its Diffie and Helman Key exchange algorith.
There is no way You decrypt this session.

for info on DIffie and Hellman see this url

http://en.wikipedia.org/wiki/Diffie-Hellman.

for public key and private key exchange algos You need private key file to
decrypt the sessions.




Regards,
krish.


On Mon, Jun 29, 2009 at 5:54 PM, Harsha gowda <harsha.k.go...@gmail.com>wrote:

> Hi,
>
> Its
> Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)
>
> Regards
> Harsha
>
>
> On Mon, Jun 29, 2009 at 5:31 PM, krish <krishna.kumar.i...@gmail.com>wrote:
>
>> Can You pass tell me the cipher suite it is using ?
>> if the Key Exchange algo is Diffie and Helman .. then there is no way You
>> can decrypt.
>>
>>
>> Regards,
>> krishna.
>>
>>
>>
>> On Mon, Jun 29, 2009 at 3:30 PM, Harsha gowda 
>> <harsha.k.go...@gmail.com>wrote:
>>
>>> Hi,
>>> I am sniffing packets over wireless of 802.11i packets,
>>> Which uses EAP-TLS,
>>> So i have two way data and private key of CA.
>>>
>>> Client-Hello------------------>
>>>
>>> <----------------Server-Hello
>>>
>>> ClientKeyexchange-------->
>>>
>>> So now i can derive key-block,
>>>
>>> But openssl utlity for SSL3/TLS methods are built for active sessions
>>> only,
>>> I mean
>>>
>>> 1st create a socket
>>>
>>> fd=create_sock()
>>> then pass the socket descriptor to ssl_ctx
>>>
>>> is there any hack or work arround,
>>>
>>> Like i have sniffed packet so can store them in file and give file
>>> descriptor as socket descriptor ?.
>>>
>>> SSLDump changes the TLSV1 method and injects the certificate,Client and
>>> server random number of capture file and try to generate Key-block
>>> & decrypt the text,
>>>
>>> But SSLDump does not support all the TLSV1 ciphers.
>>>
>>>
>>> Can any one help me in this regard
>>>
>>> Thanks
>>> Harsha
>>>
>>>
>>>
>>> --
>>> ಇಂತಿ
>>> ಹರ್ಷ ಕೃ ಗೌಡ
>>>
>>>
>>
>
>
> --
> ಇಂತಿ
> ಹರ್ಷ ಕೃ ಗೌಡ
>
>

Reply via email to