I remember, ethereal has a User manual, does'nt it ????
/Klaus
Ferianto siregar wrote:
Dear Gregoire,
Thank you very much for your help. Thank you. I am very happy to
receive this reply message :-)
Gregoire, may I ask you again, please?
If I can make a wish to you, would you mind tell me how I can do it
with Ethereal?
I have downloaded it, but I can not use it because I have not ever
been use it.
Would you mind,please?
Thank you very much for you help..Thanks :-)
Have a nice day for you.
Regards,
Ferianto
*/Gregoire <mlgg(a)hispeed.ch>/* wrote:
Hi Ferianto!
The first thing you can is to sniff with Ethereal a SIP communication
with and without TLS. You can see and show that with TLS you can not
access to the payload of TCP.
You can also see the RFC 4346 about TLS
(
ftp://ftp.rfc-editor.org/in-notes/rfc4346.txt
).
Hope it will help you ton convice your lecturer.
Regards
Greg
Ferianto siregar wrote:
Dear all,
Thank you very much for this chance. Thank you very much for
your time
to read my problem. Thanks
All, I still get some doubts in understanding TLS because untill
now,
my lecturer still want me to evidence that the
communication
with TLS
support is secure eventhough I have told him that
the securing
communication in TLS
is in the encyption method. But, He still does not believe me.
In his
opinion, He said that I have to evidence it by
eavesdropping the
communication, so I can show the difference between
communication with
TLS and the communication without TLS.
Of course, I am confused because as I know frOm the mailinglist and
TLS tutorial, it is not necessary to proof because the security
is in
encryption in TLS.
Does anybody can help me to solve my problem?
Here are some question that I have to ask to you. Maybe the answer
that I got from these questions,
can I use to evidence the secure communication in TLS. Please help
me..Please
1. Would anybody mind give me or show me the statement which
tell the
communication in TLS is secure?
2. Would anybody mind give me or show me how the call flow in TLS
support?
(I mean the flow of encrypt call by using TLS)
3. In voIP communication, from where the sniffer can eavesdrop the
communication untill TLS is built to protect communication? and by
using TLS, is this hole closed ?(so the communication becomes
secure?)
Those are the questions. I do hope anybody can give me an answer
so I
can show it to my lecturer to proof that the TLS
communication
is secure.
Please give me a suggestion. Please..
Thank you very much :)
Regards,
Ferianto
Get your own web address for just $1.99/1st yr
<%20http://us.rd.yahoo.com/evt=43290/*http://smallbusiness.yahoo.com/domains>.
We'll help. Yahoo! Small Business
.
------------------------------------------------------------------------
_______________________________________________
Users mailing list
Users(a)openser.org
http://openser.org/cgi-bin/mailman/listinfo/users
Get your email and more, right on the new
Yahoo.com
<http://us.rd.yahoo.com/evt=42973/*http://www.yahoo.com/preview>
------------------------------------------------------------------------
_______________________________________________
Users mailing list
Users(a)openser.org
http://openser.org/cgi-bin/mailman/listinfo/users