We are developing a network sniffer that monitors IP traffic. If the
"sniffed" packet is part of a https conversation it should be decrypted. Now
of course this means that we have to monitor every session in order to find
out the session key, storing this information in a data structure of some
sort.

The whole concept is a bit tricky and we thought that by using OpenSSL or
SSLeay things could get a bit easier. But I have the impression that these
libraries were constructed for a client or server, not a network sniffer. I
would be grateful if someone could give us hints on how to use these
libraries in our situation. NOTE, we are not involved in any cracking- or
illegal activity. 

Martin Hallerdal
SITE - Scandinavian Internet Technology

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to