On Wed, Nov 24, 2004, MacDermid, Kenny wrote: > > From: Charles B Cranston > > > > MacDermid, Kenny wrote: > > > I'm looking to locally reverse engineer a network protocol > > > that's encrypted using ssl. > > > > Another method would be to use a man-in-the-middle attack on > > a third machine, but that machine would need access to the > > private key of the certificate to be used. Somewhere around > > I have a generic man-in-the-middle Unix program that I wrote > > to try to debug some early IMAP problems on the Handspring > > Visor, but it doesn't have any SSL. > > I don't actually have access to the server, or the private key > it is using. Also I'm guessing the client is smart enough to > check the server certificate, so I'm guessing a generic > man-in-the-middle is out. > >
I haven't followed this thread too closely. Does the client use OpenSSL? If so you only need to replace the DLL with one that logs the data handled by SSL_read() and SSL_write(). If CryptoAPI is used there are various ways to obtain the unencrypted premaster secret and use that to decrypt the session. Steve. -- Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage OpenSSL project core developer and freelance consultant. Funding needed! Details on homepage. Homepage: http://www.drh-consultancy.demon.co.uk ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]