Re: [Wireshark-users] Malformed SSL - Is it really?

2007-04-13 Thread Sake Blok
On Thu, Apr 12, 2007 at 11:24:48PM -0400, Small, James wrote: > > > > > [Malformed Packet: SSL] > > > > > > > > Is the packet really malformed, or is it possible that Wireshark > > > > doesn't support the cipher being used? If so, is there any way to > > > > tell if the packet is really malformed

Re: [Wireshark-users] Malformed SSL - Is it really?

2007-04-12 Thread Small, James
Hi Sake, > > > [Malformed Packet: SSL] > > > > > > Is the packet really malformed, or is it possible that Wireshark > > > doesn't support the cipher being used? If so, is there any way to > > > tell if the packet is really malformed versus Wireshark just not > > > understanding it/the encryption

Re: [Wireshark-users] Malformed SSL - Is it really?

2007-04-12 Thread Sake Blok
On Thu, Apr 12, 2007 at 10:09:41PM +0200, Sake Blok wrote: > > Transmission Control Protocol, Src Port: 3128 (3128), Dst Port: 1136 > > (1136), Seq: 9184, Ack: 1341, Len: 1260 > > Hypertext Transfer Protocol > > Secure Socket Layer > > TLSv1 Record Layer: Application Data Protocol: http > >

Re: [Wireshark-users] Malformed SSL - Is it really?

2007-04-12 Thread Sake Blok
On Tue, Apr 10, 2007 at 11:07:29AM -0400, Small, James wrote: > Hello, > > When using Wireshark 0.99.5 on Windows, sometimes I see: > [Malformed Packet: SSL] > > e.g.: > No. TimeSourceDestination Protocol Src > Port Dst Port Delta Info > 381 15.301

[Wireshark-users] Malformed SSL - Is it really?

2007-04-10 Thread Small, James
Hello, When using Wireshark 0.99.5 on Windows, sometimes I see: [Malformed Packet: SSL] e.g.: No. TimeSourceDestination Protocol Src Port Dst Port Delta Info 381 15.301101 172.24.101.100172.24.100.107TLSv1443 1136 0.