Hi

I'm considering writing an application that can passively sniff SSL/TLS 
traffic, as part of an assignment at university. I'm aware of SSLDUMP, but 
still want to go my own path. 

I've written a client/server implementation of openssl, and know that alot of 
functions are coded for that purpose, but I wonder if there are basic 
functions that can use the handshake/protocol setup information that it sees 
on the network, between a client and server, and then use that information to 
sniff the connection. (Of course, the implementation would have access to the 
servers private key.) 

What are the limitations of openssl with regards to this, and is it relatively 
easy to implement (compared to a standard client/server implementation)?

I'm looking forward for some feedback.. 

Thanks
Göran

-- 
-------------------------------------------------------
Göran Sandahl - <[EMAIL PROTECTED]> - 
GPG Fingerprint: 58CB C304 92A7 FCF6 349D 9C49 D279 38F2 C06C D351
Personal homepage : http://gsandahl.net
-------------------------------------------------------
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to