On Thu, Apr 15, 2021 at 2:14 PM Brad Stone <bvstone@xxxxxxxxx> wrote:

On Thu, Apr 15, 2021 at 3:12 PM Jack Woehr via OpenSource <
opensource@xxxxxxxxxxxxxxxxxx> wrote:

On Thu, Apr 15, 2021 at 2:06 PM Brad Stone <bvstone@xxxxxxxxx> wrote:

No. But I found this article, followed the instructions blindly

By George, I think he's got it!! :)

Nope. I have no idea what I did. Well, I kind of do (created a type of

Yes, the host has a key, the client has a key.

SSH negotiation involves exchanging a packet encrypted by each party's *private
key* and decrypted on the other end using the *public key*.

The SSH server host has its own keys.

So you do have an excellent idea what you did. And your methodology is
precisely what all of us do (I've been in open source since the 1980's).

The joke among younger programmers is, "What do you do for a living?" "I
Google things in between Zoom meetings." Who can remember all of this stuff?

But I don't know why it started complaining all of a sudden after
working for years.

Eh, I just had a setup go south on permissions, I think a PTF reset some

The IFS is especially prone to that, because sanity checks at PTF time,
because the IFS is a loaded gun in the hands of the user/administrator, so
easy to change.

In any case, we'll know the answer to that question when they open source
the IBM i operating system 😀

As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2022 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.