Is it possible to extract the TLS session keys from Lighttpd so we are able to decrypt traffic captured by tcpdump?
Alternatively, we could disable PFS but we prefer not to do that.
Is it possible to extract the TLS session keys from Lighttpd so we are able to decrypt traffic captured by tcpdump?
Alternatively, we could disable PFS but we prefer not to do that.
you can find private key in the file referenced by entry ssl.pemfile in the file /etc/lighttpd/lighttpd.conf
The key is at the beginning before the certificate.
decrypt question was already answered here:
how-to-decrypt-ssl-traffic-with-a-packet-sniffer-when-i-have-the-private-key
Lighttpd does not support this out-of-the box.
Stefan, a developer of lighttpd, suggested checking out the following answer:
Extract pre-master keys from an openssl application