In Lecture 4, Slide 49, the server sends the session ticket to the client before ChangeCipherSpec. Does this mean the session ticket is sent in plaintext?
Wouldn't this lead to an attacker being able to resume the session state when intercepting this non-encrypted session state?
Edit: Nevermind, the session ticket can only be decrypted by the server, therefore the attacker would have to know the session state to resume it.