Lars-Johan Liman <liman@autonomica.se> writes: > That's fine as long as they are replaced with something that has the > following properties: > [properties elided] Your list looks like a perfect match for a kerberized ssh to me. -tih -- The basic difference is this: hackers build things, crackers break them.