<div dir="ltr"><div dir="ltr">On Thu, Jan 10, 2019 at 11:19 AM Chris Irwin <<a href="mailto:chris@chrisirwin.ca">chris@chrisirwin.ca</a>> wrote:<br></div><div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">On Thu, Jan 10, 2019 at 03:10:51AM -0500, <a href="mailto:tomg@sentex.ca" target="_blank">tomg@sentex.ca</a> wrote:<br>
I can't imagine having to type my ssh key 1000 times a day.<br></blockquote><div><br></div><div>Me neither.</div><div><br></div><div>Not to mention the tens of scripts that rely on ssh access without having</div><div>to type in a passpharse or whatnot. <br></div><div><br></div><div>These would not be possible if there were passphrases on keys.</div><div><br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
If you really want to criticize, all of those `cat` calls are not <br>
required, and his loop could be done with just built-ins.<br></blockquote><div><br></div><div>That is what I thought too. The code in its form presented, is by</div><div>someone who knows very little about UNIX/Linux shells. <br></div><div><br></div></div><div>Another thing is the use of Python AND Perl AND Ruby, but that may</div><div>be intentional for obfuscation purposes.<br></div></div>