On Fri, May 1, 2026 at 1:34 PM Jan Schaumann <jschauma=
[email protected]> wrote:

> Eric Rescorla <[email protected]> wrote:
>
> > If you have access to the traffic keys you certainly can mount
> > a MITM attack, but you can also just take over the connection
> > and impersonate the server entirely
>
> How does an adversary only able to compromise the
> key-exchange for a specific session impersonate the
> server for any traffic outside of this session?
>

It doesn't. Sorry, what I meant was that there's no need to
send traffic to the server at all once you compute the traffic
keys. In other words, you act as an endpoint rather than
being "in the middle".

-Ekr
_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to