I need to know; so if you have a doc that shows I am wrong about how FF3 encrypts the data, then, with all due respect and a hallelujah, it would be appreciated.

Anthony Pace wrote:
This is for a man in the middle attack where the attacker I theoretically wouldn't know the keys that the client and the server are exchanging.

A proxy would only be able to monitor the stream, but it would not be able to decypher the data unless the handshake was faulty or the keys were small enough to break; however, if you know different, and I really mean it, if my logic is screwed and I need to know, please tell me.

Thanks,
Anthony


Dave Watts wrote:
I know I could create a proxy and run a filter on each request; yet, this
would not allow me to modify the request before FF3 encrypts it.

Yes it will. The proxy would serve as the SSL endpoint. Paros proxy
does this quite easily, and there's plenty of documentation out there
on how to use it, last I looked.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized
instruction at our training centers in Washington DC, Atlanta,
Chicago, Baltimore, Northern Virginia, or on-site at your location.
Visit http://training.figleaf.com/ for more information!
_______________________________________________
Flashcoders mailing list
[email protected]
http://chattyfig.figleaf.com/mailman/listinfo/flashcoders

_______________________________________________
Flashcoders mailing list
[email protected]
http://chattyfig.figleaf.com/mailman/listinfo/flashcoders

_______________________________________________
Flashcoders mailing list
[email protected]
http://chattyfig.figleaf.com/mailman/listinfo/flashcoders

Reply via email to