Debian Linux User wrote: > Then, just for fun, I wrote a Man-in-the-middle attack utility that > demonstrates the fun, as well as acts as a very nice debugging aid. It > works by accepting connections from Alice, negotiating crypto, then > connecting to Bob, negotiating crypto, then ferrying data between them > unaware, also logging to specified files.
Cool! Does it log the crypto negotiation too? Cause that's the part that needs the most debugging when writing a client. But it's going to be very useful indeed. IBM has a similar utility for showing what's going on in a TCP connection - it's included in their SOAP package. Haven't tried it yet sine their fileserver was down when I tried to get it: http://www.alphaworks.ibm.com -- Itamar S.T. itamar at maxnm.com _______________________________________________ Freenet-dev mailing list Freenet-dev at lists.sourceforge.net http://lists.sourceforge.net/mailman/listinfo/freenet-dev
