I have a valid sslv3 client authentication cert. that I use to access a company's web-site. The transaction works fine in a standard web browser. I would like to decrypt the ssl session (the server to client application data specifically). Maybe it is simply my ignorance, but shouldn't this be possible? I believe the client to server app data is encrypted with their public cert, so I am not sure if is this is accessible intra-wireshark, but I would minimally like to get the responses decrypted. This transaction is completely captured in wireshark (no reused/resumed ssl sessions). It is not a DH exchange. (1) I have tried using the .pfx file format which is how the cert was delivered to me. openssl version >1.0, and w.s. version 1.6.2 w/GnuTLS. Debug log for all includes a "ssl init private key file X successfully loaded". In case (1), The cert imports are interesting. "NameOnCert (Error), KeyID (number)". But in all cases: can't decrypt pre-master secret. no decoders available both client and server packets. I think I am hitting something fundamental -- any insight would be greatly appreciated. Thanks Chris asked 16 Jan '12, 10:06 _chris_ |
One Answer:
Chris, I hope you have gotten your answer by now, but for others who search this topic: Yes, it is something very fundamental!
Inetdog answered 20 Mar '12, 18:41 inetdog edited 20 Mar '12, 18:43 |