Eric Rescorla <[email protected]> wrote: > If you have access to the traffic keys you certainly can mount > a MITM attack, but you can also just take over the connection > and impersonate the server entirely
How does an adversary only able to compromise the key-exchange for a specific session impersonate the server for any traffic outside of this session? -Jan _______________________________________________ TLS mailing list -- [email protected] To unsubscribe send an email to [email protected]
