unable to decrypt ssl with server private key
Hi, I have generated the private key according to https://aboutssl.org/how-to-create-an... then I use the generated privandpub.key as key file in RSA key lists. However my application data is still encrypted. Below is my ssldebug log. Could someone please guide me through this? Thanks in advance.
Wireshark SSL debug log
Wireshark version: 2.4.6 (v2.4.6-0-ge2f395aa12)
GnuTLS version: 3.4.11
Libgcrypt version: 1.7.6
KeyID[20]:
| 92 40 4a 81 c7 01 8d 55 d6 e4 30 aa 38 7f 6a e4 |[email protected].|
| 38 49 53 7e |8IS~ |
ssl_load_key: swapping p and q parameters and recomputing u
ssl_init private key file D:/vbshare/priv_and_pub.key successfully loaded.
ssl_init port '2225' filename 'D:/vbshare/priv_and_pub.key' password(only for p12 file) ''
association_add ssl.port port 2225 handle 000001F79C737100
dissect_ssl enter frame #14 (first time)
packet_from_server: is from server - FALSE
conversation = 000001F7A3638AF0, ssl_session = 000001F7A3639560
record: offset = 0, reported_length_remaining = 517
dissect_ssl3_record: content_type 22 Handshake
decrypt_ssl3_record: app_data len 512, ssl state 0x00
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 1 offset 5 length 508 bytes, remaining 517
Calculating hash with offset 5 512
ssl_dissect_hnd_hello_common found CLIENT RANDOM -> state 0x01
dissect_ssl enter frame #15 (first time)
packet_from_server: is from server - TRUE
conversation = 000001F7A3638AF0, ssl_session = 000001F7A3639560
record: offset = 0, reported_length_remaining = 1349
ssl_try_set_version found version 0x0303 -> state 0x91
dissect_ssl3_record: content_type 22 Handshake
decrypt_ssl3_record: app_data len 61, ssl state 0x91
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 2 offset 5 length 57 bytes, remaining 66
ssl_try_set_version found version 0x0303 -> state 0x91
Calculating hash with offset 5 61
ssl_dissect_hnd_hello_common found SERVER RANDOM -> state 0x93
ssl_set_cipher found CIPHER 0xC02F TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 -> state 0x97
ssl_load_keyfile dtls/ssl.keylog_file is not configured!
tls13_change_key TLS version 0x303 is not 1.3
tls13_change_key TLS version 0x303 is not 1.3
record: offset = 66, reported_length_remaining = 1283
dissect_ssl3_record: content_type 22 Handshake
decrypt_ssl3_record: app_data len 931, ssl state 0x97
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 11 offset 71 length 927 bytes, remaining 1002
Calculating hash with offset 71 931
lookup(KeyID)[20]:
| 92 40 4a 81 c7 01 8d 55 d6 e4 30 aa 38 7f 6a e4 |[email protected].|
| 38 49 53 7e |8IS~ |
ssl_find_private_key_by_pubkey: lookup result: 000001F79CB37B40
record: offset = 1002, reported_length_remaining = 347
dissect_ssl3_record: content_type 22 Handshake
decrypt_ssl3_record: app_data len 333, ssl state 0x97
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 12 offset 1007 length 329 bytes, remaining 1340
Calculating hash with offset 1007 333
record: offset = 1340, reported_length_remaining = 9
dissect_ssl3_record: content_type 22 Handshake
decrypt_ssl3_record: app_data len 4, ssl state 0x97
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 14 offset 1345 length 0 bytes, remaining 1349
Calculating hash with offset 1345 4
dissect_ssl enter frame ...