[[!meta title="Install seckey2sshagent in /usr/bin/"]] I know it's a hack - but installing seckey2sshagent in /usr/bin/ would make it much easier for people to use. --- I'm not sure I really want to include this hack with the debs. It's really not useful for any kind of regular use. I would rather focus on getting openpgp2ssh to support passprotected keys. As another possibility, I was planning on modifying the script so that it could export to a passprotected file. I think this would be a lot more useful. Let me get that working, then let's revist the issue of including it in the packaging. -- Big Jimmy --- Ok - sounds good to me. I'm thinking in terms of getting other people to try out the Monkeysphere - maybe the README should just say: we're only half done. You can verify the identity of servers, but we haven't completed the part about verifying you to a server. Then it could say: if you're really interested, you can run this hacky script but we make no guarantees. -- Sir Jam Jam --- I just realized that i think i can test for the presence of [GNU-dummy support in GnuTLS](http://lists.gnu.org/archive/html/gnutls-devel/2008-08/msg00005.html), which means that we can cleanly test whether the proposed [handling of passphrase-locked secret keys](bugs/handle-passphrase-locked-secret-keys/) is functional. With that in mind, I'd like to propose that we could resolve this bug simply by adding a new subcommand: `monkeysphere subkey-to-ssh-agent`, which would fail in the absence of a functionally-patched GnuTLS. Would this proposal be sufficient to resolve this bug? --dkg --- Version 0.11-1 now has the `monkeysphere subkey-to-ssh-agent` subcommand, which works cleanly in the presence of a functionally-patched GnuTLS. --dkg --- I'm marking this bug as [[bugs/done]] - I no longer think we should install seckey2sshagent in bin now that we have a clean way of accomplishing that task. Nice work dkg! --sjj