On Fri, May 1, 2026 at 1:34 PM Jan Schaumann <jschauma= [email protected]> wrote:
> Eric Rescorla <[email protected]> wrote: > > > If you have access to the traffic keys you certainly can mount > > a MITM attack, but you can also just take over the connection > > and impersonate the server entirely > > How does an adversary only able to compromise the > key-exchange for a specific session impersonate the > server for any traffic outside of this session? > It doesn't. Sorry, what I meant was that there's no need to send traffic to the server at all once you compute the traffic keys. In other words, you act as an endpoint rather than being "in the middle". -Ekr
_______________________________________________ TLS mailing list -- [email protected] To unsubscribe send an email to [email protected]
