Re: [Wireshark-users] Using private key and cert to decrypt HTTPS traffice betwen iOS and the server

2023-12-17 Thread Wall, Stephen
I’ve always limited one end to RSA-only when I needed to decrypt traffic. If you have access to the linux server, you might be able to do that, or find out if the server software (apache? Nginx?) or the crypto library (openssl? gnutls?) supports logging the premaster keys. If you have no access

Re: [Wireshark-users] Using private key and cert to decrypt HTTPS traffice betwen iOS and the server

2023-12-17 Thread public1020 via Wireshark-users
Hi Stephen, Thanks for mentioning this article, I found them before posting to the list. It won't work, because I'm capture traffic between an iOS device (not jailbroken) and a Linux server, there's no such thing as SSLKEYLOGFILE to use here. Any suggestions? On Monday, 18 December 2023 at 12

Re: [Wireshark-users] Using private key and cert to decrypt HTTPS traffice betwen iOS and the server

2023-12-17 Thread Wall, Stephen
Read this web page for a good summary on decrypting with wireshark. https://www.packetsafari.com/blog/2022/10/07/wireshark-decryption/ Basically, if the captured pcap file uses RSA handshake, you can decrypt it. If is uses ephemeral Diffie-Hellman, you can’t, you need to have also captured the e

[Wireshark-users] Using private key and cert to decrypt HTTPS traffice betwen iOS and the server

2023-12-17 Thread public1020 via Wireshark-users
I'm debugging a weird iOS application issue, I need to capture the clear traffic between the client and the server. I have the SSL private key and certificate, alongside the pcap file captured. How can I decrypt the HTTPS traffic and view it with wireshark?___