/website/bugs/install-seckey2sshagent-in-usr-bin.mdwn +++ b/website/bugs/install-seckey2sshagent-in-usr-bin.mdwn @@ -1,12 +1,59 @@ -[[meta title="Install seckey2sshagent in /usr/bin/"]] +[[!meta title="Install seckey2sshagent in /usr/bin/"]] I know it's a hack - but installing seckey2sshagent in /usr/bin/ would make it much easier for people to use. --- -I'm not sure I really want to include this hack with the debs. It's really not useful for any kind of regular use. I would rather focus on getting openpgp2ssh to support passprotected keys. +I'm not sure I really want to include this hack with the debs. It's +really not useful for any kind of regular use. I would rather focus +on getting openpgp2ssh to support passprotected keys. -As another possibility, I was planning on modifying the script so that it could export to a passprotected file. I think this would be a lot more useful. Let me get that working, then let's revist the issue of including it in the packaging. +As another possibility, I was planning on modifying the script so that +it could export to a passprotected file. I think this would be a lot +more useful. Let me get that working, then let's revist the issue of +including it in the packaging. --- Big Jimmy. +-- Big Jimmy + +--- + +Ok - sounds good to me. I'm thinking in terms of getting other people to try +out the Monkeysphere - maybe the README should just say: we're only half +done. You can verify the identity of servers, but we haven't completed the +part about verifying you to a server. Then it could say: if you're really +interested, you can run this hacky script but we make no guarantees. + +-- Sir Jam Jam + +--- + +I just realized that i think i can test for the presence of [GNU-dummy +support in +GnuTLS](http://lists.gnu.org/archive/html/gnutls-devel/2008-08/msg00005.html), +which means that we can cleanly test whether the proposed [handling of +passphrase-locked secret +keys](bugs/handle-passphrase-locked-secret-keys/) is functional. With +that in mind, I'd like to propose that we could resolve this bug +simply by adding a new subcommand: `monkeysphere subkey-to-ssh-agent`, +which would fail in the absence of a functionally-patched GnuTLS. + +Would this proposal be sufficient to resolve this bug? + +--dkg + +--- + +Version 0.11-1 now has the `monkeysphere subkey-to-ssh-agent` +subcommand, which works cleanly in the presence of a +functionally-patched GnuTLS. + +--dkg + +--- + +I'm marking this bug as [[bugs/done]] - I no longer think we should install +seckey2sshagent in bin now that we have a clean way of accomplishing that task. +Nice work dkg! + +--sjj