| Bug ID |
9018
|
| Summary |
SSH: dissect key exchange-specific messages properly
|
| Classification |
Unclassified
|
| Product |
Wireshark
|
| Version |
SVN
|
| Hardware |
All
|
| OS |
All
|
| Status |
UNCONFIRMED
|
| Severity |
Major
|
| Priority |
Low
|
| Component |
Dissection engine (libwireshark)
|
| Assignee |
[email protected]
|
| Reporter |
[email protected]
|
Build Information:
--
This patch enables Wireshark to correctly decode messages specific to the
selected key exchange method by determining and remembering that method. It's a
little incomplete in that it doesn't support the case where
first_kex_packet_follows is true, but then the current implementation doesn't
either.
It also adds/fixes dissection for the plain Diffie-Hellman key exchange and DH
group exchange messages that were broken/missing, completing support for both
of these key exchange methods.
You are receiving this mail because:
- You are watching all bug changes.