You're looking at Less Wrong's discussion board. This includes all posts, including those that haven't been promoted to the front page yet. For more information, see About Less Wrong.

CBHacking comments on Open thread, Feb. 9 - Feb. 15, 2015 - Less Wrong Discussion

6 Post author: MrMind 09 February 2015 09:12AM

You are viewing a comment permalink. View the original post to see all comments and the full post content.

Comments (321)

You are viewing a single comment's thread. Show more comments above.

Comment author: CBHacking 12 February 2015 09:25:02AM 0 points [-]

One possible solution is to use a proxy. There are a number of specialized HTTP[S] or SOCKS proxies, some of which may be ideally suited for this use or at least easily adaptable to it. The proxy I use most often is called Burp Suite, and is intended for web site testing and isn't really ideal for your use, but it could technically be coerced into doing what you want.

Preserving the actual TLS traffic including authentication and integrity is a bit of a weird/tricky thing to do. You can record it easily enough using any tool capable of packet capture, but unless you store handshake, the traffic, the symmetric (bulk) encryption key, and the integrity metadata, it will be tricky to prove any given server sent that data.