Wireshark-bugs: [Wireshark-bugs] [Bug 3303] Problem with fragmentation at the SSL record layer
Date: Mon, 23 Jun 2014 11:17:35 +0000

Comment # 24 on bug 3303 from
Created attachment 12844 [details]
Two crafted Server Hello messages, one fragmented, one not fragmented

In this capture, the first connection has fragmented records, the second is not
fragmented.

Generated with this script (pipe through `xxd -ps -r` to get bytes for netcat):

#!/usr/bin/env python
import struct
from sys import argv

# Maximum record length or 11 if not given
recordLen = int(argv[1]) if len(argv) > 1 else 11

# Handshake (type, ver, len)
def hnd(data):
    sz = len(data)
    print('16 03 01  {0:02x} {1:02x}  {2}'
        .format(sz >> 8, sz & 0xFF, ' '.join(data)))

# Hello
data = ''
data += ' 00 2d' # Handshake length
data += ' 03 01' # TLS 1.0
data += '''
52 34 c6 6d 86 8d e8 40 97 da
ee 7e 21 c4 1d 2e 9f e9 60 5f 05 b0 ce af 7e b7
95 8c 33 42 3f d5 00
'''
data += ' 00 01' # Cipher
data += ' 00' # No compression
data += ' 00 05' # Extensions length
# Heartbeat extension
data += ' 00 0f' # Heartbeat type
data += ' 00 01' # Length
data += ' 01'    # mode

chunks = data.split()
for i in range(0, len(chunks), recordLen):
    hnd(chunks[i:i+recordLen])


You are receiving this mail because:
  • You are the assignee for the bug.
  • You are watching all bug changes.