Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you strip out the unix socket stuff (which I need for oddball network config reasons...) it’s just standard ssh authorised keys configs & ssh-agent working exactly as designed. It’s quite elegant really!

It’s the unix socket dance that introduces the gruesome hackery (imo at least!).



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: