Ethereal-dev: Re: [Ethereal-dev] Decoding SSL/TLS application protocol data withEthereal

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

From: "J.Smith" <temp201@xxxxxxxxxxx>
Date: Sun, 9 Jan 2005 18:29:56 +0100
"Alok" <alokdube@xxxxxxxxxx> wrote:

no, I actually joined the list with the idea of getting that to work :) so
its nice to know someone else can give me company... would you mind it?

Well in practice I found the mailing list to be the best company for Ethereal issues there is.
;)
Most of the people on the list are very knowledgeable of the codebase, and can come up with good ideas and practical tips on how best to approach things. My guess is that you would probably best of to discuss these kind of things on the list (instead of sending me private-emails), or post patches with the work you have done so far and ask people for feedback.



From my understanding, it is possible... somewhere in the packet-ssl.c after
during the negotiation you could capture the session key, and then, after
that, you could do a tcp_dissect_pdu and feed it down to the http
dissector..

the problem was the ssl_ctx stuff.. I got stuck there. Are you familiar with
that bit?

Well unfortunately Im not a developer myself. In fact, I can barely run a stacktrace and wouldnt be able to wrote "hello world" not even if my life depended on it. I am , however, a fairly decent system administrator that just has a real-world need to do some trouble-shooting that requires using a network sniffer every now and then.


Hope this helps,



Sincerely,


John Smith.


----- Original Message ----- From: "Alok" <alokdube@xxxxxxxxxx>
To: "J.Smith" <temp201@xxxxxxxxxxx>
Sent: Sunday, January 09, 2005 4:22 PM
Subject: Re: [Ethereal-dev] Decoding SSL/TLS application protocol data withEthereal





Ok, assuming that your reply of '' ??" either means that you dont
understand
my question, or that your system has been infected by a virus
 ;)

no, I actually joined the list with the idea of getting that to work :) so
its nice to know someone else can give me company... would you mind it?

I ended up travelling and my linux PC is back in office so I did not
actually finish this.

From my understanding, it is possible... somewhere in the packet-ssl.c after
during the negotiation you could capture the session key, and then, after
that, you could do a tcp_dissect_pdu and feed it down to the http
dissector..

the problem was the ssl_ctx stuff.. I got stuck there. Are you familiar with
that bit?