Hi I have got a query to make here. So if I know the private key(permanant)
of the server is it possible to decrypt the SSL traffic?

On Thu, Sep 25, 2008 at 7:47 AM, David Schwartz <[EMAIL PROTECTED]>wrote:

>
> > Dave,All
> >    I would also like to be able to recreate a "session" by
> > recording (i.e with TCPDump -w) and playing the databack
> > Through the proxy?  If I understand the remarks below that might
> > not be possible?
> >
> > Thanks
> > Ed
>
> It may or may not be possible, depending on many factors. At a minimum, you
> need the key used by the server.
>
> Some algorithms SSL might use, and applications on top of SSL might use,
> make it impossible for a non-participant to decrypt the data, even if they
> have all previously-created keys.
>
> For example, consider (grossly simplified):
> 1) Server creates a temporary RSA public/private key pair.
> 2) Server signs public key from the temporary RSA key with its normal
> permanent RSA private key.
> 3) Server sends temporary public key, signature, and real CA certificate to
> client.
> 4) Client verifies signature and certificate, decrypts public temporary RSA
> key.
> 5) Client sends something encrypted with the public temporary RSA key.
> 6) Server decrypts it with the temporary RSA private key.
>
> Now, analyzing this later, you would need the temporary RSA key created in
> step 1 to decrypt the data sent to the client. If that data was part of the
> symettric key used to protect the session, you are (by design) screwed.
>
> Again, what is your outer problem? If it's legitimate, there's probably a
> way to do it. But there is, by intentional design, no generic way to do
> this.
>
> DS
>
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>

Reply via email to