[SR-Users] TLS and SIP

Frank Carmickle frank at carmickle.com
Fri May 23 15:42:08 CEST 2014

On May 22, 2014, at 6:46 PM, James Cloos <cloos+openser-users at jhcloos.com> wrote:
> If you record the full packet trace, wireshark can use your privkey.pem
> to decode the tls handshake, recover the session key, and use that to
> decode the payload packets.
> Cf http://wiki.wireshark.org/SSL for details.

This is true if you are not using an ephemeral Diffie Hellman cypher suite.


More information about the sr-users mailing list