Wireshark-users: [Wireshark-users] 256 pre master encrypted key
Date: Thu, 11 Mar 2010 04:42:18 -0500
Hi all,

I am trying to test the security of the connections to our IBM databases.
we're using IBM personal communications (it's basically a telnet
application but with SSL/TLS security) I have the RSA keys but I would
like to know why wireshark can't decrypt the packets from server/client.

Here is a dump from the debug file :


-------------------- START OF DEBUG ----------------------
 ssl_init keys string:
10.10.1.3,7623,http,c:\a.pem
ssl_init found host entry 10.10.1.3,7623,http,c:\a.pem
ssl_init addr '10.10.1.3' port '7623' filename 'c:\a.pem' password(only
for p12 file) '(null)'
Private key imported: KeyID
13:D5:98:72:CB:1D:08:4F:CC:75:56:34:66:16:55:F6:...
ssl_init private key file c:\a.pem successfully loaded
association_add TCP port 7623 protocol http handle 02DD5080

dissect_ssl enter frame #631 (first time)
ssl_session_init: initializing ptr 04DE8F48 size 564
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
dissect_ssl server 10.10.1.3:7623
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 3

dissect_ssl enter frame #632 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 9

dissect_ssl enter frame #633 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 6

dissect_ssl enter frame #634 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 45
client random len: 16 padded to 32

dissect_ssl enter frame #635 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 1085
dissect_ssl3_record found version 0x0301 -> state 0x11
dissect_ssl3_record: content_type 22
decrypt_ssl3_record: app_data len 1080 ssl, state 0x11
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 2 offset 5 length 70 bytes,
remaining 1085
dissect_ssl3_hnd_hello_common found SERVER RANDOM -> state 0x13
dissect_ssl3_hnd_srv_hello found CIPHER 0x0035 -> state 0x17
dissect_ssl3_hnd_srv_hello trying to generate keys
ssl_generate_keyring_material not enough data to generate key (0x17
required 0x37 or 0x57)
dissect_ssl3_hnd_srv_hello can't generate keyring material
dissect_ssl3_handshake iteration 0 type 11 offset 79 length 998 bytes,
remaining 1085
dissect_ssl3_handshake iteration 0 type 14 offset 1081 length 0 bytes,
remaining 1085

dissect_ssl enter frame #636 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 267
dissect_ssl3_record: content_type 22
decrypt_ssl3_record: app_data len 262 ssl, state 0x17
association_find: TCP port 1205 found 00000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 16 offset 5 length 258 bytes,
remaining 267
pre master encrypted[256]:
75 e9 43 92 6a 1d 83 ca d3 a2 a7 ee e0 e6 05 8d
4d 43 c6 0f 17 c2 0d d5 10 e3 73 f1 30 86 55 b1
a3 7a a9 c5 22 67 7f 62 49 ca 96 8a 39 54 6a f5
1a 24 7a 85 ae 45 1f 68 2d a9 fb 90 35 8d 97 12
b5 61 e4 30 30 46 7d e6 7b bc 83 75 ff 63 6d 8a
88 be 67 d9 ba 27 24 bf 4e ec bc 66 3e 19 37 4a
59 2f ff 16 c2 1c 35 25 cc c0 b4 c8 83 e8 ae 07
7b ba f0 47 eb ce 3b de fd cf 61 85 94 3a 7d da
e1 b1 cb 90 10 fc 7f 93 f6 20 95 3d f4 91 68 c7
ac 47 3e 7c a5 37 be 17 8b 8e 29 15 04 22 97 75
4e 4c 79 63 16 07 ed cc e2 ea 44 21 c3 24 cd fd
3b 54 bb 93 d9 8c a9 d1 15 e2 fc ec 81 0b fb 63
51 86 8c d8 8b 7e 76 87 17 ca d8 72 d6 4b b3 20
b7 d4 b6 95 9e 54 d5 ae 52 b7 f8 03 c5 73 21 1c
57 e9 60 5b c9 96 09 7e d2 ba d7 63 47 a6 21 c9
54 ac 3f 9a 64 2f cc ab f3 7a dc 2c d4 b1 9d 69
ssl_decrypt_pre_master_secret:RSA_private_decrypt
pcry_private_decrypt: stripping 0 bytes, decr_len zd
decrypted_unstrip_pre_master[128]:
7d 8f 28 07 f0 fc 72 4e f3 db cb bc 6f 5d 08 73
f6 d0 07 1e e6 31 05 6c d6 70 19 38 7d 6c 68 5d
4d 74 36 fd 43 32 bb b3 92 b0 d1 15 33 b4 98 d0
ef 7c 0d fc 68 8f b9 c3 b9 9f cf 40 0b 0a d7 45
8e 09 67 38 55 22 f2 a8 38 e2 f3 99 46 7b 73 8f
6e 94 78 10 97 c3 dc 14 2c 5f 3a 3a 13 12 1d 4e
57 6e b8 bd a4 ab 4e f4 a2 45 94 b9 d8 39 f4 8d
1b 70 72 56 8a d7 91 0f e7 99 2e 7e 1c 93 26 a2
ssl_decrypt_pre_master_secret wrong pre_master_secret length (128,
expected 48)
dissect_ssl3_handshake can't decrypt pre master secret

dissect_ssl enter frame #644 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 59
dissect_ssl3_record: content_type 20
dissect_ssl3_change_cipher_spec
association_find: TCP port 1205 found 00000000
packet_from_server: is from server - FALSE
ssl_change_cipher CLIENT
  record: offset = 6, reported_length_remaining = 53
dissect_ssl3_record: content_type 22
decrypt_ssl3_record: app_data len 48 ssl, state 0x17
association_find: TCP port 1205 found 00000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 136 offset 11 length 15047880
bytes, remaining 59

dissect_ssl enter frame #646 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 6
dissect_ssl3_record: content_type 20
dissect_ssl3_change_cipher_spec
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
ssl_change_cipher SERVER

dissect_ssl enter frame #647 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 53
dissect_ssl3_record: content_type 22
decrypt_ssl3_record: app_data len 48 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 247 offset 5 length 5754387 bytes,
remaining 53

dissect_ssl enter frame #649 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 32 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #666 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 32 ssl, state 0x17
association_find: TCP port 1205 found 00000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 1205 found 00000000
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #667 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 32 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #668 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 53
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 48 ssl, state 0x17
association_find: TCP port 1205 found 00000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 1205 found 00000000
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #669 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 69
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 64 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #670 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 32 ssl, state 0x17
association_find: TCP port 1205 found 00000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 1205 found 00000000
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #671 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 32 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #676 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 282
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 64 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 7623 found 04002E80
  record: offset = 69, reported_length_remaining = 213
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 208 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #1069 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 53
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 48 ssl, state 0x17
association_find: TCP port 1205 found 00000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 1205 found 00000000
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #1070 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 101
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 96 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #1086 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 159
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 32 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 7623 found 04002E80
  record: offset = 37, reported_length_remaining = 122
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 80 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 7623 found 04002E80
  record: offset = 122, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 32 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #1114 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 32 ssl, state 0x17
association_find: TCP port 1205 found 00000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 1205 found 00000000
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #1116 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 85
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 80 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #1120 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 32 ssl, state 0x17
association_find: TCP port 1205 found 00000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 1205 found 00000000
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #1122 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 32 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #1124 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 32 ssl, state 0x17
association_find: TCP port 1205 found 00000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 1205 found 00000000
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #1278 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 53
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 48 ssl, state 0x17
association_find: TCP port 1205 found 00000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 1205 found 00000000
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #1279 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 1061
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 1056 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #1288 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 117
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 112 ssl, state 0x17
association_find: TCP port 7623 found 04002E80
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 7623 found 04002E80

dissect_ssl enter frame #1294 (first time)
  conversation = 04DE8C70, ssl_session = 04DE8F48
  record: offset = 0, reported_length_remaining = 37
dissect_ssl3_record: content_type 23
decrypt_ssl3_record: app_data len 32 ssl, state 0x17
association_find: TCP port 1205 found 00000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
association_find: TCP port 1205 found 00000000
association_find: TCP port 7623 found 04002E80
-------------- END OF DEBUG -----------------------------

if you notice the pre master of the server's if of 256 bit key and
wireshark is 128 bit.

IS MY PRIVATE KEY WRONG ??!!

Thanks,
MO