<p>On Jun 6, 2011 2:42 PM, "George Rosamond" <<a href="mailto:george@ceetonetechnology.com">george@ceetonetechnology.com</a>> wrote:<br>
><br>
> On 06/06/11 13:14, mikel king wrote:<br>
>><br>
>><br>
>> On Jun 6, 2011, at 9:20 AM, Michael W. Lucas wrote:<br>
>><br>
>>> That's precisely the sort of weird edge case I'm NOT covering. :-)<br>
>>><br>
>>> I am doing tunnels and security of agent forwarding, but not GSSAPI<br>
>>> and complex auth mechanisms. The latter vary wildly depending on<br>
>>> operating system.<br>
>>><br>
>>> My target reader has downloaded PuTTY, typed in a username and<br>
>>> password, and says "I'm secure!" Once you have a handle on keys, X11<br>
>>> forwarding, and restricting certain keys to certain commands (for<br>
>>> automated use), they'll be able to use man pages and google for that<br>
>>> weird crap.<br>
>>><br>
>>> ==ml<br>
>><br>
>><br>
>><br>
>> So you'll not likely be covering rendezvous points and the like?<br>
>><br>
><br>
> I think the point ML is making about the audience is important.<br>
><br>
> It's for PUTTY users. . . think about what next steps the majority of those users need.<br>
><br>
> Tunneling would certainly be front and center from my guess, as using keys.<br>
><br>
> There's nothing wrong with people raising more advanced functions and configs with ssh or sshd, since some of that stuff might fit in. And actually, I think it's a cool idea to add a section for "the adventurous" as mundane as the points might be to many others.<br>
><br>
> But it seems to be, this is the "next step" for users just putty'g without keys, not knowing how to create tunnels, etc.<br>
><br>
> I suspect these are the people who haven't been smart enough to tunnel their traffic at technical conferences :)<br>
><br>
><br>
> g<br>
> _______________________________________________<br>
> talk mailing list<br>
> <a href="mailto:talk@lists.nycbug.org">talk@lists.nycbug.org</a><br>
> <a href="http://lists.nycbug.org/mailman/listinfo/talk">http://lists.nycbug.org/mailman/listinfo/talk</a></p>
<p> I'd cover how to convert keys from one format to another, viz openssh vs rfc vs? file permissions, possibly.</p>