From owner-freebsd-questions@freebsd.org Fri Mar 11 10:00:47 2016 Return-Path: Delivered-To: freebsd-questions@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C0C10ACCA40 for ; Fri, 11 Mar 2016 10:00:47 +0000 (UTC) (envelope-from carmel_ny@outlook.com) Received: from BLU004-OMC4S2.hotmail.com (blu004-omc4s2.hotmail.com [65.55.111.141]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "*.outlook.com", Issuer "MSIT Machine Auth CA 2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 82A68860 for ; Fri, 11 Mar 2016 10:00:46 +0000 (UTC) (envelope-from carmel_ny@outlook.com) Received: from BLU437-SMTP5 ([65.55.111.136]) by BLU004-OMC4S2.hotmail.com over TLS secured channel with Microsoft SMTPSVC(7.5.7601.23008); Fri, 11 Mar 2016 02:00:45 -0800 X-TMN: [fse+CPjqL5xbUbjvjx90c+xof7IjMYhN] X-Originating-Email: [carmel_ny@outlook.com] Message-ID: X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.99 at scorpio.seibercom.net Date: Fri, 11 Mar 2016 05:00:42 -0500 From: Carmel To: freebsd-questions@freebsd.org Subject: Re: SSH and FreeBSD-11 In-Reply-To: References: Organization: Seibercom NET X-Mailer: Claws Mail 3.13.2 (GTK+ 2.24.28; i686-w64-mingw32) MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit X-OriginalArrivalTime: 11 Mar 2016 10:00:45.0164 (UTC) FILETIME=[E1024AC0:01D17B7C] X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 11 Mar 2016 10:00:47 -0000 On Fri, 11 Mar 2016 07:54:37 +0000, krad stated: > ITs probably easyist to delete the existing keys in there, then rerun > the rc script. All new keys should be generated then. Alternatively > just read the man page for ssh-keygen and create a dsa keypair. Which "rc script"? -- Carmel