"Joseph L. Casale" <jcasale@xxxxxxxxxxxxxxxxx> wrote: >> I see, how does one manipulate the keys used for data encryption after auth during file transfers for instance? << One doesn't; the session keys are randomly generated and are automatically renewed periodically. Best, --- Les Bell, RHCE, CISSP [http://www.lesbell.com.au] Tel: +61 2 9451 1144 FreeWorldDialup: 800909 _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos