
You may want to check these settings are in place after the reboot. Note: You must have write-access to the location you enter here. You can click on the Browse Directory or Browse File buttons to navigate to the place you wish.įor example: C:\Users\user1\Desktop\sslkeylog.txt
For the Variable name, enter the following name: "SSLKEYLOGFILE" (everything between the quotes)įor Variable value, enter the full path name for the SSL log file. In the Environmental Variables pop-up window, under User variables for, select "New". Click on the "Environment variables." button. Type "env" to Open environment variables. Click on the Windows icon at the bottom left corner of your screen. Close any/all Firefox and Chrome browsers. To log the SSL session keys on a Windows client, we have to set the SSLKEYLOGFILE. Keep in mind, this is using the client side, not the server side. Part 1 is to set up the operating system, and Part 2 is to configure Wireshark.įirst, let's start with the Windows process of logging the SSL session keys. So I thought what I would do is document the process here for all three operating systems.
You have probably watched my YouTube video on this for Windows, but I often get asked how is it done on MAC or on Linux. Our Udemy course on Wireless Packet capture Our custom profiles repository for Wireshark
This is even more important today as the network is evolving to QUIC where everything is encrypted.Ĭheck out these great references as well: Hi everyone! Being able to decrypt the encrypted contents of packet captures is very important if you want to troubleshoot anything above Layer 4. 5 of 5 - 8 votes Thank you for rating this article.