A method of establishing an encrypted session. An identifier is sent from
a first node to a second node via a first connection. Either an
encryption algorithm or an identifier of the encryption algorithm is also
sent to the second node. The second node is also sent either an
encryption key or an identifier of the encryption key. A command is
received on a second connection indicating that an encrypted session is
desired. In response to receiving a command including the identifier via
the second connection, the encrypted session is established, using the
encryption algorithm.