362
Let's Encrypt Announces New-Certificate-Every-6-Days Offering
(letsencrypt.org)
This is a most excellent place for technology news and articles.
I'm far from an expert on PKI, but isn't the keypair used for the cert used for key exchange? Then in theory, if that key was compromised, it could allow an adversary to be able to capture and decrypt full sessions.
Im also not an expert but i believe since there Is still an ephemeral DH key exchange happening an attacker needs to actively MITM while having the certificate private key to decrypt the session. Passive capturing wont work
No. Perfect Forward Secrecy (ephemeral keys) prevents this type of replay.
Although this only was added in TLS1.2 I think. I had to switch it on manually for my server.
I think it's default for TLS1.3.
Time for a dive, thanks.
Have you read about perfect forward secrecy?