Wireshark-bugs: [Wireshark-bugs] [Bug 3303] Problem with fragmentation at the SSL record layer
Date: Mon, 26 Oct 2009 15:15:37 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3303


John Masseria <jpmasseria@xxxxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |jpmasseria@xxxxxxxxxxxx




--- Comment #12 from John Masseria <jpmasseria@xxxxxxxxxxxx>  2009-10-26 15:15:34 PDT ---
I think that I might be experiencing this problem also.  I am trying to decrypt
SSL traffic to one of my web servers and the decryption isn't taking place.  

In my SSL debug file I also see the "not enough data to generate key" error. 
See below.  My TLSv1 server hello message is transmitted in three frames.  This
may be because we're using internally signed SSL certificates on this web
server  and the web server is sending its certificate along with the
certificate of the intermediary CA that signed the server certificate.

I may have a different problem.

Thank you,
John

dissect_ssl enter frame #1413 (first time)
  conversation = 081CC828, ssl_session = 081CCB00
  record: offset = 0, reported_length_remaining = 2856
dissect_ssl3_record found version 0x0301 -> state 0x11
dissect_ssl3_record: content_type 22
decrypt_ssl3_record: app_data len 2851 ssl, state 0x11
association_find: TCP port 443 found 06423F08
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 2 offset 5 length 70 bytes, remaining
2856 
dissect_ssl3_hnd_hello_common found SERVER RANDOM -> state 0x13
dissect_ssl3_hnd_srv_hello found CIPHER 0x0004 -> state 0x17
dissect_ssl3_hnd_srv_hello trying to generate keys
ssl_generate_keyring_material not enough data to generate key (0x17 required
0x37 or 0x57)
dissect_ssl3_hnd_srv_hello can't generate keyring material
dissect_ssl3_handshake iteration 0 type 11 offset 79 length 2769 bytes,
remaining 2856 
dissect_ssl3_handshake iteration 0 type 14 offset 2852 length 0 bytes,
remaining 2856 


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.