diff -r 000000000000 -r 6474c204b198 security/nss/cmd/ssltap/ssltap-manual.html --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/security/nss/cmd/ssltap/ssltap-manual.html Wed Dec 31 06:09:35 2014 +0100 @@ -0,0 +1,170 @@ + + +
+ + + + -v [prints version string]
+
-h [outputs hex instead
+of ASCII]
+
-f [turn on Fancy HTML
+coloring]
+
-s [turn on SSL decoding]
+
-x [turn on extra SSL
+hex dumps]
+
-p port [specify rendezvous port (default 1924)]
+
-l [loop - continue
+to wait for more connections]
+
Let's assume your development machine is called 'intercept'. The simplest +usage of SSLTap is to run the command 'ssltap www.netscape.com:80' +on intercept. The program will wait for an incoming connection on port +1924. Next you would want to go to your browser, and enter the URL http://intercept:1924. +The page retrieved by the browser will actually be gotten from the server +at www.netscape.com, but will go via SSLTap. + +
Data sent from the client to the server is surrounded by a '--> [ ]' +symbol, and data sent from the server to the client, a '<---[ +]' symbol. + +
You'll notice that the page retrieved with this example looks incomplete. +This is because SSLTap by default closes down after the first connection +is complete, so the browser is not able to load images. To make the SSLTap +continue to accept connections, switch on looping mode with the -l option. + +
You can change the default rendezvous port to something else with the +-p option. + +
The remaining options change the way the output is produced. + +
The -f option prints 'fancy' output - in colored HTML. Data sent from +the client to the server is in blue. The server's reply is in red. This +is designed so you can load the output up into a browser. When used with +looping mode, the different connections are separated with horizontal lines. + +
-x will turn on HEX printing. Instead of being output as ascii, the +data is shown as Hex, like this: +
If a certificate chain is detected, DER-encoded certificates will be
+saved into files in the current directory called 'cert.0x' where x is the
+sequence number of the certificate.
+
+
If you run the ssltap on a different machine that the ssl server you're +trying to connect to, the browser will complain that the host name you're +trying to connect to is different to the certificate, but it will still +let you connect, after showing you a dialog. +
HTTP | + +80 | +
SMTP | + +25 | +
HTTPS | + +443 | +
FTP | + +21 | +
IMAPS | + +993 | +
NNTP | + +119 | +
NNTPS | + +563 | +
+ +