I know it's a hack - but installing seckey2sshagent in /usr/bin/ would make it
much easier for people to use.
+
+---
+
+I'm not sure I really want to include this hack with the debs. It's really not useful for any kind of regular use. I would rather focus on getting openpgp2ssh to support passprotected keys.
+
+As another possibility, I was planning on modifying the script so that it could export to a passprotected file. I think this would be a lot more useful. Let me get that working, then let's revist the issue of including it in the packaging.
+
+-- Big Jimmy.
fwiw: i'm using OpenSSH 5.1p1 on a debian lenny system (backported
from sid)
-> I can confirm this too (I'm running openssh-client 1:4.7p1-12) -- Jamie (Jam
-> Jam)
+---
+
+I can confirm this too (I'm running openssh-client 1:4.7p1-12)
+
+-- Jamie (Jam Jam)
+
+---
+
+There is absolutely no attempt by any monkeysphere utility to parse
+any ssh or sshd config file. This will probably need to be delt with
+down the line, but it's not a particular easy task at the moment.
+
+-- Big Jimmy.
up. Minimally - just testing the acceptance of the server's identity would be
great.
+---
+
+I guess we don't really want to use george for this purpose? Does
+someone have a spare virtual machine that we could use for this
+purpose? The test machine wouldn't actually have to do any user
+authentication, I guess.
+
+-- Big Jimmy.