I can restrict the server to certain suites but other than trial and error, is there a way I can tell which are supported in my 1.0.2 installation? I assume the code you pointed is the current development version. Can I see the 1.0.2 version?
Thanks for your help.
--- On Mon, 8/18/08, Jaap Keuter <jaap.keuter@xxxxxxxxx> wrote:
From: Jaap Keuter <jaap.keuter@xxxxxxxxx> Subject: Re: [Wireshark-users] Decoding SSL - what cipher suites are supported? To: ixxusnexxus@xxxxxxxxx, "Community support list for Wireshark" <wireshark-users@xxxxxxxxxxxxx> Date: Monday, August 18, 2008, 10:39 PM
Hi,
That one was only recently added to the development version of wireshark.
{51,KEX_DH,
SIG_RSA,ENC_AES,16,128,128,DIG_SHA,20,0, SSL_CIPHER_MODE_CBC},
You can find an overview of what Wireshark knows in http://anonsvn.wireshark.org/wireshark/trunk-1.0/epan/dissectors/packet-ssl-utils.c
Thanx, Jaap
ixxus nexxus wrote: > I am trying to decode some ssl traffic. I have set the private key in > wireshark but I am still not able to decrypt and view the data. I see > this error in the log: > > dissect_ssl3_hnd_srv_hello can't find cipher suite 0x33 > > If this one is not supported, where can I get a list of supported > suites? I am using 1.0.2 on windows. > > Thank you for your help. > > > > Here are the details of the log: > > ssl_init keys string: > xxx.xxx.xxx.xxx,http,P:\temp\key.pem > ssl_init found host entry xxx.xxx.xxx.xxx,443,http,P:\temp\key.pem > ssl_init addr 'xxx.xxx.xxx.xxx' port
'443' filename 'P:\temp\key.pem' > password(only for p12 file) '(null)' > ssl_init private key file P:\temp\key.pem successfully loaded > association_add TCP port 443 protocol http handle 02F5E458 > association_find: TCP port 993 found 03D6A070 > ssl_association_remove removing TCP 993 - imap handle 02E58B00 > association_add TCP port 993 protocol imap handle 02E58B00 > association_find: TCP port 995 found 03D6A0B0 > ssl_association_remove removing TCP 995 - pop handle 03AB16F8 > association_add TCP port 995 protocol pop handle 03AB16F8 > > dissect_ssl enter frame #6 (first time) > ssl_session_init: initializing ptr 050B1E70 size 564 > association_find: TCP port 3910 found 00000000 > packet_from_server: is from server - FALSE > dissect_ssl server xxx.xxx.xxx.xxx:443 > conversation = 050B1C98, ssl_session = 050B1E70 > dissect_ssl3_record:
content_type 22 > decrypt_ssl3_record: app_data len 138 ssl, state 0x00 > association_find: TCP port 3910 found 00000000 > packet_from_server: is from server - FALSE > decrypt_ssl3_record: using client decoder > decrypt_ssl3_record: no decoder available > dissect_ssl3_handshake iteration 1 type 1 offset 5 length 134 bytes, > remaining 143 > dissect_ssl3_hnd_hello_common found CLIENT RANDOM -> state 0x01 > > dissect_ssl enter frame #8 (first time) > conversation = 050B1C98, ssl_session = 050B1E70 > dissect_ssl3_record found version 0x0301 -> state 0x11 > dissect_ssl3_record: content_type 22 > decrypt_ssl3_record: app_data len 1113 ssl, state 0x11 > association_find: TCP port 443 found 03F5B3D0 > packet_from_server: is from server - TRUE > decrypt_ssl3_record: using server decoder > decrypt_ssl3_record: no decoder available >
dissect_ssl3_handshake iteration 1 type 2 offset 5 length 70 bytes, > remaining 1118 > dissect_ssl3_hnd_hello_common found SERVER RANDOM -> state 0x13 > dissect_ssl3_hnd_srv_hello can't find cipher suite 0x33 > dissect_ssl3_handshake iteration 0 type 11 offset 79 length 603 bytes, > remaining 1118 > dissect_ssl3_handshake iteration 0 type 12 offset 686 length 424 bytes, > remaining 1118 > dissect_ssl3_handshake iteration 0 type 14 offset 1114 length 0 bytes, > remaining 1118 > > dissect_ssl enter frame #10 (first time) > conversation = 050B1C98, ssl_session = 050B1E70 > dissect_ssl3_record: content_type 22 > decrypt_ssl3_record: app_data len 102 ssl, state 0x13 > association_find: TCP port 3910 found 00000000 > packet_from_server: is from server - FALSE > decrypt_ssl3_record: using client decoder > decrypt_ssl3_record: no decoder
available > dissect_ssl3_handshake iteration 1 type 16 offset 5 length 98 bytes, > remaining 107 > dissect_ssl3_handshake found SSL_HND_CLIENT_KEY_EXCHG state 0x13 > dissect_ssl3_handshake not enough data to generate key (required 0x17) > dissect_ssl3_record: content_type 20 > dissect_ssl3_change_cipher_spec > association_find: TCP port 3910 found 00000000 > packet_from_server: is from server - FALSE > ssl_change_cipher CLIENT > dissect_ssl3_record: content_type 22 > decrypt_ssl3_record: app_data len 48 ssl, state 0x13 > association_find: TCP port 3910 found 00000000 > packet_from_server: is from server - FALSE > decrypt_ssl3_record: using client decoder > decrypt_ssl3_record: no decoder available > dissect_ssl3_handshake iteration 1 type 94 offset 118 length 7042118 > bytes, remaining 166 > > > >
------------------------------------------------------------------------ > > _______________________________________________ > Wireshark-users mailing list > Wireshark-users@xxxxxxxxxxxxx > https://wireshark.org/mailman/listinfo/wireshark-users
|