<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is it possible to export the private key from the forward-untrust certificate to view in wiresha in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/is-it-possible-to-export-the-private-key-from-the-forward/m-p/183674#M56431</link>
    <description>&lt;P&gt;You can, but there's a large caveat that is more and more common:&lt;/P&gt;&lt;P&gt;You will not be able to decrypt the traffic if a high security cipher (such as DHE or ECC) is used.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That said, if you want to do it and are using a simple RSA cipher, there are a few steps:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Install OpenSSL&lt;/P&gt;&lt;P&gt;2. Export the cert and private key. I recommend PKCS12 because there will be fewer steps to do the conversion. Provide a passphrase with 6 characters minimum. Save it as something (default is something like cert_Forward-Untrust.p12).&lt;/P&gt;&lt;P&gt;3. In OpenSSL, enter the following. It will prompt you for the password from step 2:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;openssl pkcs12 -in cert_Forward-Untrust.p12 -out PrivAndPub.pem -nodes&lt;/PRE&gt;&lt;P&gt;4. Open PrivAndPub.pem in a plain text editor. You'll see a section heading of -----BEGIN PRIVATE KEY-----. Save this until the end as a new file (private.key for example).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can load the private.key file into Wireshark. You won't need a password, because the OpenSSL command outputs it unencrypted.&lt;/P&gt;</description>
    <pubDate>Wed, 25 Oct 2017 17:25:23 GMT</pubDate>
    <dc:creator>gwesson</dc:creator>
    <dc:date>2017-10-25T17:25:23Z</dc:date>
    <item>
      <title>Is it possible to export the private key from the forward-untrust certificate to view in wireshark ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-it-possible-to-export-the-private-key-from-the-forward/m-p/183649#M56428</link>
      <description>&lt;P&gt;I want to check a specific HTTP request that is send to a webserver and which is currently blocked by one of our vulnerability checks to verify if the signature is correct.&lt;/P&gt;&lt;P&gt;But I need to be able to view the decrypted data on the exported capture, therfor I have to import the private key of the forward-untrust certificate into wireshark....&lt;/P&gt;&lt;P&gt;But I have bo success in doing this&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Oct 2017 15:24:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-it-possible-to-export-the-private-key-from-the-forward/m-p/183649#M56428</guid>
      <dc:creator>DaxVC</dc:creator>
      <dc:date>2017-10-25T15:24:46Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possible to export the private key from the forward-untrust certificate to view in wiresha</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-it-possible-to-export-the-private-key-from-the-forward/m-p/183674#M56431</link>
      <description>&lt;P&gt;You can, but there's a large caveat that is more and more common:&lt;/P&gt;&lt;P&gt;You will not be able to decrypt the traffic if a high security cipher (such as DHE or ECC) is used.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That said, if you want to do it and are using a simple RSA cipher, there are a few steps:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Install OpenSSL&lt;/P&gt;&lt;P&gt;2. Export the cert and private key. I recommend PKCS12 because there will be fewer steps to do the conversion. Provide a passphrase with 6 characters minimum. Save it as something (default is something like cert_Forward-Untrust.p12).&lt;/P&gt;&lt;P&gt;3. In OpenSSL, enter the following. It will prompt you for the password from step 2:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;openssl pkcs12 -in cert_Forward-Untrust.p12 -out PrivAndPub.pem -nodes&lt;/PRE&gt;&lt;P&gt;4. Open PrivAndPub.pem in a plain text editor. You'll see a section heading of -----BEGIN PRIVATE KEY-----. Save this until the end as a new file (private.key for example).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can load the private.key file into Wireshark. You won't need a password, because the OpenSSL command outputs it unencrypted.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Oct 2017 17:25:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-it-possible-to-export-the-private-key-from-the-forward/m-p/183674#M56431</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2017-10-25T17:25:23Z</dc:date>
    </item>
  </channel>
</rss>

