Tutoring on SSD/SSH

Michael Hipp MHipp
Mon May 17 11:35:18 PDT 2004


On Tue, 2002-07-23 at 22:38, David A. Bandel wrote:
> OK, the answer will depend on whether you're talking about protocol 1 or
> 2.  They are different.  However, both have similar way to authenticate a
> system:

I assume protocol 2 is better and I should use only that if possible,
right? No prob since the boxes on both ends are identical and support
it.

Thanks, David.

Michael




More information about the Linux-users mailing list