Adversaries may sniff the communication link to attempt to capture information about an environment, including authentication material passed over the network.