Bug ID |
11352
|
Summary |
TLS: DHE-PSK is not correctly analyzed
|
Product |
Wireshark
|
Version |
1.12.5
|
Hardware |
x86
|
OS |
Windows 7
|
Status |
UNCONFIRMED
|
Severity |
Normal
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
I capture traffic of a TLS 1.2 connection. In general, this work fine, but I
have problems if the chosen cipher suite uses the DHE-PSK key exchange (as
defined in RFC 4279). Concretely, the ServerKeyExchange and ClientKeyExchange
messages are shown as malformed even though they are correct. It seems to me
that Wireshark is confusing this with another DH-based cipher suite, because it
does not expect any PSK identity or PSK identity hint.
You are receiving this mail because:
- You are watching all bug changes.