[389-users] Decrypting SSL for 389-ds

2010-11-12 Thread Gerrard Geldenhuis
Hi I am trying to decrypt SSL traffic capture with tcpdump in wireshark. A quick google turned up a page that said the NSS utils does not allow you to expose your private key. Is there different way or howto that anyone can share to help decrypt SSL encrypted traffic for 389? Regards

Re: [389-users] Decrypting SSL for 389-ds

2010-11-12 Thread David Boreham
On 11/12/2010 8:59 AM, Gerrard Geldenhuis wrote: I am trying to decrypt SSL traffic capture with tcpdump in wireshark. A quick google turned up a page that said the NSS utils does not allow you to expose your private key. Is there different way or howto that anyone can share to help decrypt

Re: [389-users] Decrypting SSL for 389-ds

2010-11-12 Thread Gerrard Geldenhuis
but it is hidden from me. Regards From: 389-users-boun...@lists.fedoraproject.org [mailto:389-users-boun...@lists.fedoraproject.org] On Behalf Of David Boreham Sent: 12 November 2010 16:04 To: General discussion list for the 389 Directory server project. Subject: Re: [389-users] Decrypting SSL for 389

Re: [389-users] Decrypting SSL for 389-ds

2010-11-12 Thread Rich Megginson
Gerrard Geldenhuis wrote: Hi I am trying to decrypt SSL traffic capture with tcpdump in wireshark. A quick google turned up a page that said the NSS utils does not allow you to expose your private key. Is there different way or howto that anyone can share to help decrypt SSL encrypted

Re: [389-users] Decrypting SSL for 389-ds

2010-11-12 Thread Rich Megginson
...@lists.fedoraproject.org] *On Behalf Of *David Boreham *Sent:* 12 November 2010 16:04 *To:* General discussion list for the 389 Directory server project. *Subject:* Re: [389-users] Decrypting SSL for 389-ds On 11/12/2010 8:59 AM, Gerrard Geldenhuis wrote: I am trying to decrypt SSL traffic capture

Re: [389-users] Decrypting SSL for 389-ds

2010-11-12 Thread David Boreham
On 11/12/2010 9:21 AM, Gerrard Geldenhuis wrote: I created a new certificate datase with certutil, and I can view the private key fingerprints with certutil -d . -K but I can't actually extract the private key from the certutil database. I can create a certificate sign request using certutil