prashanth joshi wrote: > Hi all, > I am currently working on writing a decoder for ssl for an internal > server of our organization. Because it is internal server we have access > to the private and the public keys of the certificate of the server. > I am interested in knowing whether it is not at all possible to decrypt > the ssl without using the brute force method. My requirement is that the > sniffer should act passively in the network between the client and the > server. And it should be able to decrypt the data without any kind of > man in the middle kind of attacks. Is this possible? > I see that the random numbers are exchanged between the client and the > server initially during the handshake only for preventing the replay > attacks. there after the master secret key is generated by the client by > randomly generating a fresh random number. And then this master secret > key is encrypted. Hence is there no hope to decrypt the ssl ? > We own the certificates and hence can know the the private and public > keys of the certificates. Is this information not enough in calculating > the secret shared key? > Actually a company called "Unleash Networks" have come with a product > that they claim as capable of decrypting ssl. How they might have done > it? By brute force method? Or is it possible to decrypt ssl?
See: http://wiki.wireshark.org/SSL for starters. _______________________________________________ Wireshark-dev mailing list [email protected] https://wireshark.org/mailman/listinfo/wireshark-dev
