We are developing a network sniffer that monitors IP traffic. If the
"sniffed" packet is part of a https conversation it should be decrypted. Now
of course this means that we have to monitor every session in order to find
out the session key, storing this information in a data structure of some
sort.
The whole concept is a bit tricky and we thought that by using OpenSSL or
SSLeay things could get a bit easier. But I have the impression that these
libraries were constructed for a client or server, not a network sniffer. I
would be grateful if someone could give us hints on how to use these
libraries in our situation. NOTE, we are not involved in any cracking- or
illegal activity.
Martin Hallerdal
SITE - Scandinavian Internet Technology
______________________________________________________________________
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]