Wireshark-dev: [Wireshark-dev] help regarding decrypting of ssl

From: prashanth joshi <prashanthsjoshi2000@xxxxxxxxx>
Date: Tue, 5 Aug 2008 00:21:51 -0700 (PDT)
Hi all,
I am currently working on writing a decoder for ssl for an internal server of our organization. Because it is internal server we have access to the private and the public keys of the certificate of the server.
I am interested in knowing whether it is not at all possible to decrypt the ssl without using the brute force method. My requirement is that the sniffer should act passively in the network between the client and the server. And it should be able to decrypt the data without any kind of man in the middle kind of attacks. Is this possible?
I see that the random numbers are exchanged between the client and the server initially during the handshake only for preventing the replay attacks. there after the master secret key is generated by the client by randomly generating a fresh random number. And then this master secret key is encrypted. Hence is there no hope to decrypt the ssl ?
We own the certificates and hence can know the the private and public keys of the certificates. Is this information not enough in calculating the secret shared key?
Actually a company called "Unleash Networks" have come with a product that they claim as capable of decrypting ssl. How they might have done it? By brute force method? Or is it possible to decrypt ssl?

Your help would be of immense value to me.


Regards,
Prashanth