https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16114

            Bug ID: 16114
           Summary: TLS handshake  client hello  packet protocol labeled
                    differently, TLSv1 or TLSv1.2
           Product: Wireshark
           Version: 3.0.5
          Hardware: x86
                OS: Windows 10
            Status: UNCONFIRMED
          Severity: Major
          Priority: Low
         Component: Dissection engine (libwireshark)
          Assignee: bugzilla-ad...@wireshark.org
          Reporter: wu...@avaya.com
  Target Milestone: ---

Build Information:
Version 3.0.5 (v3.0.5-0-g752a55954770) 
also earlier versions such as 2.4.5
--
For TLS handshake "client hello" packet, identical packets that differ only in
Random and Session ID, ips, and time, are labeled either as protocol TLSv1 or
TLSv1.2 -- The TLSv1.2 is part of a successful handshake, while the TLSv1 is
part of failed handshake due to the server do not have a cipher that matches
the client.  This me down the wrong direction initially.

-- 
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

Reply via email to