On Thu, Apr 12, 2007 at 11:24:48PM -0400, Small, James wrote:
>
> > > > [Malformed Packet: SSL]
> > > >
> > > > Is the packet really malformed, or is it possible that Wireshark
> > > > doesn't support the cipher being used? If so, is there any way to
> > > > tell if the packet is really malformed
Hi Sake,
> > > [Malformed Packet: SSL]
> > >
> > > Is the packet really malformed, or is it possible that Wireshark
> > > doesn't support the cipher being used? If so, is there any way to
> > > tell if the packet is really malformed versus Wireshark just not
> > > understanding it/the encryption
On Thu, Apr 12, 2007 at 10:09:41PM +0200, Sake Blok wrote:
> > Transmission Control Protocol, Src Port: 3128 (3128), Dst Port: 1136
> > (1136), Seq: 9184, Ack: 1341, Len: 1260
> > Hypertext Transfer Protocol
> > Secure Socket Layer
> > TLSv1 Record Layer: Application Data Protocol: http
> >
On Tue, Apr 10, 2007 at 11:07:29AM -0400, Small, James wrote:
> Hello,
>
> When using Wireshark 0.99.5 on Windows, sometimes I see:
> [Malformed Packet: SSL]
>
> e.g.:
> No. TimeSourceDestination Protocol Src
> Port Dst Port Delta Info
> 381 15.301
Hello,
When using Wireshark 0.99.5 on Windows, sometimes I see:
[Malformed Packet: SSL]
e.g.:
No. TimeSourceDestination Protocol Src
Port Dst Port Delta Info
381 15.301101 172.24.101.100172.24.100.107TLSv1443
1136 0.