Im put of the office so attempting to reply by email on phone. A concern is that in the attack described, new keypairs could be created that would later used in a social engineering attack. Naming keys certain ways might encourage their use in future or as part of a more complex attack scenario. On 28 Nov 2016 17:15, "Jeremy Stanley"