> Presumably the point of this exercise is to be able to analyze normally
> encrypted traffic.

That's what I thought when I first read your problem description.

IMHO, you're going at this the wrong way.  Set up a second box running
snort.  Set it up to read the encrypted traffic... and use a decrypting
engine.  (Something like ssldump - I don't know for sure that snort
has this yet, but you could always hack something together from the
ssldump source.)  You'll require the server's private key to decrypt
the traffic, but that shouldn't be a problem if that really is your own
secure web server. :-)

The benefit is that snort can log as much or as little as you want.  Once
you have the monitor set up, it's just a matter of deciding what to log
and how to set up subsequent queries to the database backend.

One possible gotcha is that I'm not sure ssldump works with servers
set up for perfect forward secrecy.

THAT SAID, I find this rationale very strange.  I've given this some
thought, but only because I was trying to determine whether it was 
possible to set up a snort-based NIDS to monitor encrypted traffic for
an indication that I would want to drop the connection at the firewall.
If you just want to know what's going to/from the web server, it makes
a lot more sense to instrument that server than go through the hassles
of setting up a sniffer.

Bear
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to