

For this we use this OpenSSL command from the command line: The second is to actually start the SSL server that will receive the connection. Simply change the macro SSL_SERVER_NAME to the proper IP address, and rebuild the application. The first is to add the IP address of your SSL server to the example. You can find this example in \examples\SSL\sslclient.įor this example, you’ll need to do two things in addition to the system changes above. It very simple, and shows how the NetBurner device can connect to an SSL server. Example Code Changesįor the purpose of this article, we’ll be using our 3.x tools and will do our testing with the SSL client example.

If you’re using our NNDK 2.x tools, you’ll need to rebuild the system libraries separately before building the application. If you’re using our latest tools, either with NBEclipse or via the command line, everything is taken care of when you rebuild the project itself, as all of the system libraries are included as a part of this process. Now, choose any SSL/TLS example, or if you’re already working on your application, rebuild the system libraries and the project. Without this secret key, neither side can decrypt any messages that are encrypted by the other side. In every secure SSL/TLS connection, information sent back and forth between the client and server is encrypted using a secret key (also called a premaster secret) that is generated by the client during the TLS handshake. We won’t dive too far into the TLS handshake in this article, but having a basic understanding of how it works will help explain what we need to do in Wireshark. Finally, we’ll show what it looks like in action. Then we’ll look at how to get that information from the NetBurner device. First, we discuss what information needs to be set in Wireshark and demonstrate how to do it. In this article, we’ll cover the steps you have to go through to get to this goldmine of debugging goodness. Given the proper information, Wireshark can decode this information for you and let you see exactly what’s being sent over the wire. Unfortunately, that doesn’t help you as you’re staring at the mix of unfamiliar garbage sitting in front of your face.įortunately, there is hope. Maybe you know what it’s supposed to say.

Trying to debug issues over an encrypted connection with Wireshark is a lot like trying to edit an article in a language you don’t know. Most of this looks great, until you actually look at the data, and are greeted with, “Encrypted Application Data: ”.
