https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15052

            Bug ID: 15052
           Summary: OCSP Must-Staple - OID  1.3.6.1.5.5.7.1.24 - Dissector
                    for OID not implemented
           Product: Wireshark
           Version: 2.6.2
          Hardware: All
                OS: All
            Status: UNCONFIRMED
          Severity: Enhancement
          Priority: Low
         Component: Dissection engine (libwireshark)
          Assignee: bugzilla-ad...@wireshark.org
          Reporter: francesco.pap...@gmail.com
  Target Milestone: ---

Created attachment 16540
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=16540&action=edit
traffic showing the issue and httpd private key

Build Information:
Wireshark 2.6.2 (v2.6.2)

Copyright 1998-2018 Gerald Combs <ger...@wireshark.org> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with Qt 5.10.1, with libpcap, with POSIX capabilities
(Linux),
with libnl 3, with GLib 2.56.1, with zlib 1.2.11, with SMI 0.4.8, with c-ares
1.13.0, with Lua 5.1.5, with GnuTLS 3.6.2, with Gcrypt 1.8.3, with MIT
Kerberos,
with MaxMind DB resolver, without nghttp2, without LZ4, without Snappy, without
libxml2, with QtMultimedia, without SBC, without SpanDSP, without bcg729.

Running on Linux 4.17.12-200.fc28.x86_64, with Intel(R) Core(TM) i7-8550U CPU @
1.80GHz (with SSE4.2), with 15932 MB of physical memory, with locale
en_US.UTF-8, with libpcap version 1.9.0-PRE-GIT (with TPACKET_V3), with GnuTLS
3.6.3, with Gcrypt 1.8.3, with zlib 1.2.11, binary plugins supported (0
loaded).

Built using gcc 8.1.1 20180712 (Red Hat 8.1.1-5).
--
Trying the OCSP Must-Staple option, everything is fine but Wireshark, at the
moment, can't dissect this OID.

Attaching traffic and httpd private key.

-- 
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

Reply via email to