Debian Linux User wrote:

> Then, just for fun, I wrote a Man-in-the-middle attack utility that
> demonstrates the fun, as well as acts as a very nice debugging aid.  It
> works by accepting connections from Alice, negotiating crypto, then
> connecting to Bob, negotiating crypto, then ferrying data between them
> unaware, also logging to specified files.

Cool! Does it log the crypto negotiation too?  Cause that's the part that
needs the most debugging when writing a client.  But it's going to be very
useful indeed.

IBM has a similar utility for showing what's going on in a TCP connection -
it's included in their SOAP package.  Haven't tried it yet sine their
fileserver was down when I tried to get it: http://www.alphaworks.ibm.com

-- 
Itamar S.T.  itamar at maxnm.com

_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to