What about the 32 octets in the finished message(CipherText)? How can we have it?

Thank you

Jostein Tveit wrote:
Mohamad Badra <[EMAIL PROTECTED]> writes:

  
I have 2 questions about this sequence number in TLS:

1)What is the value of finished's sequence number? It is zero?
    

>From RFC2246 page 16:
  sequence number
       Each connection state contains a sequence number, which is
       maintained separately for read and write states. The sequence
       number must be set to zero whenever a connection state is made
       the active state. Sequence numbers are of type uint64 and may not
       exceed 2^64-1. A sequence number is incremented after each
       record: specifically, the first record which is transmitted under
       a particular connection state should use sequence number 0.

This mean that the next message after a ChangeCipherSpec will
always have sequence number 0.

  
2) Is there any command line with OpenSSLto have the MAC?
    

Not as far as I know. The MAC is encrypted and you must have
access to the session key to print the MAC.
ssldump <URL: http://www.rtfm.com/ssldump/ > can decrypt certain
SSL connections, but I don't think it is capable of printing the
MAC. You can probably hack the source, though.

  

Reply via email to