I was working on a project for my server and wanted to know if there was a way to find the generated password for the SSL certificate? From what I was able to find, it used to be a hashed string of “plex” and the ProcessedMachineIdentifier, but it looks like that changed sometime after 2020. Does anyone know what the new password structure is?
You don’t decrypt the Plex P12 cert.
All certificates are Let’s Encrypt certificates generated by Plex.tv
for the plex.direct domain.
I’m trying to get this older project to work, which requires being able to use the SSL keys. So for that, I do need to decrypt the p12 certificate.
I don’t know if you’ll be able to use it without a major overhaul.
Since when that was written (4 years ago), the endpoints have changed because the agents underneath (behind the endpoint) have completely changed from python to C++
I understand. That’s part of what I’m working on. In order to get it working either way I will still need the password to the SSL certificate so I can properly proxy the requests.
Have you considered adding your own certificate to PMS and then accessing that way?
Yes I have. But my question was about the password to the existing SSL certificate, to avoid the hassle of doing that and auto-renewing the certificate and all of that.
The answer remains no. You cannot ‘decompile’ the P12 cert.
If you were able to, you’d break the whole SSL system.
In earlier forum posts, plex team members gave this information out, so I assumed this was still something I could ask for. The password being obscured doesn’t “break the SSL system” if it’s just generated and stored somewhere locally on the system.
If you’ve seen it in earlier posts, I will refer you to those posts.
It is current policy to not divulge how certain things work.
We are here to support, that’s true.
There are, however, limits to what we will divulge in an open forum to an arbitrary inquiry
This information is one such request I cannot honor.