The Telnet protocol offer no form of detection of active attacks. This section suggests a way to detect active attacks using the standard Telnet option code scheme. Like the the encryption option, this option uses session keys exchanged during the authentication stage.