Eric Rescorla <[email protected]> wrote:

> If you have access to the traffic keys you certainly can mount
> a MITM attack, but you can also just take over the connection
> and impersonate the server entirely

How does an adversary only able to compromise the
key-exchange for a specific session impersonate the
server for any traffic outside of this session?

-Jan

_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to