On Mon, Apr 09, 2007 at 01:52:21PM -0400, Jeffrey Ross wrote:
> ok, then I'm missing something or doing something wrong.  The key that was
> given to me was in PKCS#12 format and I was provided the password for the
> key.  I then used openssh to convert the key to RSA with the following
> command (on a linux system - FC6):
> 
> openssl pkcs12 -in ./privatekey.p12 -out outkey.pem -nodes -nocerts
> 
> I was asked for the key password and entered it:
> Enter Import Password: <password entered>
> MAC verified OK
> 
> I removed the data before the line that started "BEGIN RSA PRIVATE KEY"
> and used the line in wireshark:
> 10.1.0.3,443,http,d:\capture\outkey.pem
> 
> Where 10.1.0.3 is the IP address of the server that I have the private key
> for.

Sounds about right to me :)
 
> So either I'm still doing something wrong or the administrator has
> provided me with the incorrect key, possible but not likely.
> 
> Any help would be appreciated...

Could you enable ssl-debugging by entering a filename in the 
ssl-protocol-preferences at "SSL debug file"? Are there any
clues in the debug-file? If you need help interpreting, could 
you send the debug-file to the list (or me)?

Just some shortcomings of the decryption-capabilities:
- SSLv2 is not supported 
- Cipher 0x39 (TLS_DHE_RSA_WITH_AES_256_CBC_SHA) is not supported
  by the libraries used by Wireshark and is used for example by firefox

Cheers,


Sake
_______________________________________________
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users

Reply via email to