Hi,

Its
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)

Regards
Harsha

On Mon, Jun 29, 2009 at 5:31 PM, krish <krishna.kumar.i...@gmail.com> wrote:

> Can You pass tell me the cipher suite it is using ?
> if the Key Exchange algo is Diffie and Helman .. then there is no way You
> can decrypt.
>
>
> Regards,
> krishna.
>
>
>
> On Mon, Jun 29, 2009 at 3:30 PM, Harsha gowda <harsha.k.go...@gmail.com>wrote:
>
>> Hi,
>> I am sniffing packets over wireless of 802.11i packets,
>> Which uses EAP-TLS,
>> So i have two way data and private key of CA.
>>
>> Client-Hello------------------>
>>
>> <----------------Server-Hello
>>
>> ClientKeyexchange-------->
>>
>> So now i can derive key-block,
>>
>> But openssl utlity for SSL3/TLS methods are built for active sessions
>> only,
>> I mean
>>
>> 1st create a socket
>>
>> fd=create_sock()
>> then pass the socket descriptor to ssl_ctx
>>
>> is there any hack or work arround,
>>
>> Like i have sniffed packet so can store them in file and give file
>> descriptor as socket descriptor ?.
>>
>> SSLDump changes the TLSV1 method and injects the certificate,Client and
>> server random number of capture file and try to generate Key-block
>> & decrypt the text,
>>
>> But SSLDump does not support all the TLSV1 ciphers.
>>
>>
>> Can any one help me in this regard
>>
>> Thanks
>> Harsha
>>
>>
>>
>> --
>> ಇಂತಿ
>> ಹರ್ಷ ಕೃ ಗೌಡ
>>
>>
>


-- 
ಇಂತಿ
ಹರ್ಷ ಕೃ ಗೌಡ

Reply via email to