Wireshark mailing list archives
Re: question about bug 3303
From: kolos_ws () ural2 hu
Date: Fri, 3 Sep 2010 16:58:29 +0200 (CEST)
Hi Sake,
Can someone confirm to me what is happening to bug 3303 (https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3303) at the moment? It hasn't seen much activity lately.Thank you for pinging, this bug is still on my list to look at. But time is a limited resource :-( and this issue is kind of a tough one to dig into.
I understand.
Although it is categorised as 'Low Normal' importance at the moment, in my case it is a showstopper and would love to see it resolved.Are you sure you are encountering the same issue? There were some reports of similar issues that actually had a different cause. Will you be able to post a capture file showing the issue you have at hand? That way it can be determined if you run into the same issue. You can attach the tracefile to the bug-report. If necessary, you can mark it as private so that only the core-developers have access to it.
I'm not sure if I can post a capture file (probably I can't), but the reason why I think that it's this issue is that I see the following in my SSL debug log: [..] dissect_ssl enter frame #217 (first time) conversation = 0xafa51a70, ssl_session = 0xafa51cc0 record: offset = 0, reported_length_remaining = 1747 dissect_ssl3_record found version 0x0301 -> state 0x11 dissect_ssl3_record: content_type 22 decrypt_ssl3_record: app_data len 1742 ssl, state 0x11 association_find: TCP port 8080 found 0x1bc5ac8 packet_from_server: is from server - TRUE decrypt_ssl3_record: using server decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 2 offset 5 length 70 bytes, remaining 1747 dissect_ssl3_hnd_hello_common found SERVER RANDOM -> state 0x13 dissect_ssl3_hnd_srv_hello found CIPHER 0x0016 -> state 0x17 dissect_ssl3_hnd_srv_hello trying to generate keys ssl_generate_keyring_material not enough data to generate key (0x17 required 0x37 or 0x57) dissect_ssl3_hnd_srv_hello can't generate keyring material dissect_ssl3_handshake iteration 0 type 11 offset 79 length 1232 bytes, remaining 1747 dissect_ssl3_handshake iteration 0 type 12 offset 1315 length 424 bytes, remaining 1747 dissect_ssl3_handshake iteration 0 type 14 offset 1743 length 0 bytes, remaining 1747 [..] The URL on the Bugzilla page for issue 3303 refers to a message on this email list (http://www.wireshark.org/lists/wireshark-users/200903/msg00047.html) which seems to have the same error message. In all my captures I see that the packet containing "Server Hello, Certificate, Server Key Exchange, Encrypted Handshake Message" is fragmented and I can't raise the MTU in my environment. Is this the same issue you think? Thanks! Regards, Kolos ___________________________________________________________________________ Sent via: Wireshark-users mailing list <wireshark-users () wireshark org> Archives: http://www.wireshark.org/lists/wireshark-users Unsubscribe: https://wireshark.org/mailman/options/wireshark-users mailto:wireshark-users-request () wireshark org?subject=unsubscribe
Current thread:
- question about bug 3303 kolos_ws (Sep 03)
- Re: question about bug 3303 Sake Blok (Sep 03)
- Re: question about bug 3303 kolos_ws (Sep 03)
- Re: question about bug 3303 Sake Blok (Sep 03)
- Re: question about bug 3303 Sake Blok (Sep 03)
- Re: question about bug 3303 kolos_ws (Sep 06)
- Re: question about bug 3303 Sake Blok (Sep 06)
- Re: question about bug 3303 kolos_ws (Sep 07)
- Re: question about bug 3303 Sake Blok (Sep 07)
- Re: question about bug 3303 kolos_ws (Sep 07)
- Re: question about bug 3303 Sake Blok (Sep 07)
- Re: question about bug 3303 kolos_ws (Sep 03)
- Re: question about bug 3303 Sake Blok (Sep 03)