[Cryptography] Why aren’t we using SSH for everything?

Nico Williams nico at cryptonector.com
Sun Jan 4 20:18:08 EST 2015

For an implementation strategy for the complex bits of authentication I'd
go with upcalls (a l gssd) or PF_KEY/netlink type IPC protocols (but I
repeat myself).  The session security layer should be in "the kernel".
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20150104/f588b4b2/attachment.html>

More information about the cryptography mailing list