[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#483756: insist ssh-vulnkey -a be run by the administrator upon upgrade



On Mon, Jun 02, 2008 at 08:17:30AM +0800, jidanni@jidanni.org wrote:
> When Mom told me to change my shirt, she didn't say she meant a clean
> one... good thing some of us are so thick, else you would never
> know... that some of us are so thick, and not adjust the warning
> instructions for maximal impact...

This artificial "I'm so stupid, lots of other users must be too" is
grating. You've pretty much said that you're deliberately resistant to
learning in order to file more bugs. I'm not going to play that game.

> Anyway, Idea: now that ssh is I suppose burdened with all these
> checks, how about new protocols Ia and IIa (or 3 and 4): just like
> protocols 1 and 2 but only available in newer versions that won't let
> bad keys be born... OK, bye.

No, sorry. It's clear that you don't understand the SSH protocol, so
please don't propose crazy ideas that are unworkable. Your reports of
problems are sufficient; unless you are willing to lift your resistance
to learning and put some effort into understanding system design before
you send mail, please don't propose solutions.

Cheers,

-- 
Colin Watson                                       [cjwatson@debian.org]



Reply to: