its Diffie and Helman Key exchange algorith. There is no way You decrypt this session.
for info on DIffie and Hellman see this url http://en.wikipedia.org/wiki/Diffie-Hellman. for public key and private key exchange algos You need private key file to decrypt the sessions. Regards, krish. On Mon, Jun 29, 2009 at 5:54 PM, Harsha gowda <harsha.k.go...@gmail.com>wrote: > Hi, > > Its > Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039) > > Regards > Harsha > > > On Mon, Jun 29, 2009 at 5:31 PM, krish <krishna.kumar.i...@gmail.com>wrote: > >> Can You pass tell me the cipher suite it is using ? >> if the Key Exchange algo is Diffie and Helman .. then there is no way You >> can decrypt. >> >> >> Regards, >> krishna. >> >> >> >> On Mon, Jun 29, 2009 at 3:30 PM, Harsha gowda >> <harsha.k.go...@gmail.com>wrote: >> >>> Hi, >>> I am sniffing packets over wireless of 802.11i packets, >>> Which uses EAP-TLS, >>> So i have two way data and private key of CA. >>> >>> Client-Hello------------------> >>> >>> <----------------Server-Hello >>> >>> ClientKeyexchange--------> >>> >>> So now i can derive key-block, >>> >>> But openssl utlity for SSL3/TLS methods are built for active sessions >>> only, >>> I mean >>> >>> 1st create a socket >>> >>> fd=create_sock() >>> then pass the socket descriptor to ssl_ctx >>> >>> is there any hack or work arround, >>> >>> Like i have sniffed packet so can store them in file and give file >>> descriptor as socket descriptor ?. >>> >>> SSLDump changes the TLSV1 method and injects the certificate,Client and >>> server random number of capture file and try to generate Key-block >>> & decrypt the text, >>> >>> But SSLDump does not support all the TLSV1 ciphers. >>> >>> >>> Can any one help me in this regard >>> >>> Thanks >>> Harsha >>> >>> >>> >>> -- >>> ಇಂತಿ >>> ಹರ್ಷ ಕೃ ಗೌಡ >>> >>> >> > > > -- > ಇಂತಿ > ಹರ್ಷ ಕೃ ಗೌಡ > >