Hi everyone,
Do you plan to support HTTPS sniffing, as wireshark does ?
Thanks,
Vincent.
Hi everyone,
Do you plan to support HTTPS sniffing, as wireshark does ?
Thanks,
Vincent.
No plans at the moment, but we've only defined our own roadmap just for the very near future.
Most key exchange algorithms used in TLS 1.2 are nowadays based on Diffie Hellman and make it 'impossible' to decode HTTPS traffic for a sniffer. It would need to have access to the master keys for the specific session, only the server private key is not sufficient.
Hence implementing TLS decoding in packetbeat is probably a dead end street. If you have some kind of HTTPS termination point in your infra (e.g. a load balancer or proxy) you can could try to capture behind the proxy.
It was purely for internal use, to analyse services using inter-regions communications on AWS which use HTTPS using self signed TLS certificates, ex: logstash-forwarder
© 2020. All Rights Reserved - Elasticsearch
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant logo are trademarks of the Apache Software Foundation in the United States and/or other countries.