Wireshark-bugs: [Wireshark-bugs] [Bug 11851] New: SSL V2 Client Hello no longer dissected in V2

Date: Fri, 04 Dec 2015 10:41:13 +0000
Bug ID 11851
Summary SSL V2 Client Hello no longer dissected in V2 wireshark
Product Wireshark
Version 2.0.0
Hardware x86
OS Windows 7
Status UNCONFIRMED
Severity Major
Priority Low
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Created attachment 14118 [details]
packet capture showing TLS traffic on port 5023

Build Information:
Version 2.0.0 (v2.0.0-0-g9a73b82 from master-2.0)
Copyright 1998-2015 Gerald Combs <[email protected]> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
Compiled (64-bit) with Qt 5.3.2, with WinPcap (4_1_3), with libz 1.2.8, with
GLib 2.42.0, with SMI 0.4.8, with c-ares 1.9.1, with Lua 5.2, with GnuTLS
3.2.15, with Gcrypt 1.6.2, with MIT Kerberos, with GeoIP, with QtMultimedia,
with AirPcap.
Running on 64-bit Windows 7 Service Pack 1, build 7601, with locale C, with
WinPcap version 4.1.3 (packet.dll version 4.1.0.2980), based on libpcap version
1.0 branch 1_0_rel0b (20091008), with GnuTLS 3.2.15, with Gcrypt 1.6.2, without
AirPcap.
Intel Xeon E312xx (Sandy Bridge) (with SSE4.2), with 4095MB of physical memory.
Built using Microsoft Visual C++ 12.0 build 31101
Wireshark is Open Source Software released under the GNU General Public
License.
--
New version fails to dissect a SSLV2 ClientHello packet
Used to work in 1.12 wireshark. 
-
Decode As is needed in the attached capture


You are receiving this mail because:
  • You are watching all bug changes.