> From: Charles B Cranston
> 
> MacDermid, Kenny wrote:
> > I'm looking to locally reverse engineer a network protocol
> > that's encrypted using ssl.
> 
> Another method would be to use a man-in-the-middle attack on 
> a third machine, but that machine would need access to the 
> private key of the certificate to be used.  Somewhere around 
> I have a generic man-in-the-middle Unix program that I wrote 
> to try to debug some early IMAP problems on the Handspring 
> Visor, but it doesn't have any SSL.

I don't actually have access to the server, or the private key
it is using. Also I'm guessing the client is smart enough to
check the server certificate, so I'm guessing a generic
man-in-the-middle is out.

Thank you for the reply Charles,

Kenny

-- 
Outgoing mail is certified Virus Contaminated:
[EMAIL PROTECTED](P^)7CC)7$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Checked by AVG Anti-Virus.
Version: 7.0.290 / Virus Database: 265.4.1 - Release Date: 19/11/2004
 
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to