Decrypting SSL/TLS Traffic with Wireshark and ProxySQL
In this guide, we will walk you through the process of decrypting SSL/TLS traffic to and from ProxySQL using Wireshark. By enabling the SSLKEYLOG feature in ProxySQL and configuring Wireshark to use the SSL key log file, you will be able to view the decrypted traffic for debugging and analysis purposes.
Prerequisites
Before we begin, make sure you have the following:
- ProxySQL installed and running.
- Wireshark installed on your machine.
Enabling SSLKEYLOG in ProxySQL
You can enable the SSLKEYLOG feature in ProxySQL either by modifying the configuration file or via runtime queries.
Enabling SSLKEYLOG via Configuration File
-
Open the ProxySQL configuration file (typically proxysql.cnf) in a text editor.
-
Add or modify the …