SSLV3/TLS Proxy Server written by Eu-Jin Goh Stanford University Applied Crypto Group SSL Proxy Server listening on port number is 8888 -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1091 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 72 bytes...Received SSLV2 Client Hello ... From Client Hello -- Protocol Version: 3.0 Session ID Length -- 0 bytes Session ID -- Cipher Suite Length 45 bytes ... number of cipher suites 15 Cipher Suite List is -- Hex Code: 0x01 0x00 0x80 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0x02 0x00 0x80 Type: RSA Export with 40 bit RC4 and hash function MD5 Hex Code: 0x03 0x00 0x80 Type: RSA with 128 bit RC2 CBC and hash function MD5 Hex Code: 0x04 0x00 0x80 Type: RSA Export with 40 bit RC2 and hash function MD5 Hex Code: 0x06 0x00 0x40 Type: RSA with 64 bit DES CBC and hash function MD5 Hex Code: 0x07 0x00 0xc0 Type: RSA with 192 bit 3DES EDE CBC and hash function MD5 Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Challenge Length -- 16 bytes Reading from SERVER socket Read 76 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x61 0x79 Type: Unknown Cipher Suite Error: no such key exchange algorithm HandShake Packet Type :- Certificate CERTIFICATE INFORMATION :- Validity -- Not After Sep 30 23:59:59 2000 GMT Not Before Sep 17 00:00:00 1999 GMT Subject Distinguished Name -- /C=GB/ST=Northants/L=Northampton/O=Barclays Bank PLC/OU=Barclaycard/CN=enigma.barclaycard.co.uk Issuer Distinguished Name -- /O=VeriSign Trust Network/OU=VeriSign, Inc./OU=VeriSign International Server CA - Class 3/OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign RSA Public key size 1024 bits CERTIFICATE INFORMATION :- Validity -- Not After Jan 7 23:59:59 2004 GMT Not Before Apr 17 00:00:00 1997 GMT Subject Distinguished Name -- /O=VeriSign Trust Network/OU=VeriSign, Inc./OU=VeriSign International Server CA - Class 3/OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign Issuer Distinguished Name -- /C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority RSA Public key size 1024 bits CERTIFICATE INFORMATION :- Validity -- Not After Aug 1 23:59:59 2028 GMT Not Before Jan 29 00:00:00 1996 GMT Subject Distinguished Name -- /C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority Issuer Distinguished Name -- /C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority RSA Public key size 1024 bits HandShake Packet Type :- Server hello done Finished processing all data. Reading from CLIENT socket Read 137 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Client key exchange Unable to process Client Key Exchange -1 Finished processing all data. Reading from CLIENT socket Read 67 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 67 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 334 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 253 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Fragment of Application Data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 828 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1093 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 403 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 254 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Fragment of Application Data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 957 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1094 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 410 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 221 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1095 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 414 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 840 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1096 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 411 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 606 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1097 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 407 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 253 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Fragment of Application Data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1687 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1098 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 406 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 253 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Fragment of Application Data. Reading from SERVER socket Read 709 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1100 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 466 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 279 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 121 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1102 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 457 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 253 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Fragment of Application Data. Reading from SERVER socket Read 438 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1103 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 464 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 253 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 2005 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1101 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 458 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 251 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 70 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1108 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 404 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 297 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Fragment of Application Data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1632 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1111 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 461 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 251 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 70 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1112 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 460 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 415 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1114 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 460 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 433 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1116 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 460 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 454 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1118 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 463 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 277 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1121 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 413 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 269 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Fragment of Application Data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1306 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1123 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 463 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 498 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1125 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 464 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 260 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1128 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 464 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 264 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1129 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 79 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Finished processing all data. Reading from SERVER socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 463 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 243 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1132 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 465 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 253 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1995 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1133 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 466 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 253 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Fragment of Application Data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 2184 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1134 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 477 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 315 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1136 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 458 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 362 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1138 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 460 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 335 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1140 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 474 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 356 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1142 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 469 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 284 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1147 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 461 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 374 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1149 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 463 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 253 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1804 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1135 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 470 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 178 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1151 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 461 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 211 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1153 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 461 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 475 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1155 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 461 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 230 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1157 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 459 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 253 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1201 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1160 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 464 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 506 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1162 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 470 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 524 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1164 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 462 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 274 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1166 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 467 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 267 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1168 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 472 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 356 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1170 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 459 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 307 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1172 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 473 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 515 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1174 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 472 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 320 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1177 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 474 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 325 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1178 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 470 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 424 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1179 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 466 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 253 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Fragment of Application Data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 588 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1181 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 470 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 269 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1183 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 466 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 253 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Fragment of Application Data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 839 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1185 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 478 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 333 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1186 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 468 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 319 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1188 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 461 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 288 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1189 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 464 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 300 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1194 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 461 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 253 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1535 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1196 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 462 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 233 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1198 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 458 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 307 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1200 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 457 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 253 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1483 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1202 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 462 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 395 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1204 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 461 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1012 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1206 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 462 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 488 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1208 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 475 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 316 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1210 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 463 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 336 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1212 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 467 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 332 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1214 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 471 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 307 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1216 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 475 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 318 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1218 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 463 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 253 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Fragment of Application Data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1912 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1219 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 468 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 314 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1221 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 464 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 242 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1223 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 464 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 239 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1225 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 459 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 281 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Fragment of Application Data. Reading from SERVER socket Read 464 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1228 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 464 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 336 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1230 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 463 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 493 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1232 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 472 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 333 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1234 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 459 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 280 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 312 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1236 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 460 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 483 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1238 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 460 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 488 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1240 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 467 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 311 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1242 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 466 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 826 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1244 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 460 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 218 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1246 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 458 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 335 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1248 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 468 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 252 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 298 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1250 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 146 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 6 bytes...Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 459 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 282 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... From Record Header -- Protocol Version: 3.0 Fragment of Application Data. Reading from SERVER socket Read 1460 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from SERVER socket Read 1409 bytes...Received APPLICATION DATA packet ... Fragment of Application data Reading from CLIENT socket Read 23 bytes...Received a ALERT packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from CLIENT socket Read 0 bytes...Zero bytes read, close connections -------------------------------------------------------- Received connection from epsilon.Stanford.EDU, port 1253 Read 110 bytes from CONNECT request: CONNECT enigma.barclaycard.co.uk:443 HTTP/1.0 User-Agent: Mozilla/4.72 [en] (X11; U; Linux 2.2.12-20 i586) Destination hostname is enigma.barclaycard.co.uk, port is 443 Sending back to client: HTTP/1.0 200 Connection Established Reading from CLIENT socket Read 98 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- SSLV3/TLS Client Hello From Client Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher suite length is 18 bytes ... number of cipher suites 9 List of cipher suites are -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Hex Code: 0xfe 0xff Type: Unknown Cipher Suite Hex Code: 0x00 0x0a Type: RSA with 3DES EDE in CBC mode and hash function SHA Hex Code: 0xfe 0xfe Type: Unknown Cipher Suite Hex Code: 0x00 0x09 Type: RSA with DES in CBC mode and hash function SHA Hex Code: 0x00 0x64 Type: RSA Export with 56 bit RC4 and hash function SHA Hex Code: 0x00 0x62 Type: RSA Export with DES CBC and hash function SHA Hex Code: 0x00 0x03 Type: RSA EXPORT with 40 bit RC4 and hash function MD5 Hex Code: 0x00 0x06 Type: RSA EXPORT with 40 bit RC2 in CBC mode and hash function MD5 Finished processing all data. Reading from SERVER socket Read 85 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 HandShake Packet Type :- Server Hello From Server Hello -- Protocol Version 3.0 Length of session ID -- 32 bytes Session ID -- 0x81799c38b9e84e795b9310f4b0cedb8fd5c776b88d8bed17b2935558c02d3320 Cipher Suite is -- Hex Code: 0x00 0x04 Type: RSA with 128 bit RC4 and hash function MD5 Received a CHANGE_CIPHER_SPEC packet: Further packets will be encrypted ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from SERVER socket Read 61 bytes...Received a HANDSHAKE packet ... From Record Header -- Protocol Version: 3.0 Finished processing all data. Reading from C