Its been a while, so I decided to simulate a MITM attack with Cain.  Everything seems to be working, and I get confirmation that both sides have been successfully poisoned.  But then when I try to access a HTTPS site from the victim system, I receive an error on the Cain interface indicating "Couldn't accept SSL certificate from the client."  I investigated the problem on the oxid.it forums and apparently nearly everybody is having this problem recently.  Unfortunately, nobody on there had a good answer as to why this is happening.  Any thoughts?
Also, curious if anyone has used Ettercap recently for MITM.  Wondering if its now having similar problems as well.  I'll prolly test tomorrow.  Its already too late tonight.
Here's the discussion if anyone is interested: 
oxid.it forum - View topic - Anyone else having HTTPS sniffing issues?