<draft-ietf-ipsec-isakmp-oakley-05.txt> The second paragraph of Section 5.2 Phase 1 Authenticated With Public Key Encryption " In order to perform the public key encryption, the initiator must^M already have the responder's public key. In the case where the" How do the two parties obtain each other's public key to begin with? John