
The server’s certificate is issued by root CA or intermediate CA. These root CAs are third parties that are trusted by web browsers. Web browsers store a list of Root CA(Certificate Authority) in themselves. The client (web browser) validates the server’s certificate. The first is its SSL/TLS certificate to the client. Then the server sends a message to the client containing the SSL/TLS version and cipher suite it chose.Īfter the server and client agree on the SSL/TLS version and cipher suite, the server sends two things. The server will see the list of SSL/TLS versions and cipher suites and pick the newest the server is able to use. The client lists the versions of SSL/TLS and cipher suites it’s able to use. Log out and log back in for the changes to take effect.

Once it’s installed, run the following command to add your user account to the wireshark group so that you can capture packets. If you are asked “Should non-superusers be able to capture packets?”, answer Yes.


In this article, I will explain the SSL/TLS handshake with Wireshark. A TLS encrypted connection is established between the web browser (client) with the server through a series of handshakes.
