On Wed, Jun 16, 1999 at 08:47:39AM +0200, Martin Hallerdal wrote:
> So according to you, knowing just the secret key of the server wouldn't be
> sufficient to decrypt the data without using brute force?
I did not say that, because I was assuming that the server's secret
key would not be known to
> sufficient to decrypt the data without using brute force?
>
> > -Original Message-
> > From: Bodo Moeller [SMTP:[EMAIL PROTECTED]]
> > Sent: Tuesday, June 15, 1999 5:46 PM
> > To: [EMAIL PROTECTED]
> > Subject:Re: advice needed
> >
8:48 AM
> To: '[EMAIL PROTECTED]'
> Subject: RE: advice needed
>
>
> So according to you, knowing just the secret key of the server wouldn't be
> sufficient to decrypt the data without using brute force?
>
> > -Original Message-
> >
gt; Subject: Re: advice needed
>
> On Tue, Jun 15, 1999 at 04:54:40PM +0200, Pierre De Boeck wrote:
>
> > I think your concept of SSL/TLS sniffer is not realistic
> > in a general way, for the following reasons:
> >
> > - the packets transmitted between a cl
> To: [EMAIL PROTECTED]
> Subject: Re: advice needed
>
>
> On Tue, Jun 15, 1999 at 04:54:40PM +0200, Pierre De Boeck wrote:
>
> > I think your concept of SSL/TLS sniffer is not realistic
> > in a general way, for the following reasons:
> >
> > - the pac
On Tue, Jun 15, 1999 at 04:54:40PM +0200, Pierre De Boeck wrote:
> I think your concept of SSL/TLS sniffer is not realistic
> in a general way, for the following reasons:
>
> - the packets transmitted between a client and a server have submitted
> a set of "transformations" (fragme
:43 PM
> To: '[EMAIL PROTECTED]'
> Subject: RE: advice needed
>
>
> Well we have the private key of the server of course, since it's
> our server.
> If we didn't the efforts put into this project would be quite in vain :-)
>
> > -Original Mess
To: [EMAIL PROTECTED]
> Subject: Re: advice needed
>
> On Mon, 14 Jun 1999, Martin Hallerdal wrote:
>
> > We are developing a network sniffer that monitors IP traffic. If the
> > "sniffed" packet is part of a https conversation it should be decrypted.
> Now
>
On Mon, 14 Jun 1999, Martin Hallerdal wrote:
> We are developing a network sniffer that monitors IP traffic. If the
> "sniffed" packet is part of a https conversation it should be decrypted. Now
> of course this means that we have to monitor every session in order to find
> out the session key, s
Martin Hallerdal wrote:
>
> We are developing a network sniffer that monitors IP traffic. If the
> "sniffed" packet is part of a https conversation it should be decrypted. Now
> of course this means that we have to monitor every session in order to find
> out the session key, storing this informa
10 matches
Mail list logo