"Alok" <alokdube@xxxxxxxxxx> wrote:
no, I actually joined the list with the idea of getting that to work :) so
its nice to know someone else can give me company... would you mind it?
Well in practice I found the mailing list to be the best company for
Ethereal issues there is.
;)
Most of the people on the list are very knowledgeable of the codebase, and
can come up with good ideas and practical tips on how best to approach
things. My guess is that you would probably best of to discuss these kind of
things on the list (instead of sending me private-emails), or post patches
with the work you have done so far and ask people for feedback.
From my understanding, it is possible... somewhere in the packet-ssl.c
after
during the negotiation you could capture the session key, and then, after
that, you could do a tcp_dissect_pdu and feed it down to the http
dissector..
the problem was the ssl_ctx stuff.. I got stuck there. Are you familiar
with
that bit?
Well unfortunately Im not a developer myself. In fact, I can barely run a
stacktrace and wouldnt be able to wrote "hello world" not even if my life
depended on it. I am , however, a fairly decent system administrator that
just has a real-world need to do some trouble-shooting that requires using a
network sniffer every now and then.
Hope this helps,
Sincerely,
John Smith.
----- Original Message -----
From: "Alok" <alokdube@xxxxxxxxxx>
To: "J.Smith" <temp201@xxxxxxxxxxx>
Sent: Sunday, January 09, 2005 4:22 PM
Subject: Re: [Ethereal-dev] Decoding SSL/TLS application protocol data
withEthereal
Ok, assuming that your reply of '' ??" either means that you dont
understand
my question, or that your system has been infected by a virus
;)
no, I actually joined the list with the idea of getting that to work :) so
its nice to know someone else can give me company... would you mind it?
I ended up travelling and my linux PC is back in office so I did not
actually finish this.
From my understanding, it is possible... somewhere in the packet-ssl.c
after
during the negotiation you could capture the session key, and then, after
that, you could do a tcp_dissect_pdu and feed it down to the http
dissector..
the problem was the ssl_ctx stuff.. I got stuck there. Are you familiar
with
that bit?