Is one of the formats for decrypting SSL traffic if I have the master secret. But some sites like google don't send a Session-ID (Session Id Length 0). The other format for RSA based key exchange with the encrypted pre master key and pre master key I can't use because I don't have access to the pre master keys. As far as I understand trunk-1.10/epan/dissectors/packet-ssl-utils.c:
as soon as the session id is 0, the format RSA Session-ID: Master-Key: isn't usable. Could someone confirm that or may be have an alternative solution (without modifying Wireshark)? asked 27 Aug '13, 02:32 Jack Norris |
2 Answers:
Simple solution for that problem, reduce the possible cipher suites to the suites supported by wireshark. You find the supported ones in For example Qt (OpenSSL) :
The notation is a bit strange in Qt, took some time to compare the cipher suite names. answered 28 Aug '13, 08:21 Jack Norris edited 28 Aug '13, 08:22 |
The SSL dissector will try 3 formats:
The formats are:
So if you can index your master secret with the client random for the session, you can still use the out-of-box functionality of wireshark 1.10. If not, a change to the code will be necessary. Out-of-curiosity: Which application/library are you using to log the master-secret? answered 27 Aug '13, 03:34 SYN-bit ♦♦ |
I tried the CLIENT_RANDOM but it doesn't work for me (for RSA based key exchange).
I use QtWebkit with a modified Qt library. It's easy to modify and recompile Qt if you use the source package of your distribution. In qsslsocket_openssl.cpp (Qt source package) you find some commented lines for writing a file with the master secrets.
Could that be the problem that CLIENT_RANDOM doesn't work:
I checked the packet-ssl-utils.c file and cipher suite 0x9C (
TLS_RSA_WITH_AES_128_GCM_SHA256
) should be present in Wireshark@Jack Norris The GCM cipher suite is supported in the development version (1.11.0 or newer).
@Lekensteyn This is great news! Thank you for this information!