Martin Hallerdal wrote:
> 
> We are developing a network sniffer that monitors IP traffic. If the
> "sniffed" packet is part of a https conversation it should be decrypted. Now
> of course this means that we have to monitor every session in order to find
> out the session key, storing this information in a data structure of some
> sort.
> 
> The whole concept is a bit tricky and we thought that by using OpenSSL or
> SSLeay things could get a bit easier. But I have the impression that these
> libraries were constructed for a client or server, not a network sniffer. I
> would be grateful if someone could give us hints on how to use these
> libraries in our situation. NOTE, we are not involved in any cracking- or
> illegal activity.

You can't do it. That's the whole point of SSL.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

"My grandfather once told me that there are two kinds of people: those
who work and those who take the credit. He told me to try to be in the
first group; there was less competition there."
     - Indira Gandhi
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to