Hi, David,
I don't know how the VPN in system i works. But normally, VPN should create
a separate session key for each connection.
If this is the case in system i as well, I don't see any easy way to snoop
other people's session....
Best Regards.
James Fu
TDL Group Corp. (Tim Hortons)
Oakville, Ontario
Direct: 905-339-5798
fu_james@xxxxxxxxxxxxxx
Web: 
http://www.timhortons.com
                                                                           
             David Gibbs                                                   
             <david@xxxxxxxxxx                                             
             om>                                                        To 
             Sent by:                  Midrange Systems Technical          
             midrange-l-bounce         Discussion                          
             s@xxxxxxxxxxxx            <midrange-l@xxxxxxxxxxxx>           
                                                                        cc 
                                                                           
             09/10/2007 11:05                                      Subject 
             AM                        Re: Secure Telnet Between i5's ?    
                                                                           
                                                                           
             Please respond to                                             
             Midrange Systems                                              
                 Technical                                                 
                Discussion                                                 
             <midrange-l@midra                                             
                 nge.com>                                                  
                                                                           
                                                                           
Jones, John (US) wrote:
Is there an article or discussion you can point me towards?  I'd like
to know, even if just theoretical, how User A could see User B's
traffic when the iSeries is en/decrypting all of the comm.
Theoretically someone *ON* the System i could be snooping the line (not
sure how, but I think it could happen).
All traffic on the physical wire would be encrypted so it has to be
some way for User A to see either User B's job, their pre-encryption
traffic on the source system, or the post-encryption traffic on the
target system.
True ... but the traffic is fair game before it gets to the wire.  This
is what the various regulatory bodies are concerned with (I think).
david
--
System i ... for when you can't afford to be out of business
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: 
http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at 
http://archive.midrange.com/midrange-l.
The information contained in this message is confidential and may be legally privileged. The message is intended solely for the addressee(s).  If you are not the intended recipient, you are hereby notified that any use, dissemination, or reproduction is strictly prohibited and may be unlawful. If you are not the intended recipient, please contact the sender by return e-mail and destroy all copies of the original message.
L'information contenue dans ce  message est de nature confidentielle et peut etre de nature privilegiee. Ce  message est strictement reserve a l'usage de son ou ses destinataires. Si vous  n'etes pas le destinataire prevu, prenez avis, par la presente, que tout usage,  distribution, ou copie de ce message est strictement interdit et peut etre  illicite. Si vous n'etes pas le destinataire prevu, veuillez en aviser  l'expediteur par courriel et detruire tous les exemplaires du message original.
 
As an Amazon Associate we earn from qualifying purchases.