Wireshark-users: Re: [Wireshark-users] export the private key on Windows?
From: "Jeffrey Ross" <[email protected]>
Date: Mon, 9 Apr 2007 13:52:21 -0400 (EDT)
> On Mon, Apr 09, 2007 at 01:00:32PM -0400, Mark Roggenkamp wrote:
>> Also, if the https session isn't using client auth then you probably
>> only
>> need the private key of the WebSeal host.
> Even if the https-connection IS using a client-certificate, the private
> key of the client-certificate is only used for authentication and is not
> taking part in the encryption of the session. Only the private key of
> the server-certificate is used to generate the session-keys :)
> Cheers,
> Sake

ok, then I'm missing something or doing something wrong.  The key that was
given to me was in PKCS#12 format and I was provided the password for the
key.  I then used openssh to convert the key to RSA with the following
command (on a linux system - FC6):

openssl pkcs12 -in ./privatekey.p12 -out outkey.pem -nodes -nocerts

I was asked for the key password and entered it:
Enter Import Password: <password entered>
MAC verified OK

I removed the data before the line that started "BEGIN RSA PRIVATE KEY"
and used the line in wireshark:,443,http,d:\capture\outkey.pem

Where is the IP address of the server that I have the private key

So either I'm still doing something wrong or the administrator has
provided me with the incorrect key, possible but not likely.

Any help would be appreciated...