http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1119
Summary: SSL dissector not decrypting SSLv3 and TLS 1.0 traffic
(only tested in win32)
Product: Wireshark
Version: 0.99.4
Platform: PC
OS/Version: Windows XP
Status: NEW
Severity: Major
Priority: High
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: phantal@xxxxxxxxx
-=Description=-
First off, I'm unsure of your requirements for priorities, so I've set to
high with the expectation that someone else will change it later as with
testing at my company. I've chosen major instead of blocker because there's a
workaround [for my purposes], however where I work I'd likely have chosen
blocker because it blocks testing/development of dissectors that rely on the
SSL dissector when testing the dissector(s) for SSLv3.
-=Steps to reproduce=-
1) Set program/browser to use SSlv3
2) Set appropriate SSL settings with private key, etc.
3) Begin capturing
4) Login to the server on the appropriate port
5) Stop capturing
6) Examine the capture: no 'http' items are in the capture list
..note: This could be a microsoft thing. I've only tested/reproduced this in a
win32 environment, not in any *nix environments.
7) Set browser/program to use SSlv2 (disable SSLv3 entirely)
8) Repeat steps 3-5
9) 'http' items now appear in the summary list.
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.