• treadful
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 month ago

    I’m far from an expert on PKI, but isn’t the keypair used for the cert used for key exchange? Then in theory, if that key was compromised, it could allow an adversary to be able to capture and decrypt full sessions.

    • snowfalldreamland@lemmy.ml
      cake
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 month ago

      Im also not an expert but i believe since there Is still an ephemeral DH key exchange happening an attacker needs to actively MITM while having the certificate private key to decrypt the session. Passive capturing wont work

      • Blackmist@feddit.uk
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 month ago

        Although this only was added in TLS1.2 I think. I had to switch it on manually for my server.

        I think it’s default for TLS1.3.