Bug ID |
12109
|
Summary |
TLS Record not dissected when it is 16K in length
|
Product |
Wireshark
|
Version |
1.12.1
|
Hardware |
x86
|
OS |
Red Hat
|
Status |
UNCONFIRMED
|
Severity |
Normal
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Created attachment 14320 [details]
Certificate not found after Server Hello
Build Information:
Version 1.12.1 (Git Rev Unknown from unknown)
Copyright 1998-2014 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GTK+ 2.20.1, with Cairo 1.8.8, with Pango 1.28.1, with
GLib 2.26.1, with libpcap, with libz 1.2.3, with POSIX capabilities (Linux),
without libnl, with SMI 0.4.8, with c-ares 1.7.0, with Lua 5.1, without Python,
with GnuTLS 2.8.5, with Gcrypt 1.4.5, with MIT Kerberos, without GeoIP, without
PortAudio, with AirPcap.
Running on Linux 2.6.32-573.14.1.el6.x86_64, with locale en_US.UTF-8, with
libpcap version 1.4.0, with libz 1.2.3, GnuTLS 2.8.5, Gcrypt 1.4.5, without
AirPcap.
Intel(R) Core(TM) i5-2540M CPU @ 2.60GHz
Built using gcc 4.4.7 20120313 (Red Hat 4.4.7-4).
--
SSL dissector fails to dissect the Certificate when TLS record is 16384 bytes
in size.
Problem is also in Version 2.0.2rc0-130-geb67394 on win7
You are receiving this mail because:
- You are watching all bug changes.