> From: owner-openssl-us...@openssl.org On Behalf Of nilesh
> Sent: Thursday, 13 October, 2011 09:17

> I have a query related to decrypting the packets when 
> Diffie-Hellman is 
> used for key exchange.
<snip>
> I know wireshark cannot decode these packets, as it will not know the 
> random secret generated locally - Xa and Xb.

And any other Eve the same.

> But is there any chance for us to know these values (or 
> atleast one of 
> these values Xa or Xb)? If I host the apache
> server (for https) on my machine, is there a specific location where 
> these values are stored or logged (at least till
> the time it completes the key calculation)?
> 
Not that I can see.

But if what you really want is to decrypt 
(and maybe verify) the connection data:

according to its website Apache mod_ssl can cache SSL session 
information, which includes the master_secret, across all forks, 
which means it must be accessible to any process under that UID.
This caching is a common practice for servers that (need to be 
able to) handle heavy load, and at least most web browsers.

I don't see the format documented, but it's opensource 
so if nothing else you should be able to read that.

The master_secret, plus the two Hello.random (always 
in clear for a connection-initial handshake), are 
sufficient to decrypt and/or verify connection data, 
regardless of the keyexchange method.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to