also sprach Colin Watson <[EMAIL PROTECTED]> [2003.01.16.1807 +0100]:
> Well, it is possible to have the key fingerprint logged; see the last
> message of #75043. However, that probably isn't what you want.
It would result in a hacked solution...
> I think you should use a forced command in autho
On Thu, Jan 16, 2003 at 05:44:28PM +0100, martin f krafft wrote:
> First off, please excuse the missins subject.
>
> > let's say everything works on the server, all i need is a method to
> > authenticate a user and upon successful authentication, pass the IP
> > s/he used for the authentication on
First off, please excuse the missins subject.
> let's say everything works on the server, all i need is a method to
> authenticate a user and upon successful authentication, pass the IP
> s/he used for the authentication on to a script that takes care of the
> edit.
>
> There exists a fake POP3 s
3 matches
Mail list logo