Debugging TLS connections with Wireshark?

I logged some traffic between my own client and server last night with
Wireshark. Obviously the data is encrypted, but I was surprised to not be
able to decrypt the data even when I have the private key for the server
(it would work for some TLS 1.2 setup, apparently). Fortunately I found the
bug hindering my progress just by looking at the code. Eventually.

Does anyone know how to log TLS session keys and later use them to decrypt
the logged traffic? Does some client perhaps already support this?

I'm pretty sure I'll need this at some point.

-Hannu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.orbitalfox.eu/archives/gemini/attachments/20200710/cb66
7d30/attachment.htm>

---

Next in thread (2 of 4): 🗣️ Johannes von Rotz (jr (a) vrtz.ch)

View entire thread.