> From: Charles B Cranston > > MacDermid, Kenny wrote: > > I'm looking to locally reverse engineer a network protocol > > that's encrypted using ssl. > > Another method would be to use a man-in-the-middle attack on > a third machine, but that machine would need access to the > private key of the certificate to be used. Somewhere around > I have a generic man-in-the-middle Unix program that I wrote > to try to debug some early IMAP problems on the Handspring > Visor, but it doesn't have any SSL.
I don't actually have access to the server, or the private key it is using. Also I'm guessing the client is smart enough to check the server certificate, so I'm guessing a generic man-in-the-middle is out. Thank you for the reply Charles, Kenny -- Outgoing mail is certified Virus Contaminated: [EMAIL PROTECTED](P^)7CC)7$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* Checked by AVG Anti-Virus. Version: 7.0.290 / Virus Database: 265.4.1 - Release Date: 19/11/2004 ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]