[08:28] System: !King_Amazon!
has joined the chat |
[08:28] !King_Amazon!:
9/20 |
[08:41] System: !King_Amazon!
has left the chat |
[12:04] System: WetWired
has joined the chat |
[12:04] WetWired:
Spector, if TLS was vulnerable to that, it would be pretty useless. Because of the Diffie-Hellman key exchange, the two endpoints have an ephemeral secret known only to them. A derived secret is encrypted with the keys associated with the server certificate so that the client knows it is talking directly to the server corresponding with the certificate. The only way to decrypt after the fact is to get the session master secret from the server or client. |
[12:06] WetWired:
With modern TLS, even knowing the server private key would not allow you to decrypt logged traffic, only to MITM impersonating the server for new traffic |
[12:12] System: WetWired
has left the chat |