<html><head><meta http-equiv="Content-Type" content="text/html charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class="">On Jun 10, 2015, at 11:33 PM, Radek Tkaczyk <<a href="mailto:radek@tkaczyk.id.au" class="">radek@tkaczyk.id.au</a>> wrote:<div class=""><br class=""><div><blockquote type="cite" class=""><div class="WordSection1" style="page: WordSection1; font-family: Helvetica; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;"><div style="margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;" class=""><span style="font-family: Calibri, sans-serif; font-size: 11pt;" class="">What’s worse – is that if the encryption keys are sent in the clear on the upstream, then an attacker could in theory get those encryption keys, and then decrypt the downstream traffic as well.</span></div></div></blockquote><br class=""></div><div>You’d have to be running some pretty messed up systems if you needed to send encryption keys over a public network in cleartext though, wouldn’t you?</div><div><br class=""></div><div> - mark</div><div><br class=""></div><div><br class=""></div><br class=""></div></body></html>