On 30/06/2024 03:45, Jeffrey Walton wrote:
On Sat, Jun 29, 2024 at 4:13 PM Lee wrote:

[...] Debian firefox does NOT allow one to do
TLS intercept - ie. this does not work:
C:\UTIL>cat firefox-tlsdecode.bat
set SSLKEYLOGFILE=C:\Users\Lee\AppData\Local\Temp\FF-SSLkeys.txt
start C:\"Program Files\Firefox\Firefox.exe"
[...]
I'm not sure who your complaint is against -- Debian, Firefox or
Linux. I'm also not sure that it is a valid complaint.

I do not mind to see a link stating that the appropriate logger is really disabled. Certainly dumping of TLS session keys may be disabled through a compile time flag similar to enforcing signatures for add-ons. It may be default Firefox configuration for release builds or some line in Debian build rules. It still might be some mistake during attempts to enable the logger. I have read about this approach but I have never tried it in action.

Firefox uses its own certificate store.

It is relevant to active traffic interception you described (a proxy). Lee prefers passive traffic sniffing and it requires cooperation from a peer to get session keys. Each case has its own advantages.

P.S.

At first it was not clear to me that having TLS private key (copied from the server) is not enough for passive traffic decryption. Diffie-Hellman key exchange scheme allows to generate secret keys even over public channel. The main purpose of TLS certificates (public keys in the browser or system store) is to confirm that there is no attacker in between that blocks packets from the client and establishes its own connection to the server. Encryption of email messages using a public key is a different case. Session keys are required to debug TLS applications.

Reply via email to