Private key imported: KeyID 1c:52:0e:11:b5:11:20:19:0d:1d:66:d6:85:7a:e4:12:...
ssl_init IPv4 addr '127.0.0.1' (127.0.0.1) port '444' filename 'c:\ws088.pem' password(only for p12 file) ''
ssl_init private key file c:\ws088.pem successfully loaded.
association_add TCP port 444 protocol tcp handle 00000000050F98C0
dissect_ssl enter frame #7 (first time)
ssl_session_init: initializing ptr 00000000066F2460 size 680
conversation = 00000000066F2200, ssl_session = 00000000066F2460
record: offset = 0, reported_length_remaining = 69
dissect_ssl3_record found version 0x0301 -> state 0x10
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 64, ssl state 0x10
association_find: TCP port 443 found 0000000005836E30
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #10 (first time)
conversation = 00000000066F2200, ssl_session = 00000000066F2460
record: offset = 0, reported_length_remaining = 69
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 64, ssl state 0x10
association_find: TCP port 61659 found 0000000000000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 61659 found 0000000000000000
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #11 (first time)
conversation = 00000000066F2200, ssl_session = 00000000066F2460
record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 32, ssl state 0x10
association_find: TCP port 61659 found 0000000000000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 61659 found 0000000000000000
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #10 (already visited)
conversation = 00000000066F2200, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 69
dissect_ssl3_record: content_type 23
association_find: TCP port 61659 found 0000000000000000
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #11 (already visited)
conversation = 00000000066F2200, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
association_find: TCP port 61659 found 0000000000000000
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #17 (first time)
ssl_session_init: initializing ptr 00000000066F3440 size 680
conversation = 00000000066F31E0, ssl_session = 00000000066F3440
record: offset = 0, reported_length_remaining = 613
dissect_ssl3_record found version 0x0301 -> state 0x10
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 608, ssl state 0x10
association_find: TCP port 50284 found 0000000000000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 50284 found 0000000000000000
association_find: TCP port 444 found 0000000005B709C0
dissect_ssl enter frame #47 (first time)
conversation = 00000000066F31E0, ssl_session = 00000000066F3440
record: offset = 0, reported_length_remaining = 2789
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 2784, ssl state 0x10
association_find: TCP port 444 found 0000000005B709C0
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 444 found 0000000005B709C0
dissect_ssl enter frame #47 (already visited)
conversation = 00000000066F31E0, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 2789
dissect_ssl3_record: content_type 23
association_find: TCP port 444 found 0000000005B709C0
dissect_ssl enter frame #17 (already visited)
conversation = 00000000066F31E0, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 613
dissect_ssl3_record: content_type 23
association_find: TCP port 50284 found 0000000000000000
association_find: TCP port 444 found 0000000005B709C0
dissect_ssl enter frame #7 (already visited)
conversation = 00000000066F2200, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 69
dissect_ssl3_record: content_type 23
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #7 (already visited)
conversation = 00000000066F2200, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 69
dissect_ssl3_record: content_type 23
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #10 (already visited)
conversation = 00000000066F2200, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 69
dissect_ssl3_record: content_type 23
association_find: TCP port 61659 found 0000000000000000
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #11 (already visited)
conversation = 00000000066F2200, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
association_find: TCP port 61659 found 0000000000000000
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #17 (already visited)
conversation = 00000000066F31E0, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 613
dissect_ssl3_record: content_type 23
association_find: TCP port 50284 found 0000000000000000
association_find: TCP port 444 found 0000000005B709C0
dissect_ssl enter frame #47 (already visited)
conversation = 00000000066F31E0, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 2789
dissect_ssl3_record: content_type 23
association_find: TCP port 444 found 0000000005B709C0
dissect_ssl enter frame #7 (already visited)
conversation = 00000000066F2200, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 69
dissect_ssl3_record: content_type 23
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #47 (already visited)
conversation = 00000000066F31E0, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 2789
dissect_ssl3_record: content_type 23
association_find: TCP port 444 found 0000000005B709C0
dissect_ssl enter frame #7 (already visited)
conversation = 00000000066F2200, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 69
dissect_ssl3_record: content_type 23
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #10 (already visited)
conversation = 00000000066F2200, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 69
dissect_ssl3_record: content_type 23
association_find: TCP port 61659 found 0000000000000000
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #11 (already visited)
conversation = 00000000066F2200, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
association_find: TCP port 61659 found 0000000000000000
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #17 (already visited)
conversation = 00000000066F31E0, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 613
dissect_ssl3_record: content_type 23
association_find: TCP port 50284 found 0000000000000000
association_find: TCP port 444 found 0000000005B709C0
dissect_ssl enter frame #47 (already visited)
conversation = 00000000066F31E0, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 2789
dissect_ssl3_record: content_type 23
association_find: TCP port 444 found 0000000005B709C0
dissect_ssl enter frame #47 (already visited)
conversation = 00000000066F31E0, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 2789
dissect_ssl3_record: content_type 23
association_find: TCP port 444 found 0000000005B709C0
dissect_ssl enter frame #17 (already visited)
conversation = 00000000066F31E0, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 613
dissect_ssl3_record: content_type 23
association_find: TCP port 50284 found 0000000000000000
association_find: TCP port 444 found 0000000005B709C0
dissect_ssl enter frame #7 (already visited)
conversation = 00000000066F2200, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 69
dissect_ssl3_record: content_type 23
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #10 (already visited)
conversation = 00000000066F2200, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 69
dissect_ssl3_record: content_type 23
association_find: TCP port 61659 found 0000000000000000
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #11 (already visited)
conversation = 00000000066F2200, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
association_find: TCP port 61659 found 0000000000000000
association_find: TCP port 443 found 0000000005836E30
dissect_ssl enter frame #17 (already visited)
conversation = 00000000066F31E0, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 613
dissect_ssl3_record: content_type 23
association_find: TCP port 50284 found 0000000000000000
association_find: TCP port 444 found 0000000005B709C0
dissect_ssl enter frame #47 (already visited)
conversation = 00000000066F31E0, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 2789
dissect_ssl3_record: content_type 23
association_find: TCP port 444 found 0000000005B709C0
dissect_ssl enter frame #17 (already visited)
conversation = 00000000066F31E0, ssl_session = 0000000000000000
record: offset = 0, reported_length_remaining = 613
dissect_ssl3_record: content_type 23
association_find: TCP port 50284 found 0000000000000000
association_find: TCP port 444 found 0000000005B709C0
Forgot to say - I am running Wireshark on the “server;” the SSL port is 444. The SSL cert is actually not valid (it is expired) - would that make a difference? Also, does the SSL Decrypt Profile IP address need to match the cert or anything like that?