https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16114
Bug ID: 16114
Summary: TLS handshake client hello packet protocol labeled
differently, TLSv1 or TLSv1.2
Product: Wireshark
Version: 3.0.5
Hardware: x86
OS: Windows 10
Status: UNCONFIRMED
Severity: Major
Priority: Low
Component: Dissection engine (libwireshark)
Assignee: bugzilla-ad...@wireshark.org
Reporter: wu...@avaya.com
Target Milestone: ---
Build Information:
Version 3.0.5 (v3.0.5-0-g752a55954770)
also earlier versions such as 2.4.5
--
For TLS handshake "client hello" packet, identical packets that differ only in
Random and Session ID, ips, and time, are labeled either as protocol TLSv1 or
TLSv1.2 -- The TLSv1.2 is part of a successful handshake, while the TLSv1 is
part of failed handshake due to the server do not have a cipher that matches
the client. This me down the wrong direction initially.
--
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via: Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives: https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe