Antwort: [TLS] resources for sniffing TLS packet
Axel.Heider@gi-de.com Tue, 14 August 2007 11:13 UTC
Return-path: <tls-bounces@lists.ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IKuLX-0004Xl-Jq; Tue, 14 Aug 2007 07:13:59 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IKuLV-0004XW-LW for tls@lists.ietf.org; Tue, 14 Aug 2007 07:13:57 -0400
Received: from mail.gi-de.com ([193.108.184.25]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IKuLU-0004fq-2g for tls@lists.ietf.org; Tue, 14 Aug 2007 07:13:57 -0400
Received: from notessmtp1.domino.intern [10.4.4.49] by mail.gi-de.com id DUT273UE outgoing id V14WS4QI; 14 Aug 2007 13:13:54 +0200
In-Reply-To: <ec9a78d50708131213q2aab7abet4ff7f6833f6e5254@mail.gmail.com>
To: tls@lists.ietf.org
Subject: Antwort: [TLS] resources for sniffing TLS packet
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 7.0.1 January 17, 2006
Message-ID: <OF0C20287A.F4A73CDC-ONC1257337.003D69B4-C1257337.003DB2BB@gi-de.com>
From: Axel.Heider@gi-de.com
Date: Tue, 14 Aug 2007 13:13:53 +0200
X-MIMETrack: Serialize by Router on NOTESSMTP1/SRV/GuD(Release 7.0.2|September 26, 2006) at 14.08.2007 13:13:52, Serialize complete at 14.08.2007 13:13:52
Content-Type: text/plain; charset="US-ASCII"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 68c8cc8a64a9d0402e43b8eee9fc4199
Cc: Erwin Davis <erwin.davis@gmail.com>
X-BeenThere: tls@lists.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.lists.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/tls>
List-Post: <mailto:tls@lists.ietf.org>
List-Help: <mailto:tls-request@lists.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@lists.ietf.org?subject=subscribe>
Errors-To: tls-bounces@lists.ietf.org
Erwin, > I'm looking for any tool/source which is able to sniff/interpret > the TLS packet including session establishment and the code with > the feeded certificate(s). Thanks for your help, The latest version of Wireshark can do that quite well. You have to give Wireshark a list of private keys and servers in the protocol preferences for SSL. See Wireshark Wiki for details. Axel _______________________________________________ TLS mailing list TLS@lists.ietf.org https://www1.ietf.org/mailman/listinfo/tls
- [TLS] resources for sniffing TLS packet Erwin Davis
- Antwort: [TLS] resources for sniffing TLS packet Axel.Heider