Wireshark-bugs: [Wireshark-bugs] [Bug 11642] couldn't decrypt the outter-EAP TLS connection in R

Date: Wed, 28 Oct 2015 18:17:51 +0000

changed bug 11642


What Removed Added
Status INCOMPLETE RESOLVED
Resolution --- NOTABUG

Comment # 4 on bug 11642 from
After try with last git branch (it is recommended..
http://security.stackexchange.com/questions/70981/decoding-tunnel-bytes-in-eap-tls-or-eap-ttls-using-wireshark
) and enable SSL debug

[...]
dissect_ssl enter frame #35 (first time)
packet_from_server: is from server - TRUE
  conversation = 0x1201bd8e0, ssl_session = 0x1201bdcf0
  record: offset = 0, reported_length_remaining = 3216
dissect_ssl3_record found version 0x0301(TLS 1.0) -> state 0x11
dissect_ssl3_record: content_type 22 Handshake
Calculating hash with offset 5 49
decrypt_ssl3_record: app_data len 49, ssl state 0x11
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 2 offset 5 length 45 bytes, remaining
54 
ssl_dissect_hnd_hello_common found SERVER RANDOM -> state 0x13
ssl_dissect_hnd_srv_hello found CIPHER 0x0039 -> state 0x17
[...]

Wireshark can't decrypt because SSL handshake use DH (
https://ask.wireshark.org/questions/7886/ssl-decrypting-problem )


Peter, you confirm ?


You are receiving this mail because:
  • You are watching all bug changes.