Wireshark-bugs: [Wireshark-bugs] [Bug 11642] couldn't decrypt the outter-EAP TLS connection in R
Alexis La Goutte
changed
bug 11642
What |
Removed |
Added |
Status |
INCOMPLETE
|
RESOLVED
|
Resolution |
---
|
NOTABUG
|
Comment # 4
on bug 11642
from Alexis La Goutte
After try with last git branch (it is recommended..
http://security.stackexchange.com/questions/70981/decoding-tunnel-bytes-in-eap-tls-or-eap-ttls-using-wireshark
) and enable SSL debug
[...]
dissect_ssl enter frame #35 (first time)
packet_from_server: is from server - TRUE
conversation = 0x1201bd8e0, ssl_session = 0x1201bdcf0
record: offset = 0, reported_length_remaining = 3216
dissect_ssl3_record found version 0x0301(TLS 1.0) -> state 0x11
dissect_ssl3_record: content_type 22 Handshake
Calculating hash with offset 5 49
decrypt_ssl3_record: app_data len 49, ssl state 0x11
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 2 offset 5 length 45 bytes, remaining
54
ssl_dissect_hnd_hello_common found SERVER RANDOM -> state 0x13
ssl_dissect_hnd_srv_hello found CIPHER 0x0039 -> state 0x17
[...]
Wireshark can't decrypt because SSL handshake use DH (
https://ask.wireshark.org/questions/7886/ssl-decrypting-problem )
Peter, you confirm ?
You are receiving this mail because:
- You are watching all bug changes.