![]() Even if I force it to use SSLv3 though it still does not decrypt properly.Īnd no, I never see any Info message that says “Certificate” specifically. The “Client Hello” Info message says “TLSV1” next to it. Record: offset = 0, reported_length_remaining = 555ĭecrypt_ssl3_record: app_data len 550, ssl state 0x11ĭissect_ssl enter frame #8 (already visited)Īs far as the cipher, I don’t see any DH. Record: offset = 0, reported_length_remaining = 608ĭecrypt_ssl3_record: app_data len 603, ssl state 0x11Īssociation_find: TCP port 443 found 0000000007455440ĭissect_ssl enter frame #4 (already visited)Ĭonversation = 0000000009051948, ssl_session = 0000000000000000ĭissect_ssl enter frame #5 (already visited)ĭissect_ssl enter frame #6 (already visited) Record: offset = 6, reported_length_remaining = 65ĭecrypt_ssl3_record: app_data len 60, ssl state 0x11ĭissect_ssl3_handshake iteration 1 type 60 offset 11 length 14578034 bytes, remaining 71 Record: offset = 0, reported_length_remaining = 71ĭissect_ssl3_record found version 0x0300 -> state 0x11 Ssl_find_private_key server 10.100.101.35:443ĭissect_ssl3_hnd_hello_common found CLIENT RANDOM -> state 0x01 Packet_from_server: is from server - FALSEĭecrypt_ssl3_record: using client decoderĭecrypt_ssl3_record: no decoder availableĭissect_ssl3_handshake iteration 1 type 1 offset 5 length 81 bytes, remaining 90 Record: offset = 0, reported_length_remaining = 90ĭecrypt_ssl3_record: app_data len 85, ssl state 0x00Īssociation_find: TCP port 1431 found 0000000000000000 Anyways, I removed that and now I just get this in the log ssl_init keys string: Ok, I had a semicolon on the end (I had removed it before posting here, thinking it wasn't relevant). If I try and do the follow SSL it just shows a blank screen. Ssl_init entry malformed can't find port in ''Īnd I don't know if that's an error or not. Ssl_init private key file C:\mycer.pem successfully loadedĪssociation_add TCP port 443 protocol http handle 000000000677A670 Here's the data from the debug: ssl_init keys string: I then put that on the server and put the following in the wireshark SSL protocolsĪnd load it up and it doesn't work. ![]() Openssl pkcs12 -nodes -nocerts -in "mycer.pfx" -out "mycer.pem" I tell it to export the private key, do no use strong encryption, and then I give it a password. ![]() I export the key using the certificate manager on my Windows 2008 R2 server. Ok, so I have tried and tried and I cannot get the SSL connection to be decrypted.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |