Wireshark mailing list archives
Re: 256 pre master encrypted key
From: Sake Blok <sake () euronet nl>
Date: Thu, 11 Mar 2010 17:08:59 +0100
On 11 mrt 2010, at 16:24, junk () nofan com wrote:
I've watch you presentation and it was very interesting but in my situation I have a signer certificate (which is shown in the server hello packet with a common name of TEST) which is stored in my computer and issued by the server and only personal certificate (common name=HOD) with private keys stored in my computer. I extracted the private keys from the personal certificate and it seemed it didn't match.
To be able to decrypt SSL traffic with Wireshark, you need to have the private key of the certificate that is presented in the Certificate message (which is being sent after the ServerHello). In your case this would be the private key of the certificate with the common name of TEST. This private key is stored on the server that you make a connection to.
I am managing certificates with IBM ikeyman I think it's a bit confusing to me !!!
I have not used IBM ikeyman, so I can't help you there unfortunately... Cheers, Sake ___________________________________________________________________________ Sent via: Wireshark-users mailing list <wireshark-users () wireshark org> Archives: http://www.wireshark.org/lists/wireshark-users Unsubscribe: https://wireshark.org/mailman/options/wireshark-users mailto:wireshark-users-request () wireshark org?subject=unsubscribe
Current thread:
- 256 pre master encrypted key junk (Mar 11)
- Re: 256 pre master encrypted key Sake Blok (Mar 11)
- Re: 256 pre master encrypted key junk (Mar 11)
- Re: 256 pre master encrypted key Sake Blok (Mar 11)
- Re: 256 pre master encrypted key junk (Mar 11)
- Re: 256 pre master encrypted key Sake Blok (Mar 11)
- Re: 256 pre master encrypted key junk (Mar 13)
- Re: 256 pre master encrypted key junk (Mar 11)
- Re: 256 pre master encrypted key Sake Blok (Mar 11)