Osamu Aoki <[EMAIL PROTECTED]> writes:

> PS: It would have been nicer if old hosk identification was backuped and
> used in new system.

Well, not if the system had a root compromise.  The attacker must be
assumed to have the private host key, which means that reusing the same
key would allow them to attack future ssh connections to the system.

-- 
Russ Allbery ([EMAIL PROTECTED])               <http://www.eyrie.org/~eagle/>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to