I've been having a lot of problems with the SSL and Kerberos
decryption lately. Odd thing I've found is that when I can decrypt on
a Windows release, I can't on a unix (at least, Linux and OS X). And
if I can decrypt on a Unix, I can't in Windows. It's traffic-dependent
somehow, but I haven't spent much time investigating. Maybe you're
Post by Thiago Moreira (timba)Hey Sake,
This is my configuration: 127.0.0.1,8443,http,/home/tmoreira2020/
foo.pem . It is pretty straightforward like yours, except the IP
address but it does not work.
Is there a way to debug deeper on wireshark to know if the SSL key
is being used/loaded/matched?
Cheers
Thiago Moreira
There is no need to use the "Decode As..." if you configure the RSA
key list correctly in the SSL protocol preferences. You should
<server-ip>,<server-port>,<protocol inside ssl>,<key-file-location>
If I understand you correctly, your SSL traffic is not on port 443,
so let's assume your server is at 10.0.0.1 and uses port 8443 and
10.0.0.1,8443,http,/root/foo.pem
Hope this helps,
Cheers,
Sake
----- Original Message -----
From: Thiago Moreira (timba)
To: Community support list for Wireshark
Sent: Tuesday, January 19, 2010 12:07 AM
Subject: Re: [Wireshark-users] can't load private key from /root/
foo.pem
Thank you Sake! The error message has gone away.
But I'm still not able to see the header of http in a plain text.
I'm using the context menu "Decode As.." to decode the encrypted
packet but no success! Any clue?
Thanks
The file /root/foo.pem probably contains both the certificate and
the key. You should delete the part with the certificate. Or you
openssl pkcs12 -in foo.p12 -out foo.pem -nodes -nocerts
Hope this helps,
Cheers,
Sake
----- Original Message -----
From: Thiago Moreira (timba)
Sent: Monday, January 18, 2010 8:12 PM
Subject: [Wireshark-users] can't load private key from /root/foo.pem
Hi there,
I'm facing the following error when adding a private key to the
"RSA key list" field on Wireshark preferences.
can't load private key from /root/foo.pem
The key was generated by $JAVA_HOME/bin/keytool and then I used
the following commands to export it to a PEM format
keytool -importkeystore -srckeystore .keystore -destkeystore
foo.p12 -srcstoretype jks -deststoretype pkcs12
openssl pkcs12 -in foo.p12 -out foo.pem
My question is how can I find out what is going on? Is there any
debug flag that can use to help me find out the issue?
Thanks in advance
Thiago Moreira
___________________________________________________________________________
Archives: http://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
___________________________________________________________________________
Archives: http://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
___________________________________________________________________________
Archives: http://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
___________________________________________________________________________
Archives: http://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
___________________________________________________________________________
Archives: http://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users