You can subscribe to this list here.
2009 |
Jan
|
Feb
|
Mar
|
Apr
(11) |
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(5) |
Nov
(9) |
Dec
|
---|---|---|---|---|---|---|---|---|---|---|---|---|
2010 |
Jan
|
Feb
|
Mar
|
Apr
(1) |
May
|
Jun
|
Jul
|
Aug
(1) |
Sep
(1) |
Oct
|
Nov
|
Dec
|
From: Jonathan R. <jon...@fi...> - 2010-09-15 16:12:31
|
As William Yardley mentioned, the download URL opens directly in some (apparently not Safari) browser windows: <URL:http://sshkeychain.sourceforge.net/SSHKeychain.dmg> This happens because the MIME type give by the HTTP server is wrong; the browser is behaving correctly. The server says it's "text/plain" but it should be "application/x-apple-diskimage". It seems that Safari, like Internet Explorer treats some URLs differently from others based only the ending (.dmg) rather than relying solely on the MIME type. This allows lazy web masters to get away with not configuring their web servers correctly. If you've ever clicked on a link for an EXE or some video file format and you got a bunch of gibberish in the browser window, this is what happened. It's disappointing that Safari has followed IE down the wrong path in this case when it's otherwise much more standards compliant. -- Jonathan Rogers |
From: William Y. <ssh...@ve...> - 2010-08-12 20:55:42
|
A couple issues with the SSH keychain site: 1) Downloads recently (from http://sshkeychain.sourceforge.net/) seem to be opening directly in the browser window, rather than prompting to be downloaded this. I'm seeing this with recent Firefox - Safari appears to download normally. 2) After downloading the file manually recently (on Snow Leopard) the installer bailed out (for 0.8.2, though I also tried earlier versions and got the same results). 3) If you go to http://sshkeychain.sourceforge.net/contact.php (linked in the footer) rather than to the updated link (http://sourceforge.net/projects/sshkeychain/support), the link to the users mailing list is broken (http://sshkeychain.sourceforge.net/cgi-bin/mailman/listinfo/users) Lastly, a feature request (in reference to the note requesting feature requests for a major rewrite). I would love to see the ability to control whether the password dialog box takes focus when it pops up or not. I understand and appreciate the reason why it probably does *not* steal focus now, but for me, in most cases, I actually do want the box to steal focus so that I don't have to command-tab over to it or click on it with the mouse before typing in my passphrase. w |
From: Sean C. <se...@ti...> - 2010-04-16 18:31:17
|
Hi there, I'm trying to make SSHKeychain work with auth-pf. Note I've never written Objective-C code before so bear with my ignorance. As it stands the -N switch kills authpf as you need a console to display the message. Once I figured out how to build SSHKeychain I removed the -N option and well it hasn't fixed the issue so I can only assume stdout is closed which has the same effect as -N. I'm not sure what to fiddle with regarding NSTask either. Now in case i'm considered insane off the go, authenticating with auth-pf to a firewall works perfectly fine from a terminal... where my only parameter is my uid@host. I've tried adding -N interactively and sure enough auth-pf breaks. Any ideas what I can try with respect to the SSHKeychain tunnel class? -- Sean P.S. 10.6.3 ,XCode 3.2.1, OpenBSD4.6 running sshd with auth-pf enabled. |
From: Bart M. <ba...@am...> - 2009-11-12 23:51:13
|
We could create a mechanism that tries to restart the tunnel for about 5 minutes, until giving up and notifying the user. This should be doable. What about ssh-agent functionality? Just have it use mac's built-in ssh-agent? Or making it optional? On Nov 11, 2009, at 10:57 AM, Crimson Scythe wrote: > > On Nov 11, 2009, at 10:51 , Tim Cutts wrote: >> On 10 Nov 2009, at 1:31 pm, Crimson Scythe wrote: >>> Personally, I only use the tunneling features. >>> >>> My home computer sadly sits behind an ISP-level NAT, which means I >>> can't open any ports at all. To get around this, I use SSHKeychain >>> to >>> automatically launch tunnels with both forward and reverse port >>> forwarding. The only major issue I've experienced in my use is if >>> there's a network hick-up, or if my work computer goes down/reboots, >>> causing the tunnels to go down. I'd _love_ to have SSHKeychain >>> automatically detect stale/broken tunnels and relaunching them. In >>> other words, some sort of persistent tunneling feature. Is this >>> doable? >> >> Difficult to do in a reliable way, I'd have thought. How do you >> tell the difference between a permanent failure (where you shouldn't >> attempt to restart the tunnel) and a transient one, such as a >> temporary network glitch while OSPF finds a new route through the >> network? What time thresholds should you use before attempting to >> restart the tunnel? > > Well, I guess setting a user-defineable time threshold could work? > Let's say 5 minutes or so. If the tunnel is down for that long, can it > even resume? As it is now, if the network has a glitch, I simply lose > all contact with the computer until the tunnel is manually > reestablished. > > --Thomas > > ------------------------------------------------------------------------------ > Let Crystal Reports handle the reporting - Free Crystal Reports 2008 > 30-Day > trial. Simplify your report design, integration and deployment - and > focus on > what you do best, core application coding. Discover what's new with > Crystal Reports now. http://p.sf.net/sfu/bobj-july > _______________________________________________ > Sshkeychain-developers mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshkeychain-developers > -- Bart Matthaei Ambrero Software B.V. http://www.ambrero.nl/ T: +31 (0)72 5626331 (direct) T: +31 (0)72 5626500 F: +31 (0)72 5626355 |
From: Crimson S. <cri...@gm...> - 2009-11-11 09:58:02
|
On Nov 11, 2009, at 10:51 , Tim Cutts wrote: > On 10 Nov 2009, at 1:31 pm, Crimson Scythe wrote: >> Personally, I only use the tunneling features. >> >> My home computer sadly sits behind an ISP-level NAT, which means I >> can't open any ports at all. To get around this, I use SSHKeychain to >> automatically launch tunnels with both forward and reverse port >> forwarding. The only major issue I've experienced in my use is if >> there's a network hick-up, or if my work computer goes down/reboots, >> causing the tunnels to go down. I'd _love_ to have SSHKeychain >> automatically detect stale/broken tunnels and relaunching them. In >> other words, some sort of persistent tunneling feature. Is this >> doable? > > Difficult to do in a reliable way, I'd have thought. How do you > tell the difference between a permanent failure (where you shouldn't > attempt to restart the tunnel) and a transient one, such as a > temporary network glitch while OSPF finds a new route through the > network? What time thresholds should you use before attempting to > restart the tunnel? Well, I guess setting a user-defineable time threshold could work? Let's say 5 minutes or so. If the tunnel is down for that long, can it even resume? As it is now, if the network has a glitch, I simply lose all contact with the computer until the tunnel is manually reestablished. --Thomas |
From: Tim C. <ti...@ch...> - 2009-11-11 09:51:29
|
On 10 Nov 2009, at 1:31 pm, Crimson Scythe wrote: > Personally, I only use the tunneling features. > > My home computer sadly sits behind an ISP-level NAT, which means I > can't open any ports at all. To get around this, I use SSHKeychain to > automatically launch tunnels with both forward and reverse port > forwarding. The only major issue I've experienced in my use is if > there's a network hick-up, or if my work computer goes down/reboots, > causing the tunnels to go down. I'd _love_ to have SSHKeychain > automatically detect stale/broken tunnels and relaunching them. In > other words, some sort of persistent tunneling feature. Is this > doable? Difficult to do in a reliable way, I'd have thought. How do you tell the difference between a permanent failure (where you shouldn't attempt to restart the tunnel) and a transient one, such as a temporary network glitch while OSPF finds a new route through the network? What time thresholds should you use before attempting to restart the tunnel? Tim -- The Wellcome Trust Sanger Institute is operated by Genome Research Limited, a charity registered in England with number 1021457 and a company registered in England with number 2742969, whose registered office is 215 Euston Road, London, NW1 2BE. |
From: Crimson S. <cri...@gm...> - 2009-11-10 13:57:27
|
Personally, I only use the tunneling features. My home computer sadly sits behind an ISP-level NAT, which means I can't open any ports at all. To get around this, I use SSHKeychain to automatically launch tunnels with both forward and reverse port forwarding. The only major issue I've experienced in my use is if there's a network hick-up, or if my work computer goes down/reboots, causing the tunnels to go down. I'd _love_ to have SSHKeychain automatically detect stale/broken tunnels and relaunching them. In other words, some sort of persistent tunneling feature. Is this doable? --Thomas |
From: Tim C. <ti...@ch...> - 2009-11-02 09:15:22
|
On 2 Nov 2009, at 12:32 am, Andre-John Mas wrote: > Given the two divergent needs, would it make sense to separate the > functionality > into two separate, but complimentary, applications? The idea would > be to allow > both applications to develop the strengths, without getting held > back the other. > > One application suite that might be worth looking at for ideas is > "Putty", on > the MS-Windows side, with its pageant.exe and puttygen.exe tools. pageant doesn't really do anything that ssh-agent doesn't do already. (Don't get me wrong, PuTTY is a fine suite of apps for Windows - and I know Simon Tatham, who wrote it, personally) Personally my model for SSHKeychain use is that I use it: 1) To store passphrases in the Keychain, and manage ssh-agent for me. 2) To start my SSH tunnels (I have three up continuously), although I don't use the GUI to configure forwarded ports and so on, I just configure that stuff in my .ssh/config Now, I realise that (1) can to some extent be done by Mac OS X itself (although I've never actually bothered to use the Mac Way of doing it), but (2) is very useful to me. I don't need to forward any privileged ports, so I don't need a proper installer for SSHKeychain... Tim -- The Wellcome Trust Sanger Institute is operated by Genome Research Limited, a charity registered in England with number 1021457 and a company registered in England with number 2742969, whose registered office is 215 Euston Road, London, NW1 2BE. |
From: Andre-John M. <and...@gm...> - 2009-11-02 00:32:49
|
Given the two divergent needs, would it make sense to separate the functionality into two separate, but complimentary, applications? The idea would be to allow both applications to develop the strengths, without getting held back the other. One application suite that might be worth looking at for ideas is "Putty", on the MS-Windows side, with its pageant.exe and puttygen.exe tools. André-John On 1-Nov-2009, at 18:19, Tim Cutts wrote: > > On 30 Oct 2009, at 2:19 pm, Dustin J. Mitchell wrote: > >> On Fri, Oct 30, 2009 at 2:52 AM, Bart Matthaei <ba...@dr...> >> wrote: >>> I'd like to establish a new set of features for the project. I think >>> it would be best to focus on working together with mac's >>> ssh-agent support, adding some security features (like clean agent >>> on >>> sleep, screensaver, etc.), and further improving >>> tunnel support. >> >> My two cents are that I, and I expect a lot of other folks, do not >> need the tunnel support. I just use SSHKeychain to authenticate my >> regular old SSH logins. So tunnel stuff is great, but hopefully it >> can be prevented from getting in my way :) > > I (and many of my users) do use the tunnel support. > >> Also, I have Mac OS 10.4, and I don't have much experience with >> Objective C, but I'd like to help out. If you can toss some "easy" >> tasks my way, that'd be great. > > Objective C is pretty easy and fast to pick up. It's a much simpler > object-orientation of C than C++ is. The syntax looks a bit weird to > start with - it sort of looks like the bastard offspring of C, > SmallTalk and Tcl - but I actually quite like it. > > Tim > > > -- > The Wellcome Trust Sanger Institute is operated by Genome Research > Limited, a charity registered in England with number 1021457 and a > company registered in England with number 2742969, whose registered > office is 215 Euston Road, London, NW1 2BE. > > ------------------------------------------------------------------------------ > Come build with us! The BlackBerry(R) Developer Conference in SF, CA > is the only developer event you need to attend this year. Jumpstart > your > developing skills, take BlackBerry mobile applications to market and > stay > ahead of the curve. Join us from November 9 - 12, 2009. Register now! > http://p.sf.net/sfu/devconference > _______________________________________________ > Sshkeychain-developers mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshkeychain-developers |
From: Tim C. <ti...@ch...> - 2009-11-01 23:43:56
|
On 30 Oct 2009, at 2:19 pm, Dustin J. Mitchell wrote: > On Fri, Oct 30, 2009 at 2:52 AM, Bart Matthaei <ba...@dr...> > wrote: >> I'd like to establish a new set of features for the project. I think >> it would be best to focus on working together with mac's >> ssh-agent support, adding some security features (like clean agent on >> sleep, screensaver, etc.), and further improving >> tunnel support. > > My two cents are that I, and I expect a lot of other folks, do not > need the tunnel support. I just use SSHKeychain to authenticate my > regular old SSH logins. So tunnel stuff is great, but hopefully it > can be prevented from getting in my way :) I (and many of my users) do use the tunnel support. > Also, I have Mac OS 10.4, and I don't have much experience with > Objective C, but I'd like to help out. If you can toss some "easy" > tasks my way, that'd be great. Objective C is pretty easy and fast to pick up. It's a much simpler object-orientation of C than C++ is. The syntax looks a bit weird to start with - it sort of looks like the bastard offspring of C, SmallTalk and Tcl - but I actually quite like it. Tim -- The Wellcome Trust Sanger Institute is operated by Genome Research Limited, a charity registered in England with number 1021457 and a company registered in England with number 2742969, whose registered office is 215 Euston Road, London, NW1 2BE. |
From: Dustin J. M. <dustin@v.igoro.us> - 2009-11-01 23:26:23
|
On Sun, Nov 1, 2009 at 6:19 PM, Tim Cutts <ti...@ch...> wrote: > Objective C is pretty easy and fast to pick up. It's a much simpler > object-orientation of C than C++ is. The syntax looks a bit weird to start > with - it sort of looks like the bastard offspring of C, SmallTalk and Tcl - > but I actually quite like it. I've read a book or two, and looked over a good bit of the SSHKeyChain code, and I'm sure I could pick it up the language pretty quickly. It's probably the various NSFoo classes that would take me longer to get used to. Dustin -- Open Source Storage Engineer http://www.zmanda.com |
From: Kevin B. <ke...@sb...> - 2009-10-30 20:09:23
|
Heh, I'm the opposite. I don't need SSHKeychain to manage my keys, I use it exclusively for the tunnel support. -Kevin Ballard On Oct 30, 2009, at 7:19 AM, Dustin J. Mitchell wrote: > On Fri, Oct 30, 2009 at 2:52 AM, Bart Matthaei <ba...@dr...> > wrote: >> I'd like to establish a new set of features for the project. I think >> it would be best to focus on working together with mac's >> ssh-agent support, adding some security features (like clean agent on >> sleep, screensaver, etc.), and further improving >> tunnel support. > > My two cents are that I, and I expect a lot of other folks, do not > need the tunnel support. I just use SSHKeychain to authenticate my > regular old SSH logins. So tunnel stuff is great, but hopefully it > can be prevented from getting in my way :) > > Also, I have Mac OS 10.4, and I don't have much experience with > Objective C, but I'd like to help out. If you can toss some "easy" > tasks my way, that'd be great. > > Dustin > > -- > Open Source Storage Engineer > http://www.zmanda.com > > ------------------------------------------------------------------------------ > Come build with us! The BlackBerry(R) Developer Conference in SF, CA > is the only developer event you need to attend this year. Jumpstart > your > developing skills, take BlackBerry mobile applications to market and > stay > ahead of the curve. Join us from November 9 - 12, 2009. Register now! > http://p.sf.net/sfu/devconference > _______________________________________________ > Sshkeychain-developers mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshkeychain-developers > -- Kevin Ballard http://kevin.sb.org ke...@sb... http://www.tildesoft.com |
From: Dustin J. M. <dustin@v.igoro.us> - 2009-10-30 14:19:24
|
On Fri, Oct 30, 2009 at 2:52 AM, Bart Matthaei <ba...@dr...> wrote: > I'd like to establish a new set of features for the project. I think > it would be best to focus on working together with mac's > ssh-agent support, adding some security features (like clean agent on > sleep, screensaver, etc.), and further improving > tunnel support. My two cents are that I, and I expect a lot of other folks, do not need the tunnel support. I just use SSHKeychain to authenticate my regular old SSH logins. So tunnel stuff is great, but hopefully it can be prevented from getting in my way :) Also, I have Mac OS 10.4, and I don't have much experience with Objective C, but I'd like to help out. If you can toss some "easy" tasks my way, that'd be great. Dustin -- Open Source Storage Engineer http://www.zmanda.com |
From: Kevin B. <ke...@sb...> - 2009-10-30 08:17:27
|
IIRC, the installer errors out in the post-install phase, but SSHKeychain.app did successfully get installed. I'm not sure what the problem was, but I've been using SSHKeychain on Snow Leopard with no issues. -Kevin Ballard On Oct 30, 2009, at 12:19 AM, Bart Matthaei wrote: > Hi, > > I'm getting a lot of requests about snow leopard compatibility for the > installer. Did anyone on this list experience this issue? > > Cheers, > > Bart > > -- > Bart Matthaei > > Ambrero Software B.V. > http://www.ambrero.nl/ > > T: +31 (0)72 5626331 (direct) > > T: +31 (0)72 5626500 > F: +31 (0)72 5626355 > > > ------------------------------------------------------------------------------ > Come build with us! The BlackBerry(R) Developer Conference in SF, CA > is the only developer event you need to attend this year. Jumpstart > your > developing skills, take BlackBerry mobile applications to market and > stay > ahead of the curve. Join us from November 9 - 12, 2009. Register now! > http://p.sf.net/sfu/devconference > _______________________________________________ > Sshkeychain-developers mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshkeychain-developers > -- Kevin Ballard http://kevin.sb.org ke...@sb... http://www.tildesoft.com |
From: Bart M. <ba...@dr...> - 2009-10-30 07:52:17
|
Hi, I have a little spare time around christmas, and I'm thinking about redoing some parts of SSHKeychain, with your help. I'd like to establish a new set of features for the project. I think it would be best to focus on working together with mac's ssh-agent support, adding some security features (like clean agent on sleep, screensaver, etc.), and further improving tunnel support. Any thoughts? Regards, Bart -- Bart Matthaei Ambrero Software B.V. http://www.ambrero.nl/ T: +31 (0)72 5626331 (direct) T: +31 (0)72 5626500 F: +31 (0)72 5626355 |
From: Bart M. <ba...@dr...> - 2009-10-30 07:44:49
|
Hi, I'm getting a lot of requests about snow leopard compatibility for the installer. Did anyone on this list experience this issue? Cheers, Bart -- Bart Matthaei Ambrero Software B.V. http://www.ambrero.nl/ T: +31 (0)72 5626331 (direct) T: +31 (0)72 5626500 F: +31 (0)72 5626355 |
From: Bart M. <ba...@am...> - 2009-04-20 10:30:17
|
This was a duplicate that Dustin sent from the wrong address and was held by mailman, apparantly. He'd already resent the post from the correct address. On Apr 20, 2009, at 11:03 AM, Kevin Ballard wrote: > Didn't we just have this discussion? > > The ssh binary is included because /usr/bin/ssh on Panther doesn't > work right. SSHKeychain detects the current OS and uses the packaged > ssh on Panther and /usr/bin/ssh everywhere else. > > -Kevin Ballard > > On Apr 18, 2009, at 10:38 AM, Dustin J. Mitchell wrote: > >> Is there a reason that the ssh binary is included in the source code >> repository? Is /usr/bin/ssh not adequate? >> >> Dustin >> >> -- >> Open Source Storage Engineer >> http://www.zmanda.com >> >> ------------------------------------------------------------------------------ >> Stay on top of everything new and different, both inside and >> around Java (TM) technology - register by April 22, and save >> $200 on the JavaOne (SM) conference, June 2-5, 2009, San Francisco. >> 300 plus technical and hands-on sessions. Register today. >> Use priority code J9JMT32. http://p.sf.net/sfu/p >> _______________________________________________ >> Sshkeychain-developers mailing list >> Ssh...@li... >> https://lists.sourceforge.net/lists/listinfo/sshkeychain-developers >> > > -- > Kevin Ballard > http://kevin.sb.org > ke...@sb... > http://www.tildesoft.com > > > ------------------------------------------------------------------------------ > Stay on top of everything new and different, both inside and > around Java (TM) technology - register by April 22, and save > $200 on the JavaOne (SM) conference, June 2-5, 2009, San Francisco. > 300 plus technical and hands-on sessions. Register today. > Use priority code J9JMT32. http://p.sf.net/sfu/p_______________________________________________ > Sshkeychain-developers mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshkeychain-developers -- Bart Matthaei Ambrero Software B.V. http://www.ambrero.nl/ T: +31 (0)72 5626500 F: +31 (0)72 5626355 |
From: Kevin B. <ke...@sb...> - 2009-04-20 09:23:37
|
Didn't we just have this discussion? The ssh binary is included because /usr/bin/ssh on Panther doesn't work right. SSHKeychain detects the current OS and uses the packaged ssh on Panther and /usr/bin/ssh everywhere else. -Kevin Ballard On Apr 18, 2009, at 10:38 AM, Dustin J. Mitchell wrote: > Is there a reason that the ssh binary is included in the source code > repository? Is /usr/bin/ssh not adequate? > > Dustin > > -- > Open Source Storage Engineer > http://www.zmanda.com > > ------------------------------------------------------------------------------ > Stay on top of everything new and different, both inside and > around Java (TM) technology - register by April 22, and save > $200 on the JavaOne (SM) conference, June 2-5, 2009, San Francisco. > 300 plus technical and hands-on sessions. Register today. > Use priority code J9JMT32. http://p.sf.net/sfu/p > _______________________________________________ > Sshkeychain-developers mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshkeychain-developers > -- Kevin Ballard http://kevin.sb.org ke...@sb... http://www.tildesoft.com |
From: Dustin J. M. <dustin@v.igoro.us> - 2009-04-19 14:10:42
|
On Sun, Apr 19, 2009 at 8:33 AM, Bart Matthaei <ba...@dr...> wrote: > I'm not quite sure about dropping Panther support. I could imagine > that one of the reasons > you want to use SSHKeychain could be that you're working on an older > system, with no > built-in ssh-agent support. Not that this is a valid reason to keep > Panther support, since > I imagine most OS X users update their stuff :-) For some reason I can never remember the code-names for OS X versions, but personally I have a system with 10.4 and a system with 10.3. I'll save my $80 to put toward new hardware, thankyouverymuch. :) Since 'ssh' has been included already, and since there don't appear to be licensing implications to including the binary, let's continue to keep it in the build, possibly only using it for Panther. If we come up with a trickier issue, then dropping Panther support is fine. > This brings us back to a question that has been asked on this > mailinglist before: what is > the reason you want to use SSHKeychain on 10.5? It might be the extra > security features > SSHKeychain has, or the tunnel support, but it sure isn't the basic > ssh-agent stuff, > since that's already covered. But it is *exactly* the agent stuff I need it for in 10.4 and 10.3 :) > Personally, I think that we should make the whole 'ssh-agent' part > optional, so you can choose > to use OS X's built-in implementation (or any other, for that matter) > if you feel like it, and use > SSHKeychain as a helper application for tunnels and added security. This sounds like a great proposal. > The tunnel implementation is also very rudimentary at the moment, so > that should be improved > as well IMHO. No argument there. To be honest, the thing I'm interested in chasing down is an occasional livelock that results in SSHKeychain using up 100% CPU. With that fixed, I'll be completely happy with the app :) Dustin -- Open Source Storage Engineer http://www.zmanda.com |
From: Bart M. <ba...@dr...> - 2009-04-19 12:34:00
|
I'm not quite sure about dropping Panther support. I could imagine that one of the reasons you want to use SSHKeychain could be that you're working on an older system, with no built-in ssh-agent support. Not that this is a valid reason to keep Panther support, since I imagine most OS X users update their stuff :-) This brings us back to a question that has been asked on this mailinglist before: what is the reason you want to use SSHKeychain on 10.5? It might be the extra security features SSHKeychain has, or the tunnel support, but it sure isn't the basic ssh-agent stuff, since that's already covered. Personally, I think that we should make the whole 'ssh-agent' part optional, so you can choose to use OS X's built-in implementation (or any other, for that matter) if you feel like it, and use SSHKeychain as a helper application for tunnels and added security. The tunnel implementation is also very rudimentary at the moment, so that should be improved as well IMHO. Any thoughts? On Apr 18, 2009, at 10:13 PM, Dustin J. Mitchell wrote: > On Sat, Apr 18, 2009 at 4:03 PM, Eric Warnke <er...@gm...> wrote: >> My personal option would be for either dropping panther support or >> building openssh libs right in the main package. Either would solve >> the problem. > > Arright: > http://github.com/bartmatthaei/sshkeychain/issues/#issue/2 > > Dustin > > -- > Open Source Storage Engineer > http://www.zmanda.com > > ------------------------------------------------------------------------------ > Stay on top of everything new and different, both inside and > around Java (TM) technology - register by April 22, and save > $200 on the JavaOne (SM) conference, June 2-5, 2009, San Francisco. > 300 plus technical and hands-on sessions. Register today. > Use priority code J9JMT32. http://p.sf.net/sfu/p > _______________________________________________ > Sshkeychain-developers mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshkeychain-developers -- Bart Matthaei Ambrero Software B.V. http://www.ambrero.nl/ T: +31 (0)72 5626500 F: +31 (0)72 5626355 |
From: Dustin J. M. <dustin@v.igoro.us> - 2009-04-18 20:13:08
|
On Sat, Apr 18, 2009 at 4:03 PM, Eric Warnke <er...@gm...> wrote: > My personal option would be for either dropping panther support or > building openssh libs right in the main package. Either would solve > the problem. Arright: http://github.com/bartmatthaei/sshkeychain/issues/#issue/2 Dustin -- Open Source Storage Engineer http://www.zmanda.com |
From: Eric W. <er...@gm...> - 2009-04-18 20:03:30
|
My personal option would be for either dropping panther support or building openssh libs right in the main package. Either would solve the problem. -Eric On Sat, Apr 18, 2009 at 3:57 PM, Dustin J. Mitchell <dustin@v.igoro.us> wrote: > On Sat, Apr 18, 2009 at 3:56 PM, Eric Warnke <er...@gm...> wrote: >> IIRC, it's there for compatibility with Panther which lacked some of >> the required options. > > Hmm, ok. Are there licensing implications to this that we need to consider? > > Dustin > > -- > Open Source Storage Engineer > http://www.zmanda.com > -- Eric Warnke er...@gm... / AIM:ericew 518-396-5277 "Any technology distinguishable from magic is insufficiently advanced." - Gehm's Corollary to Clarke's Third Law |
From: Dustin J. M. <dustin@v.igoro.us> - 2009-04-18 19:57:24
|
On Sat, Apr 18, 2009 at 3:56 PM, Eric Warnke <er...@gm...> wrote: > IIRC, it's there for compatibility with Panther which lacked some of > the required options. Hmm, ok. Are there licensing implications to this that we need to consider? Dustin -- Open Source Storage Engineer http://www.zmanda.com |
From: Eric W. <er...@gm...> - 2009-04-18 19:56:34
|
IIRC, it's there for compatibility with Panther which lacked some of the required options. -Eric On Sat, Apr 18, 2009 at 2:41 PM, Dustin J. Mitchell <dustin@v.igoro.us> wrote: > Is there a reason that the ssh binary is included in the source code > repository? Is /usr/bin/ssh not adequate? > > Dustin > > -- > Open Source Storage Engineer > http://www.zmanda.com > > ------------------------------------------------------------------------------ > Stay on top of everything new and different, both inside and > around Java (TM) technology - register by April 22, and save > $200 on the JavaOne (SM) conference, June 2-5, 2009, San Francisco. > 300 plus technical and hands-on sessions. Register today. > Use priority code J9JMT32. http://p.sf.net/sfu/p > _______________________________________________ > Sshkeychain-developers mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshkeychain-developers > -- Eric Warnke er...@gm... / AIM:ericew 518-396-5277 "Any technology distinguishable from magic is insufficiently advanced." - Gehm's Corollary to Clarke's Third Law |
From: Dustin J. M. <dustin@v.igoro.us> - 2009-04-18 18:41:16
|
Is there a reason that the ssh binary is included in the source code repository? Is /usr/bin/ssh not adequate? Dustin -- Open Source Storage Engineer http://www.zmanda.com |