From owner-freebsd-security Mon Sep 25 3:31:16 2000 Delivered-To: freebsd-security@freebsd.org Received: from flood.ping.uio.no (flood.ping.uio.no [129.240.78.31]) by hub.freebsd.org (Postfix) with ESMTP id C71BE37B42C for ; Mon, 25 Sep 2000 03:31:13 -0700 (PDT) Received: (from des@localhost) by flood.ping.uio.no (8.9.3/8.9.3) id MAA52474; Mon, 25 Sep 2000 12:31:02 +0200 (CEST) (envelope-from des@ofug.org) X-URL: http://www.ofug.org/~des/ X-Disclaimer: The views expressed in this message do not necessarily coincide with those of any organisation or company with which I am or have been affiliated. To: Mipam Cc: Scot Elliott , CrazZzy Slash , Ali Alaoui El Hassani <961BE653994@stud.alakhawayn.ma>, freebsd-security@FreeBSD.ORG, Peter Pentchev Subject: Re: Encryption over IP References: From: Dag-Erling Smorgrav Date: 25 Sep 2000 12:31:02 +0200 In-Reply-To: Mipam's message of "Mon, 25 Sep 2000 12:15:22 +0200 (MET DST)" Message-ID: Lines: 12 User-Agent: Gnus/5.0802 (Gnus v5.8.2) Emacs/20.4 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Mipam writes: > For example in openssh you can specify the regeneration time of the key. > Default this is set to 3600 seconds. And when you would look closely, you > also see it happening for a message is displayed when this happens. > You also can check in your logs it happens. Checkout /etc/sshd_config This only applies to new connections, I think. Existing ones keep the same key. DES -- Dag-Erling Smorgrav - des@ofug.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message