https://bugzilla.mozilla.org/show_bug.cgi?id=1183318 is a thing. If this is related to a communication from Firefox, SSLKEYLOGFILE doesn't work.
Memory dumps can be created by malware. Packet captures can be created by anyone who has access to what should have been (but which have been in practice incredibly poorly-controlled) law-enforcement-limited taps in intermediate routers. Before giving any kind of assistance, I'd really want to know the provenance of the machine in question, the employment and role (and legal authority) of the investigator, suspicions as to the nature of the information they expect to find therein, and reasons why violating the sanctity of the communication might possibly be desirable. Of course, I expect that other people don't have the same kinds of ethical qualms that I do. -Kyle H On 2017-02-01 11:54, Maxim Rise wrote: > I know about SSLKEYLOGFILE environment path, but I can't use it. I extracted > master secret from a memory dump and I need to unwrap it in order to use it > to decrypt the wireshark ssl communication. -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto