From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 752 invoked by alias); 2 Apr 2004 18:06:01 -0000 Mailing-List: contact overseers-help@sources.redhat.com; run by ezmlm Precedence: bulk List-Archive: List-Post: List-Help: , Sender: overseers-owner@sources.redhat.com Received: (qmail 726 invoked from network); 2 Apr 2004 18:05:58 -0000 Received: from unknown (HELO bosbc.com) (66.30.22.40) by sources.redhat.com with SMTP; 2 Apr 2004 18:05:58 -0000 Received: by bosbc.com (Postfix, from userid 201) id 81DA7400201; Fri, 2 Apr 2004 13:05:58 -0500 (EST) Date: Fri, 02 Apr 2004 18:06:00 -0000 From: Christopher Faylor To: "Frank Ch. Eigler" , overseers@sources.redhat.com Subject: Re: Error trying to get CVS write access via web-form Message-ID: <20040402180558.GA7424@coc.bosbc.com> Mail-Followup-To: "Frank Ch. Eigler" , overseers@sources.redhat.com References: <20040402155707.GC1144@coc.bosbc.com> <20040402161740.GH26117@redhat.com> <20040402164058.GH1144@coc.bosbc.com> <20040402164511.GI26117@redhat.com> <20040402165750.GJ1144@coc.bosbc.com> <20040402170838.GJ26117@redhat.com> <20040402172332.GA6781@coc.bosbc.com> <20040402172928.GL26117@redhat.com> <20040402174003.GA7172@coc.bosbc.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20040402174003.GA7172@coc.bosbc.com> User-Agent: Mutt/1.4.1i X-SW-Source: 2004-q2/txt/msg00017.txt.bz2 On Fri, Apr 02, 2004 at 12:40:03PM -0500, Christopher Faylor wrote: >On Fri, Apr 02, 2004 at 12:29:29PM -0500, Frank Ch. Eigler wrote: >>>>Unless there is at least a theoretical problem that justifies >>>>constraints, >>> >>>The theoretical problem is when people paste in broken lines or partial >>>lines from their .pub files and the software doesn't complain. [...] >> >>I see. How about changing the pubkey field to a file-upload form >>element? That way accidental truncation is unlikely. > >Sure. But, actually, it would still need sanity checking regardless, I guess. Is there a way to get ssh to tell us if the key looks right? That's probably the best way to verify keys. Maybe "ssh-keygen -l" would do it... cgf