That's what I was considering but was hoping I wouldn't have to. Thank
you for tour suggestion
John Modlin
John@xxxxxxxxxxxxxx
(859)324-1560 cell
On Jul 15, 2010, at 10:45 AM, Sake Blok <sake@xxxxxxxxxx> wrote:
On 15 jul 2010, at 14:25, John Modlin wrote:
I’ve setup tshark to do a nightly capture and include ssl traffic.
The decryption is working great. The problem
I have is I’m keeping files to a 50mb size so the files are manage
able in wireshark to view and filter. The captures
Can be several hundred mb. The decryption works great in the 1st
capture file from the ring buffer where the
Ssl.handshake info exists, but the subsequent files from the ring
buffer don’t have that information in it of course,
And consequently wireshark does not then decrypt the subsequent
files.
Is there an eloquent way to handle this?
You could extract each individual SSL session (including sessions
that reuse the negotiated keys) to a file of it's own and then do
decryption on the new files. Of course you lose the depency between
the sessions, but having both the unencrypted form next to the
integral tracefiles will still give you a pretty good view on things.
The extraction can be automated with a script, but it is not trivial
(because of the session reuse).
Cheers,
Sake
___________________________________________________________________________
Sent via: Wireshark-users mailing list <wireshark-users@xxxxxxxxxxxxx
>
Archives: http://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
mailto:wireshark-users-request@xxxxxxxxxxxxx?subject=unsubscribe