[Users] Using ssldump to decrypt SIP TLS messages

Klaus Darilion klaus.mailinglists at pernau.at
Tue Nov 21 10:59:57 CET 2006


Hi Christophe!

I tried this once but also had no luck. If I want to sniff TLS 
connections I use the NULL cipher - of course this only works for testing.

tls_ciphers_list="NULL"

regards
klaus


Christophe Irles wrote:
> Hi,
> 
> 	I try to use ssldump in order to decrypt SIP TLS messages but
> without any success for the moment .
> 
> 	TLS configuration in my "openser.cfg" is as follow:
> 		disable_tls = 0
> 		tls_method = TLSv1
> 		tls_certificate = "/etc/openser/user-cert.pem"
> 		tls_private_key = "/etc/openser/user-privkey.pem"
> 
> 	I'm using ssldump with these options:
> 		ssldump -Adx -k /etc/openser/user-privkey.pem -i eth0 port
> 5061
> 
> 	But application data (cf. attached file) are always encrypted . 
> 	What i'm doing wrong ? I tryed to use the certificate used by the
> client device too with the same result ...
> 
> Thanks,
> Christophe
> 
>  
> 
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> Users mailing list
> Users at openser.org
> http://openser.org/cgi-bin/mailman/listinfo/users


-- 
Klaus Darilion
nic.at





More information about the sr-users mailing list