> did this person use the ssh exploit that red hat found a few months ago? are you referring to the event which caused them to change their rpm signing keys? I thought that was not an exploit, but rather that someone's ssh key got exposed one way or other.