Hello,
I just stumbled upon the known problem SSL decryption breaks after
retransmission
(http://www.wireshark.org/lists/wireshark-dev/200805/msg00067.html) with
wireshark 1.6.5.
I wonder if a patch for this issue is available? Is anybody working on this?
Martin
--
Dr. Martin Wilck
PRIMERGY
2012/2/10 Martin Wilck martin.wi...@ts.fujitsu.com
Hello,
I just stumbled upon the known problem SSL decryption breaks after
retransmission
(http://www.wireshark.org/lists/wireshark-dev/200805/msg00067.html) with
wireshark 1.6.5.
I wonder if a patch for this issue is available? Is anybody
On 02/10/2012 12:13 PM, Max Dmitrichenko wrote:
I have made a patch and put it into the bug tracker about half a year
ago.
Thanks - I assume you're talking about
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5971 ?
Martin
--
Dr. Martin Wilck
PRIMERGY System Software Engineer
x86
2012/2/10 Martin Wilck martin.wi...@ts.fujitsu.com
On 02/10/2012 12:13 PM, Max Dmitrichenko wrote:
I have made a patch and put it into the bug tracker about half a year
ago.
Thanks - I assume you're talking about
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5971 ?
Yep!
--
Max
On 02/10/2012 01:09 PM, Max Dmitrichenko wrote:
Thanks - I assume you're talking about
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5971 ?
Yep!
I built wireshark with this patch applied, but it didn't solve my
problem. I still need to tell wireshark manually to ignore the
2012/2/10 Martin Wilck martin.wi...@ts.fujitsu.com
On 02/10/2012 01:09 PM, Max Dmitrichenko wrote:
Thanks - I assume you're talking about
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5971 ?
Yep!
I built wireshark with this patch applied, but it didn't solve my
problem. I
Hi Sake,
I was curious to know - Are you working on this? I just wanted to know
because some work I am doing depends (slightly) on this and I will put
comments in the code accordingly.
Thanks!
Abhik.
On Thu, May 29, 2008 at 9:38 PM, Sake Blok [EMAIL PROTECTED] wrote:
On Thu, May 29, 2008 at
No problems... thanks for the update, Sake!
On Mon, Jul 7, 2008 at 5:20 PM, Sake Blok [EMAIL PROTECTED] wrote:
Abhik,
I did take a look at it, but have not found the time yet to create
a proper fix.
Cheers,
Sake
On Mon, Jul 07, 2008 at 04:03:28PM +0400, Abhik Sarkar wrote:
Hi Sake,
I personally believe not passing retransmitted frames is a better
choice, besides that its implementation is narrower, I see it as
natural for a transport protocol not to pass retransmissions to the
upper layer. All in all the user has a link in the packet details to
the originally-transmitted
Sake Blok wrote:
Any objections to the following fix:
Have a preference in the tcp profile like show retransmitted frames
as data with tooltip Dissecting the same fragment of data twice
can disrupt the upper layer dissectors (ssl-decryption for example).
By default this preference will
At Thu, 29 May 2008 11:04:02 -0400 (EDT), you wrote
I personally believe not passing retransmitted frames is a better
choice, besides that its implementation is narrower, I see it as
natural for a transport protocol not to pass retransmissions to the
upper layer. All in all the user has a link in
On Thu, May 29, 2008 at 12:19:31PM -0400, Bill Meier wrote:
- Make the TCP dissector not forward retransmitted segments to higher
layer protocols, just like the normal TCP stack will do on the
receiving host. This will have a major impact on the way retransmitted
frames are
On Tue, May 06, 2008 at 03:41:39PM -0600, Stephen Fisher wrote:
On Tue, May 06, 2008 at 10:17:54PM +0200, Sake Blok wrote:
Today I noticed that SSL decryption breaks when there is a tcp
retransmission.
We never run out of things to fix, do we? :)
It's a mixed up world, we should have
Hi All,
Today I noticed that SSL decryption breaks when there is a tcp retransmission.
The retransmitted segment will be handled by the SSL dissector as if it was new
data. The mac-check will fail, but the state of the SSL decrypter is left in an
erroneous state, causing the dissection of all
On Tue, May 06, 2008 at 10:17:54PM +0200, Sake Blok wrote:
Today I noticed that SSL decryption breaks when there is a tcp
retransmission.
We never run out of things to fix, do we? :)
To solve this issue, I can think of several options:
- Make the TCP dissector not forward retransmitted
15 matches
Mail list logo