Update: Here’s the link for the KB article in bluecoat which I wrote. This link is a very good short and sweet explanation with screenshots: The rest of the procedure follows the normal SSL decryption. The proxy will output the key in the form:ĥ.Ĝopy and paste the key (including the BEGIN RSA and END RSA lines) in notepad and store in a safe place as a. However, Wireshark can decrypt that traffic if you can find and provide Wireshark. Substitute the “ selfsigned” keyword for your own keyring ID. All HTTP traffic is encrypted between your web browser and the web server. Make a note of the keyring ID being used in the reverse proxy (this can also be checked from the GUI under proxy services)Ĥ.Ğnter the command show ssl keypair unencrypted selfsigned. (optional) enter show ssl keyring to view a list of configured keyrings. If another certificate is used, please substitute the appropriate entries.ġ.Ğnter the proxy management console via CLI (ssh / console cable)ģ. In this example we will extract the self-signed key from the proxy. If these plaintext keys get lost, please change the certificates and keys on the proxy to avoid a security/integrity compromise.Įxtracting the private key from the Proxy: Please be very careful and delete these after use. Please note: You will be dealing with plaintext private keys. With this key log file, we can decrypt HTTPS activity in a pcap and review its contents. Decryption is possible with a text-based log containing encryption key data captured when the pcap was originally recorded.
#DECRYPT HTTPS WIRESHARK REDDI HOW TO#
Since the key is known to the Proxy, it is possible to extract this key and use it in Wireshark to decrypt the SSL traffic for easier troubleshooting. This Wireshark tutorial describes how to decrypt HTTPS traffic from a pcap in Wireshark. In a reverse proxy scenario, the appropriate certificate and keys must be imported into the proxy in order to allow it to properly terminate SSL connections. This article uses VMware ESXi 5. So, let us proceed with the following steps. Just submitted as KB article to bluecoat 🙂Īn SSL reverse proxy is deployed, and at some stage in the troubleshooting process a packet capture of the HTTPS traffic is required to view traffic flowing between the client / proxy or between the OCS and proxy. To decrypt data, we must have the private key of the https server.