> Dave,All
>    I would also like to be able to recreate a "session" by
> recording (i.e with TCPDump -w) and playing the databack
> Through the proxy?  If I understand the remarks below that might
> not be possible?
>
> Thanks
> Ed

It may or may not be possible, depending on many factors. At a minimum, you
need the key used by the server.

Some algorithms SSL might use, and applications on top of SSL might use,
make it impossible for a non-participant to decrypt the data, even if they
have all previously-created keys.

For example, consider (grossly simplified):
1) Server creates a temporary RSA public/private key pair.
2) Server signs public key from the temporary RSA key with its normal
permanent RSA private key.
3) Server sends temporary public key, signature, and real CA certificate to
client.
4) Client verifies signature and certificate, decrypts public temporary RSA
key.
5) Client sends something encrypted with the public temporary RSA key.
6) Server decrypts it with the temporary RSA private key.

Now, analyzing this later, you would need the temporary RSA key created in
step 1 to decrypt the data sent to the client. If that data was part of the
symettric key used to protect the session, you are (by design) screwed.

Again, what is your outer problem? If it's legitimate, there's probably a
way to do it. But there is, by intentional design, no generic way to do
this.

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to