"Joseph L. Casale" jcasale@ActiveNetwerx.com wrote:
I see, how does one manipulate the keys used for data encryption after auth during file transfers for instance? <<
One doesn't; the session keys are randomly generated and are automatically renewed periodically.
Best,
--- Les Bell, RHCE, CISSP [http://www.lesbell.com.au] Tel: +61 2 9451 1144 FreeWorldDialup: 800909