Wireshark-dev: [Wireshark-dev] Fw: help needed regarding decrypting the ssl
From: prashanth joshi <prashanthsjoshi2000@xxxxxxxxx>
Date: Fri, 1 Aug 2008 02:34:15 -0700 (PDT)


--- On Fri, 8/1/08, prashanth joshi <prashanthsjoshi2000@xxxxxxxxx> wrote:
From: prashanth joshi <prashanthsjoshi2000@xxxxxxxxx>
Subject: help needed regarding decrypting the ssl
To: wireshark-dev@xxxxxxxxxxxxx
Date: Friday, August 1, 2008, 4:28 AM

Hi all,
I need to work on decrypting the ssl.
I am not aupposed to use the Man in the middle attack. I need to implement the ssl decrypter on a machine that acts as a sniffer.
I can have the information from the server as the requirement is for a server internal to the company
The server certificate contains the public key and private key, both we can know if the certificates are self signed. However this information itself may not be sufficient to decrypt the ssl. Because the Diffie-Hellman key exchange algorithm generates the prime numbers for the client and the server which are not sent out and are kept secret.
The definition of the TLS says that the client sends it randon number during client hello and the server sends its random number during the server hello. However in Diffie-Hellman algorithm the client keeps its random number secret and the server keeps its random number secret. Is there any way to decrypt the ssl?
is it possible?

Regards,
Prashanth

Diffie-Hellman key exchange