> On Jul 19, 2017, at 18:35, Colm MacCárthaigh <c...@allcosts.net> wrote:
> 
> That's not what I've seen. Instead, I see administrators creating port 
> mirrors on demand and then filtering the traffic they are interested in using 
> standard tcpdump rules, and I see MITM boxes that selectively decrypt some 
> traffic to look inside it and apply some kind of security filtering. In the 
> former case, DNS lookups and IP/port destinations are commonly used to 
> trigger some suspicions too. 

Correct.

> That's not how the tcpdump/wireshark approach usually works. You give it the 
> private key and decrypts the TLS connection as it's happening.

Correct. 

Ex-post-facto is insufficient to purpose.  Real-time is the focus.  Archiving 
is rarely done, and is typically just snippets representative of the incident 
in question. 

-----------------------------------
Roland Dobbins <rdobb...@arbor.net>

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to