From d2884184607fed7785f37634f621b8288a3a106d Mon Sep 17 00:00:00 2001 From: Sol Jerome Date: Thu, 4 Feb 2010 21:55:16 +0000 Subject: SSL fingerprint is deprecated Removing all references to the old method of using fingerprints to verify the server you are communicating with. The new way to do this is to use the 'ca' option in bcfg2.conf along with the bcfg2 server's CA certificate. Signed-off-by: Sol Jerome git-svn-id: https://svn.mcs.anl.gov/repos/bcfg/trunk/bcfg2@5712 ce84e21b-d406-0410-9b95-82705330c041 --- src/lib/Options.py | 3 --- 1 file changed, 3 deletions(-) (limited to 'src/lib/Options.py') diff --git a/src/lib/Options.py b/src/lib/Options.py index a983e8827..c67fde910 100644 --- a/src/lib/Options.py +++ b/src/lib/Options.py @@ -274,9 +274,6 @@ CLIENT_DLIST = Option('run client in server decision list mode', default=False, cmd='-l', odesc='') CLIENT_FILE = Option('configure from a file rather than querying the server', default=False, cmd='-f', odesc='') -SERVER_FINGERPRINT = Option('Server Fingerprint', default=[], cmd='-F', - cf=('communication', 'fingerprint'), - odesc='', cook=flist_split) CLIENT_QUICK = Option('disable some checksum verification', default=False, cmd='-q', ) CLIENT_USER = Option('the user to provide for authentication', default='root', -- cgit v1.2.3-1-g7c22