The initial TLS handshake agrees on a cipher suite to use, but what stops an attacker from MITM-ing the initial handshake and downgrading the cipher suites?
Asked
Active
Viewed 360 times
1 Answers
2
In short, the Finished message is a hash of the entire handshake, encrypted with the negotiated keys. The negotiated keys are derived by something protected by asymmetric cryptography. Validation of the Finished message validates the transcript of the handshake.
This is probably answered in multiple answers on SE for "How does TLS work?".
Finished
message referenced in this answer: https://security.stackexchange.com/a/20847/149676 – Conor Mancone Sep 26 '19 at 18:45