Skip to content

Capturing TLS1.2 traffic with SSLproxy #7

@ViAl

Description

@ViAl

Hello.
I want to analyze android application traffic between client and server. It uses tcp keep-alive connection and tls1.2.
I generated a CA private key ca.key and certificate ca.crt using OpenSSL as described in sslproxy man page.
After that i installed ca.crt in device trusted certs list.
After that i wrote simple echo-server on java, which listens for incoming connections, and returns all data received back to sender, and runned this server on 0.0.0.0:8889
I redirected all traffic from application to sslproxy, runned with following parameters: ./sslproxy ssl 137.74.74.74 8888 up:8889 -k ca.key -c ca.crt -l connect.log -D

But when client trying to connect to server through sslproxy, it fails, and i see this message in sslproxy log:

Peeking did not yield a (truncated) ClientHello message, aborting connection
Peeking did not yield a (truncated) ClientHello message, aborting connection
Peeking did not yield a (truncated) ClientHello message, aborting connection
Peeking did not yield a (truncated) ClientHello message, aborting connection
Peeking did not yield a (truncated) ClientHello message, aborting connection

Am i doing something wrong? Could i analyze my application ssl traffic with SSLproxy?

Here is SSLproxy full output with -D flag: https://pastebin.com/RsERKBLe

Metadata

Metadata

Assignees

No one assigned

    Labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions