"Joseph L. Casale" <jcasale at ActiveNetwerx.com> wrote: >> I see, how does one manipulate the keys used for data encryption after auth during file transfers for instance? << One doesn't; the session keys are randomly generated and are automatically renewed periodically. Best, --- Les Bell, RHCE, CISSP [http://www.lesbell.com.au] Tel: +61 2 9451 1144 FreeWorldDialup: 800909