https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15052
Bug ID: 15052
Summary: OCSP Must-Staple - OID 1.3.6.1.5.5.7.1.24 - Dissector
for OID not implemented
Product: Wireshark
Version: 2.6.2
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: Enhancement
Priority: Low
Component: Dissection engine (libwireshark)
Assignee: bugzilla-ad...@wireshark.org
Reporter: francesco.pap...@gmail.com
Target Milestone: ---
Created attachment 16540
--> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=16540&action=edit
traffic showing the issue and httpd private key
Build Information:
Wireshark 2.6.2 (v2.6.2)
Copyright 1998-2018 Gerald Combs <ger...@wireshark.org> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with Qt 5.10.1, with libpcap, with POSIX capabilities
(Linux),
with libnl 3, with GLib 2.56.1, with zlib 1.2.11, with SMI 0.4.8, with c-ares
1.13.0, with Lua 5.1.5, with GnuTLS 3.6.2, with Gcrypt 1.8.3, with MIT
Kerberos,
with MaxMind DB resolver, without nghttp2, without LZ4, without Snappy, without
libxml2, with QtMultimedia, without SBC, without SpanDSP, without bcg729.
Running on Linux 4.17.12-200.fc28.x86_64, with Intel(R) Core(TM) i7-8550U CPU @
1.80GHz (with SSE4.2), with 15932 MB of physical memory, with locale
en_US.UTF-8, with libpcap version 1.9.0-PRE-GIT (with TPACKET_V3), with GnuTLS
3.6.3, with Gcrypt 1.8.3, with zlib 1.2.11, binary plugins supported (0
loaded).
Built using gcc 8.1.1 20180712 (Red Hat 8.1.1-5).
--
Trying the OCSP Must-Staple option, everything is fine but Wireshark, at the
moment, can't dissect this OID.
Attaching traffic and httpd private key.
--
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via: Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives: https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe