(Illustration by Gaich Muramatsu)
thoth_at_purplefrog.com writes: > > > Precisely. You create your own CA, install the cert on all the coda > > > machines in the cluster, and then issue certificates for each server. > > > > Why use a "CA" at all, under such circumstances? > > "Why use a hammer to pound a nail?" The alternative is to copy the > authorization keys around, because you can't have a certificate. We may be speaking at cross purposes here. Could you elaborate on what you are proposing? .pmReceived on 1998-03-31 15:52:31