Wireshark-users: [Wireshark-users] dissect_ssl can't find private key for this server! Try it aga
I’m trying to decrypt some SSL packets with no
success. It says that the cert is loaded properly (and it contains the private
key), however I get this output log (even after trying
0.0.0.0,0,http,c:\tmp\cert.pem). Any ideas? ssl_init keys string: 0.0.0.0,0,http,D:\PUBLIC\trace\cert.pem ssl_init found host entry
0.0.0.0,0,http,D:\PUBLIC\trace\cert.pem ssl_init addr '0.0.0.0' port '0' filename
'D:\PUBLIC\trace\cert.pem' password(only for p12 file) '(null)' ssl_init private key file D:\PUBLIC\trace\cert.pem
successfully loaded association_add TCP port 0 protocol http handle 0317E878 association_find: TCP port 993 found 03F96648 ssl_association_remove removing TCP 993 - imap handle
0304ABE8 association_add TCP port 993 protocol imap handle 0304ABE8 association_find: TCP port 995 found 03F96688 ssl_association_remove removing TCP 995 - pop handle
03C817E8 association_add TCP port 995 protocol pop handle 03C817E8 dissect_ssl enter frame #4 (first time) ssl_session_init: initializing ptr 06371A48 size 564 association_find: TCP port 1867 found 00000000 packet_from_server: is from server - FALSE dissect_ssl server 164.198.167.54:443 dissect_ssl can't find private key for this server! Try it
again with universal port 0 dissect_ssl can't find private key for this server
(universal port)! Try it again with universal address 0.0.0.0 dissect_ssl can't find any private key! conversation = 06371870, ssl_session = 06371A48 dissect_ssl3_record: content_type 22 decrypt_ssl3_record: app_data len 79 ssl, state 0x00 association_find: TCP port 1867 found 00000000 packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 1 offset 5 length 75
bytes, remaining 84 dissect_ssl3_hnd_hello_common found CLIENT RANDOM ->
state 0x01 dissect_ssl enter frame #5 (first time) conversation = 06371870, ssl_session = 06371A48 dissect_ssl enter frame #7 (first time) conversation = 06371870, ssl_session = 06371A48 dissect_ssl3_record found version 0x0301 -> state 0x11 dissect_ssl3_record: content_type 22 decrypt_ssl3_record: app_data len 1770 ssl, state 0x11 association_find: TCP port 443 found 03F5CE98 packet_from_server: is from server - TRUE decrypt_ssl3_record: using server decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 2 offset 5 length 70
bytes, remaining 1775 dissect_ssl3_hnd_hello_common found SERVER RANDOM ->
state 0x13 dissect_ssl3_hnd_srv_hello found CIPHER 0x0004 -> state
0x17 dissect_ssl3_hnd_srv_hello not enough data to generate key
(required 0x37) dissect_ssl3_handshake iteration 0 type 11 offset 79 length
1688 bytes, remaining 1775 dissect_ssl3_handshake iteration 0 type 14 offset 1771
length 0 bytes, remaining 1775 dissect_ssl enter frame #10 (first time) conversation = 06371870, ssl_session = 06371A48 dissect_ssl3_record: content_type 22 decrypt_ssl3_record: app_data len 134 ssl, state 0x17 association_find: TCP port 1867 found 00000000 packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 16 offset 5 length
130 bytes, remaining 139 dissect_ssl3_handshake found SSL_HND_CLIENT_KEY_EXCHG state
0x17 dissect_ssl3_handshake can't find private key dissect_ssl enter frame #11 (first time) conversation = 06371870, ssl_session = 06371A48 dissect_ssl3_record: content_type 20 dissect_ssl3_change_cipher_spec association_find: TCP port 1867 found 00000000 packet_from_server: is from server - FALSE ssl_change_cipher CLIENT dissect_ssl enter frame #12 (first time) conversation = 06371870, ssl_session = 06371A48 dissect_ssl3_record: content_type 22 decrypt_ssl3_record: app_data len 32 ssl, state 0x17 association_find: TCP port 1867 found 00000000 packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 4 offset 5 length
11381581 bytes, remaining 37 dissect_ssl enter frame #14 (first time) conversation = 06371870, ssl_session = 06371A48 dissect_ssl3_record: content_type 20 dissect_ssl3_change_cipher_spec association_find: TCP port 443 found 03F5CE98 packet_from_server: is from server - TRUE ssl_change_cipher SERVER dissect_ssl3_record: content_type 22 decrypt_ssl3_record: app_data len 32 ssl, state 0x17 association_find: TCP port 443 found 03F5CE98 packet_from_server: is from server - TRUE decrypt_ssl3_record: using server decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 70 offset 11 length
12670921 bytes, remaining 43 dissect_ssl enter frame #15 (first time) conversation = 06371870, ssl_session = 06371A48 dissect_ssl3_record: content_type 23 decrypt_ssl3_record: app_data len 962 ssl, state 0x17 association_find: TCP port 1867 found 00000000 packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available association_find: TCP port 1867 found 00000000 association_find: TCP port 443 found 03F5CE98 dissect_ssl enter frame #16 (first time) conversation = 06371870, ssl_session = 06371A48 dissect_ssl3_record: content_type 23 decrypt_ssl3_record: app_data len 600 ssl, state 0x17 association_find: TCP port 443 found 03F5CE98 packet_from_server: is from server - TRUE decrypt_ssl3_record: using server decoder decrypt_ssl3_record: no decoder available association_find: TCP port 443 found 03F5CE98 dissect_ssl enter frame #19 (first time) conversation = 06371870, ssl_session = 06371A48 dissect_ssl3_record: content_type 21 decrypt_ssl3_record: app_data len 18 ssl, state 0x17 association_find: TCP port 1867 found 00000000 packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl enter frame #25 (first time) ssl_session_init: initializing ptr 06372210 size 564 association_find: TCP port 1871 found 00000000 packet_from_server: is from server - FALSE dissect_ssl server 164.198.167.54:443 dissect_ssl can't find private key for this server! Try it
again with universal port 0 dissect_ssl can't find private key for this server
(universal port)! Try it again with universal address 0.0.0.0 dissect_ssl can't find any private key! conversation = 06372038, ssl_session = 06372210 dissect_ssl3_record: content_type 22 decrypt_ssl3_record: app_data len 79 ssl, state 0x00 association_find: TCP port 1871 found 00000000 packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 1 offset 5 length 75
bytes, remaining 84 dissect_ssl3_hnd_hello_common found CLIENT RANDOM ->
state 0x01 dissect_ssl enter frame #26 (first time) conversation = 06372038, ssl_session = 06372210 dissect_ssl enter frame #28 (first time) conversation = 06372038, ssl_session = 06372210 dissect_ssl3_record found version 0x0301 -> state 0x11 dissect_ssl3_record: content_type 22 decrypt_ssl3_record: app_data len 1770 ssl, state 0x11 association_find: TCP port 443 found 03F5CE98 packet_from_server: is from server - TRUE decrypt_ssl3_record: using server decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 2 offset 5 length 70
bytes, remaining 1775 dissect_ssl3_hnd_hello_common found SERVER RANDOM ->
state 0x13 dissect_ssl3_hnd_srv_hello found CIPHER 0x0004 -> state
0x17 dissect_ssl3_hnd_srv_hello not enough data to generate key
(required 0x37) dissect_ssl3_handshake iteration 0 type 11 offset 79 length
1688 bytes, remaining 1775 dissect_ssl3_handshake iteration 0 type 14 offset 1771
length 0 bytes, remaining 1775 dissect_ssl enter frame #31 (first time) conversation = 06372038, ssl_session = 06372210 dissect_ssl3_record: content_type 22 decrypt_ssl3_record: app_data len 134 ssl, state 0x17 association_find: TCP port 1871 found 00000000 packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 16 offset 5 length
130 bytes, remaining 139 dissect_ssl3_handshake found SSL_HND_CLIENT_KEY_EXCHG state
0x17 dissect_ssl3_handshake can't find private key dissect_ssl enter frame #32 (first time) conversation = 06372038, ssl_session = 06372210 dissect_ssl3_record: content_type 20 dissect_ssl3_change_cipher_spec association_find: TCP port 1871 found 00000000 packet_from_server: is from server - FALSE ssl_change_cipher CLIENT dissect_ssl enter frame #33 (first time) conversation = 06372038, ssl_session = 06372210 dissect_ssl3_record: content_type 22 decrypt_ssl3_record: app_data len 32 ssl, state 0x17 association_find: TCP port 1871 found 00000000 packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 1 offset 5 length
12924186 bytes, remaining 37 dissect_ssl enter frame #35 (first time) conversation = 06372038, ssl_session = 06372210 dissect_ssl3_record: content_type 20 dissect_ssl3_change_cipher_spec association_find: TCP port 443 found 03F5CE98 packet_from_server: is from server - TRUE ssl_change_cipher SERVER dissect_ssl3_record: content_type 22 decrypt_ssl3_record: app_data len 32 ssl, state 0x17 association_find: TCP port 443 found 03F5CE98 packet_from_server: is from server - TRUE decrypt_ssl3_record: using server decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 37 offset 11 length
6535704 bytes, remaining 43 dissect_ssl enter frame #36 (first time) conversation = 06372038, ssl_session = 06372210 dissect_ssl3_record: content_type 23 decrypt_ssl3_record: app_data len 970 ssl, state 0x17 association_find: TCP port 1871 found 00000000 packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available association_find: TCP port 1871 found 00000000 association_find: TCP port 443 found 03F5CE98 dissect_ssl enter frame #37 (first time) conversation = 06372038, ssl_session = 06372210 dissect_ssl3_record: content_type 23 decrypt_ssl3_record: app_data len 600 ssl, state 0x17 association_find: TCP port 443 found 03F5CE98 packet_from_server: is from server - TRUE decrypt_ssl3_record: using server decoder decrypt_ssl3_record: no decoder available association_find: TCP port 443 found 03F5CE98 dissect_ssl enter frame #40 (first time) conversation = 06372038, ssl_session = 06372210 dissect_ssl3_record: content_type 21 decrypt_ssl3_record: app_data len 18 ssl, state 0x17 association_find: TCP port 1871 found 00000000 packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl enter frame #46 (first time) ssl_session_init: initializing ptr 063729D8 size 564 association_find: TCP port 1891 found 00000000 packet_from_server: is from server - FALSE dissect_ssl server 164.198.167.54:443 dissect_ssl can't find private key for this server! Try it
again with universal port 0 dissect_ssl can't find private key for this server
(universal port)! Try it again with universal address 0.0.0.0 dissect_ssl can't find any private key! conversation = 06372800, ssl_session = 063729D8 dissect_ssl3_record: content_type 22 decrypt_ssl3_record: app_data len 79 ssl, state 0x00 association_find: TCP port 1891 found 00000000 packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 1 offset 5 length 75
bytes, remaining 84 dissect_ssl3_hnd_hello_common found CLIENT RANDOM ->
state 0x01 dissect_ssl enter frame #47 (first time) conversation = 06372800, ssl_session = 063729D8 dissect_ssl enter frame #48 (first time) conversation = 06372800, ssl_session = 063729D8 dissect_ssl enter frame #49 (first time) conversation = 06372800, ssl_session = 063729D8 dissect_ssl enter frame #52 (first time) conversation = 06372800, ssl_session = 063729D8 dissect_ssl3_record found version 0x0301 -> state 0x11 dissect_ssl3_record: content_type 22 decrypt_ssl3_record: app_data len 134 ssl, state 0x11 association_find: TCP port 1891 found 00000000 packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 16 offset 5 length
130 bytes, remaining 139 dissect_ssl3_handshake found SSL_HND_CLIENT_KEY_EXCHG state
0x11 dissect_ssl3_handshake not enough data to generate key
(required 0x17) |
- Prev by Date: Re: [Wireshark-users] How to view TCP responses
- Next by Date: Re: [Wireshark-users] why pages slow?
- Previous by thread: [Wireshark-users] Running Wireshark on Lower Horsepower Platforms
- Next by thread: [Wireshark-users] decode from a specific frame
- Index(es):