Bug ID |
9018
|
Summary |
SSH: dissect key exchange-specific messages properly
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
SVN
|
Hardware |
All
|
OS |
All
|
Status |
UNCONFIRMED
|
Severity |
Major
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Build Information:
--
This patch enables Wireshark to correctly decode messages specific to the
selected key exchange method by determining and remembering that method. It's a
little incomplete in that it doesn't support the case where
first_kex_packet_follows is true, but then the current implementation doesn't
either.
It also adds/fixes dissection for the plain Diffie-Hellman key exchange and DH
group exchange messages that were broken/missing, completing support for both
of these key exchange methods.
You are receiving this mail because:
- You are watching all bug changes.