Wireshark-users: Re: [Wireshark-users] TLSv1 vs SSL3.0 decoding issue
From: "Sake Blok" <sake@xxxxxxxxxx>
Date: Thu, 11 Jun 2009 17:25:12 +0200
Hi Jacob,
If you look at the "ServerHello" message, I bet you
will see that the BigIP has chosen a DH cipher. The clue to this is that there
is a "Server Key Exchange" message (see frame 5). This means that the encryption
key that is chosen is also based on information that only the server knows. You
can either change the accepted range of ciphers on the BigIP to not include any
DH cipher or alter the client to not propose DH ciphers to make decryption
possible. If both options are not possible, then I'm afraid you won't be able to
do decryption.
Cheers,
Sake
PS If you come to Sharkfest, I am giving a
presentation on "SSL troubleshooting" that includes this example amongst other
things :-)
|
- References:
- [Wireshark-users] TLSv1 vs SSL3.0 decoding issue
- From: jacob c
- [Wireshark-users] TLSv1 vs SSL3.0 decoding issue
- Prev by Date: Re: [Wireshark-users] [Dissector bug, protocol DIAMETER: proto.c:1044: failed assertion"DISSECTOR_ASSERT_NOT_REACHED"]
- Next by Date: Re: [Wireshark-users] Wireshark-users: Merging a bunch of PCAP files
- Previous by thread: [Wireshark-users] TLSv1 vs SSL3.0 decoding issue
- Next by thread: Re: [Wireshark-users] Wireshark-users: Merging a bunch of PCAP files
- Index(es):