[Wireshark-bugs] [Bug 14243] Wrong SSL decryption when using EXTENDED MASTER SECRET and Client certificate request (mutual authentication)

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14243 --- Comment #8 from Gerrit Code Review --- Change 24543 merged by Anders Broman: TLS: fix decryption with EMS and client auth https://code.wireshark.org/review/24543 -- You are receiving this mail

[Wireshark-bugs] [Bug 14241] BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not able to decode the packet correctly

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 --- Comment #3 from Dipankar Shaw --- please refer RFC 7911, section 3 Extended NLRI Encodings. in the packet I attached, i expect to see, First 4 Bytes as path Identifier -- 00 00 00 01 - mean decimal 1 1 Byte :

[Wireshark-bugs] [Bug 14241] BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not able to decode the packet correctly

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 Michael Mann changed: What|Removed |Added Status|INCOMPLETE |CONFIRMED

[Wireshark-bugs] [Bug 14243] Wrong SSL decryption when using EXTENDED MASTER SECRET and Client certificate request (mutual authentication)

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14243 --- Comment #7 from Gerrit Code Review --- Change 24543 had a related patch set uploaded by Peter Wu: TLS: fix decryption with EMS and client auth https://code.wireshark.org/review/24543 -- You are

[Wireshark-bugs] [Bug 14243] Wrong SSL decryption when using EXTENDED MASTER SECRET and Client certificate request (mutual authentication)

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14243 Peter Wu changed: What|Removed |Added Ever confirmed|0 |1

[Wireshark-bugs] [Bug 14243] Wrong SSL decryption when using EXTENDED MASTER SECRET and Client certificate request (mutual authentication)

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14243 --- Comment #5 from Peter Wu --- Created attachment 15978 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15978=edit Key log file for mbedtls client and boringssl server with mutual auth and RSA kex --

[Wireshark-bugs] [Bug 14243] Wrong SSL decryption when using EXTENDED MASTER SECRET and Client certificate request (mutual authentication)

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14243 --- Comment #4 from Peter Wu --- Created attachment 15977 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15977=edit PEM-encoded RSA private key and self-signed X.509 certificate -- You are receiving

[Wireshark-bugs] [Bug 14243] Wrong SSL decryption when using EXTENDED MASTER SECRET and Client certificate request (mutual authentication)

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14243 --- Comment #3 from Peter Wu --- Created attachment 15976 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15976=edit Capture of mbedtls client and boringssl server with mutual auth and RSA kex -- You are

[Wireshark-bugs] [Bug 14243] Wrong SSL decryption when using EXTENDED MASTER SECRET and Client certificate request (mutual authentication)

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14243 --- Comment #2 from Peter Wu --- Would it be possible to attach a pcap with session secrets? What version of Mbed TLS are you using? What client/server implementation? How did you configure decryption, using a key

[Wireshark-bugs] [Bug 12584] Saving PDML packet dissection crashes wireshark

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12584 Graham Bloice changed: What|Removed |Added CC|

[Wireshark-bugs] [Bug 13207] enhancement : add 802.11ax Frame support in wireshark

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13207 Peter Wu changed: What|Removed |Added CC|

[Wireshark-bugs] [Bug 14241] BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not able to decode the packet correctly

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 Alexis La Goutte changed: What|Removed |Added Status|UNCONFIRMED

[Wireshark-bugs] [Bug 11370] Need dumpcap to be able to capture pcap-ng from a pipe

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11370 --- Comment #6 from Gerrit Code Review --- Change 24536 had a related patch set uploaded by James Ko: [WIP] dumpcap: enable capture of pcapng from pipe https://code.wireshark.org/review/24536 -- You

[Wireshark-bugs] [Bug 14241] BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not able to decode the packet correctly

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 Alexis La Goutte changed: What|Removed |Added Summary|IPv6 NLRI is received with

[Wireshark-bugs] [Bug 14243] Wrong SSL decryption when using EXTENDED MASTER SECRET and Client certificate request (mutual authentication)

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14243 Alexis La Goutte changed: What|Removed |Added CC|

[Wireshark-bugs] [Bug 14243] Wrong SSL decryption when using EXTENDED MASTER SECRET and Client certificate request (mutual authentication)

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14243 Alexis La Goutte changed: What|Removed |Added Summary|Wrong SSL decryption when

[Wireshark-bugs] [Bug 14237] SSH remote capture promiscuous mode

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14237 Michael Mann changed: What|Removed |Added Resolution|--- |FIXED

[Wireshark-bugs] [Bug 14237] SSH remote capture promiscuous mode

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14237 --- Comment #1 from Gerrit Code Review --- Change 24530 merged by Michael Mann: sshdump: add option to prevent promiscuous mode. https://code.wireshark.org/review/24530 -- You are receiving this mail

[Wireshark-bugs] [Bug 14210] TRANSUM doesn't account for DNS retries in the Request Spread

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14210 --- Comment #6 from Paul Offord --- Hi Michael, I agree regarding the dissectors doing the protocol-related stuff - I definitely don't want to replicate this in TRANSUM. I didn't want to crack open the code

[Wireshark-bugs] [Bug 14210] TRANSUM doesn't account for DNS retries in the Request Spread

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14210 Michael Mann changed: What|Removed |Added Status|CONFIRMED |RESOLVED

[Wireshark-bugs] [Bug 14210] TRANSUM doesn't account for DNS retries in the Request Spread

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14210 --- Comment #4 from Gerrit Code Review --- Change 24506 merged by Michael Mann: TRANSUM: Fix DNS-related bug and improve performance https://code.wireshark.org/review/24506 -- You are receiving this

[Wireshark-bugs] [Bug 14182] Calculate Conversation Timestamp - Turn on by default please

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14182 Michael Mann changed: What|Removed |Added Resolution|--- |FIXED

[Wireshark-bugs] [Bug 14243] New: Wrong SSL decryption when using EXTENDED MASTER SECRET and Client certificate reqest (mutual authentication)

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14243 Bug ID: 14243 Summary: Wrong SSL decryption when using EXTENDED MASTER SECRET and Client certificate reqest (mutual authentication) Product: Wireshark Version: 2.4.2

[Wireshark-bugs] [Bug 14234] SSH remote capture filter does not load

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14234 --- Comment #8 from Dario Lombardo --- I suppose this could be related to this change https://code.wireshark.org/review/#/c/24531/ -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 14234] SSH remote capture filter does not load

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14234 --- Comment #7 from NOYB --- For a number of reasons cannot install 2.5 for debugging. Sorry. -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 14234] SSH remote capture filter does not load

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14234 --- Comment #6 from Dario Lombardo --- (In reply to NOYB from comment #5) > Perhaps could do that if I knew where the debug flag in the dialog is > located. I am sorry, I missed the version you're using. That feature

[Wireshark-bugs] [Bug 14234] SSH remote capture filter does not load

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14234 --- Comment #5 from NOYB --- Perhaps could do that if I knew where the debug flag in the dialog is located. -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 14234] SSH remote capture filter does not load

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14234 --- Comment #4 from Dario Lombardo --- Can you tick the debug flag in the dialog and specify a debug file, then paste the content? It shows the command line of the extcap and the remote command sent. -- You are

[Wireshark-bugs] [Bug 14234] SSH remote capture filter does not load

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14234 --- Comment #3 from NOYB --- I should also add that I've since noticed adding a space in a variety of places causes it too work too. So don't wear blinders casing the abbreviated octet goose. At the

[Wireshark-bugs] [Bug 14234] SSH remote capture filter does not load

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14234 --- Comment #2 from NOYB --- No Wireshark error message. The remote capture happens. Just without any capture filtering. Can see that the filter was not passed to the remote by looking at the processes.

[Wireshark-bugs] [Bug 14235] SSH remote capture private key pageant option

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14235 --- Comment #1 from Dario Lombardo --- I've gone through this some time ago. Looked like libssh doesn't have a proper pageant support. sshdump is based on libssh. -- You are receiving this mail because: You are

[Wireshark-bugs] [Bug 14234] SSH remote capture filter does not load

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14234 --- Comment #1 from Dario Lombardo --- Which error message does wireshark give you? -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 14178] DNS Retransmission Detection (Expert)

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14178 Pascal Quantin changed: What|Removed |Added Resolution|--- |FIXED

[Wireshark-bugs] [Bug 13313] dns_time not calculated based on first request with same transaction ID as respons.

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13313 Pascal Quantin changed: What|Removed |Added Resolution|--- |FIXED

[Wireshark-bugs] [Bug 14178] DNS Retransmission Detection (Expert)

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14178 --- Comment #2 from Gerrit Code Review --- Change 24525 merged by Anders Broman: Add support to handle DNS retransmissions https://code.wireshark.org/review/24525 -- You are receiving this mail

[Wireshark-bugs] [Bug 13313] dns_time not calculated based on first request with same transaction ID as respons.

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13313 --- Comment #4 from Gerrit Code Review --- Change 24525 merged by Anders Broman: Add support to handle DNS retransmissions https://code.wireshark.org/review/24525 -- You are receiving this mail

[Wireshark-bugs] [Bug 14239] SSH remote capture command not terminated if no packets captured

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14239 Dario Lombardo changed: What|Removed |Added CC|

[Wireshark-bugs] [Bug 14239] SSH remote capture command not terminated if no packets captured

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14239 --- Comment #1 from Dario Lombardo --- I'd add Roland. -- You are receiving this mail because: You are watching all bug changes.___ Sent via:

[Wireshark-bugs] [Bug 14239] SSH remote capture command not terminated if no packets captured

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14239 Dario Lombardo changed: What|Removed |Added Status|UNCONFIRMED |CONFIRMED

[Wireshark-bugs] [Bug 14240] SSH remote capture settings profiles

2017-11-22 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14240 --- Comment #1 from Dario Lombardo --- We discussed about this during the last sharkfest. At the moment you can use the global wireshark profiles to save multiple ssh profiles. -- You are receiving this mail because: