philippe lhardy
changed
bug 7776
Comment # 6
on bug 7776
from philippe lhardy
I hit a similar problem under Fedora 16
wireshark 1.6.10
[Running on Linux 3.6.7-4.fc16.x86_64, with libpcap version 1.1.1, with libz
1.2.5, GnuTLS 2.12.14, Gcrypt 1.5.0, without AirPcap.]
When my Certificate Request tls record goes above 10K ( due to a list of many
ca with big ca name legnth average 400 ), then traffic stop to be deciphered
starting from that Certificate Request.
I can provide pcpap and private keys... should i fill a new bug or pollute this
one ?
You are receiving this mail because:
- You are watching all bug changes.