• tal@lemmy.today
    link
    fedilink
    English
    arrow-up
    1
    ·
    3 days ago

    Unfortunately, it’ll be more than that, as that’ll be saving the plaintext files transferred internal to the TLS connection. The information that would need to be saved will normally just be thrown out, as it’ll be the TLS connection itself.

    On second thought, though, I don’t think that it’d be viable, since the way that something like this normally works is to just use (slow) public key encryption to transfer a symmetric session key and to then use (fast) symmetric encryption on the bulk data, and once you have a copy of the session key, you could forge whatever you want with it. This would only work if you were using asymmetric encryption to encrypt the data in the connection.

    kagis

    https://www.cloudflare.com/learning/ssl/what-is-a-session-key/

    What is a session key? Session keys and TLS handshakes

    The TLS (historically known as “SSL”) protocol uses both asymmetric/public key and symmetric cryptography, and new keys for symmetric encryption have to be generated for each communication session. Such keys are called “session keys.”

    Yeah. Oh, well. It was a happy thought for a moment.