[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
I apologise, in advance,if this question has been asked before, or if it
jsut plain seems silly to you.
During the initial negotiation of IKE, what prevents someone sniffing on
the network from picking up the information transmitted needed by the
communicating computers to generate the key? Thus allowing said sniffer
to generate an identical copy of the key and decrypting any information
Thanks in Advance.