Quantcast
Channel: Questions Tagged With ssl
Viewing all 276 articles
Browse latest View live

Examples of Wireshark dissectors run on top of SSL

$
0
0

Just looking to see if there are already some implemented dissectors for protocols that run on top of SSL protocol. I know HTTP is one but I'm looking for other examples. It doesn't really matter if these dissectors are standards dissectors or plugins in Wireshark.

Thanks! Flora


How to Decrypt and view https data

$
0
0

How can we Decrypt and view https data (ssl proxy) in Wireshark?

Decrypt with RSA key not working

$
0
0

I am using nginx on top of flask server. When i am running my site through browser as https it runs ok but if i use same key to decrypt the data using wireshark its not decrypting it. Any suggestion

Problem seeing ssl handshake as a server

$
0
0

Hi, I'm quite new to wireshark, so there probably is a simple answer to my question. However I can't seem to find it on my own...

I have two machines - 192.168.0.105 (my laptop running windows7) and 192.168.0.24 (an Ubuntu server). Wireshark runs on my laptop, as well as an Abyss webserver configured to listen to https on port 8080. On the Ubuntu server, I have Apache configured to listen on https on port 443.

When I connect with chrome from my laptop to the Apache server, I see a nice SSL Handshake procedure. However, when I try to do the opposit, i.e. connect with firefox from the Ubuntu machine to my Abyss webserver, I only get TCP traffic. If I type ssl in the filter dialog, it's empty. I still se the page though, and my certificate is in there as shown in the picture.

The reason I ask is that I have an "SSL Handshake problem" error on an embedded thingie I'm programming, and I would really need to troubleshoot this.

I wasn't allowed to upload pictures, but put two screenshots here: Screenshots

RSA Key association for SSL over UDP

$
0
0

I've written my own dissector (in lua) to dissect USB URB packets, remove a header, and send the remaining packet data on to the ssl dissector like so:

local ssl = Dissector.get('ssl') local newbuf = tvbuf:range(42, pktlen-42):tvb() ssl:call(newbuf, pktinfo, root)

Works all well and good ^.^ but when I add RSA keys, they seem to be associated with TCP port 0, so I cannot get them to be recognized by my packet stream which logs them as "UDP port -1"

ssl-debug.log excerpts:

ssl_association_remove removing TCP 0 - data handle 0x1f471b0 Private key imported: KeyID 4c:2a:fb:42:99:02:85:8d:24:87:ff:f7:67:97:e6:6b:... ssl_load_key: swapping p and q parameters and recomputing u ssl_init IPv4 addr '0.0.0.0' (0.0.0.0) port '0' filename '/home/jonah/Workspace/mobdev/iRealD/root_private_key.pem' password(only for p12 file) '' ssl_init private key file /home/jonah/Workspace/mobdev/iRealD/root_private_key.pem successfully loaded. association_add TCP port 0 protocol data handle 0x1f471b0

dissect_ssl enter frame #103 (first time) conversation = 0x7f0b999dda38, ssl_session = 0x7f0b999ddb30 record: offset = 0, reported_length_remaining = 138 dissect_ssl3_record: content_type 22 Handshake decrypt_ssl3_record: app_data len 133, ssl state 0x00 association_find: UDP port -1 found (nil) packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 1 offset 5 length 129 bytes, remaining 138 packet_from_server: is from server - FALSE ssl_find_private_key server 7.4:4 ssl_find_private_key can't find private key for this server! Try it again with universal port 0 ssl_find_private_key can't find private key for this server (universal port)! Try it again with universal address 0.0.0.0 ssl_find_private_key can't find any private key! dissect_ssl3_hnd_hello_common found CLIENT RANDOM -> state 0x01

dissect_ssl enter frame #105 (first time) conversation = 0x7f0b999ddf10, ssl_session = 0x7f0b999ddfb0 record: offset = 0, reported_length_remaining = 79 dissect_ssl3_record found version 0x0300 -> state 0x10 dissect_ssl3_record: content_type 22 Handshake decrypt_ssl3_record: app_data len 74, ssl state 0x10 association_find: UDP port 5 found (nil) packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 2 offset 5 length 70 bytes, remaining 79 dissect_ssl3_hnd_hello_common found SERVER RANDOM -> state 0x12 dissect_ssl3_hnd_srv_hello found CIPHER 0x0035 -> state 0x16 dissect_ssl3_hnd_srv_hello trying to generate keys ssl_generate_keyring_material not enough data to generate key (0x16 required 0x37 or 0x57) dissect_ssl3_hnd_srv_hello can't generate keyring material

dissect_ssl enter frame #106 (first time) conversation = 0x7f0b999ddf10, ssl_session = 0x7f0b999ddfb0 record: offset = 0, reported_length_remaining = 608 dissect_ssl3_record: content_type 22 Handshake decrypt_ssl3_record: app_data len 580, ssl state 0x16 association_find: UDP port 5 found (nil) packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 11 offset 5 length 576 bytes, remaining 585 record: offset = 585, reported_length_remaining = 23 dissect_ssl3_record: content_type 22 Handshake decrypt_ssl3_record: app_data len 9, ssl state 0x16 association_find: UDP port 5 found (nil) packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 13 offset 590 length 5 bytes, remaining 599 record: offset = 599, reported_length_remaining = 9 dissect_ssl3_record: content_type 22 Handshake decrypt_ssl3_record: app_data len 4, ssl state 0x16 association_find: UDP port 5 found (nil) packet_from_server: is from server - FALSE decrypt_ssl3_record: using client decoder decrypt_ssl3_record: no decoder available dissect_ssl3_handshake iteration 1 type 14 offset 604 length 0 bytes, remaining 608

Getting strange SSL record size

$
0
0

Hi,

We have a software where Client is used to copy file over to and from a server. The communication happens over SSL layer. I am analyzing an issue where file copying is "very" slow using our client-server software when compared with some other tools.

What I have observed is that, the packets captured follow a pattern. First there will be a packet with a payload data of 16384 bytes (reassembled from 12 assembled TCP segments) and the next one be a packet with payload data of 71 bytes only. And this pattern repeats itself. I am worried about the packet with 71 bytes, is it causing some delay?

The following is the screenshot of a reassembled packet of 16384 bytes.First Packet

The following is the screenshot of next packet of 71 bytes.Second Packet

This pattern of 16384 byte SSL record(?) and 71 byte SSL record(?) keeps on repeating itself till the whole file is uploaded. Could this be slowing down the file transfer? Moreover, why could this thing be happening? Any pointers?

Sorry if this is something very simple that I can't understand, I am very new to this thing. Thanks for taking time to go through this message.

Application Data segments responsible for login in IIS

$
0
0

How many Application Data segments are responsible for login to IIS in WS 2012 R2? Auth method is Windows Authentication. I have to measure access time to Web page launched on it and I have to know when my user login to service. Sorry for my english.

Unable to decode SPDY traffic

$
0
0

I am having trouble decoding SPDY traffic. Looking at the ssl_debug output the packets are getting decrypted correctly but for some reason they are not being decoded properly in the GUI. They are not even being shown decrypted, just listed as "Encrypted Application Data".

I have managed to get this all working for HTTP over SSL and both the HTTP1 and HTTP2 (SPDY) web servers are using the same cipher suite and certificate.

Useful info

Linux Ubuntu 14.10 (utopic) x86_64

Wireshark 1.12.1 (from Ubuntu packages)

pcaps and ssl_debug logs


Decrypting SSL data

$
0
0

Hey, i want to sniff packets coming from a mobile device and i'm gonna use tcpdump to sniff them, so i need to know if there's there any way to get the RSA key for decryption.

Capture filter with SSL hex output from tshark

$
0
0

I'm using the answer from this question to hex data from SSL traffic, how do I add a capture filter along with this so that I get hex dump of only that hosts' application data. I tried using 'host gateway.push.apple.com' but said that its a capture filter . I need to basically filter for this host and need to get decrypted hex dump of application data alone. Can tshark do that?

Find/Decrypt HTTPS Password

$
0
0

Hello. I need to find a gmail password in a sample capture for a school club using only wireshark. Gmail is obviously encrypted and I have no idea how to do this. There are so many packets with the google IP and I don't know which one to choose. Any and all help is appreciated.

Ssl/tls application data protocol when using pre master secret

$
0
0

Hi

I have custom protocol as ssl application data protocol, for which i have my own lua dissector. I want to know if there is a way to set the application data protocol to a protocol other than http, when using the pre master secret file,.

thanks gianrico

2way SSL Capture?

$
0
0

We have a 2way SSL service running. Today we came across an issue that raised a question about a 2way SSL packet capture. In the Certificate exchange we noticed the Client sent a SSL Cert Length 0 (null) which we interpreted as the Client Certificate was not being presented. To our surprise we achieved the same effect when the RootCA's or Intermediate CA's did not match. With all that being said, is there an indicator in the packet to differentiate between the 2 issues?

Asn.1 certificate code in SSL

$
0
0

Hi,

Where can I find the source asn.1 code for SSL certificate?

Thanks, Emi

Some detective expert help needed: puzzle with lost packets

$
0
0

Hi all!

I've been scratching my head debugging this issue I have when accessing my SSL server. Very often Firefox stalls on the connection and would hang for a minute or even indefinitely.

I analyzed traffic from both sides - one packet gets lost on the way from server to the client and this somehow breaks the further connection.

What's interesting, is that all re-transmissions from the server then never reach the client. How this can be possible? I am not seeing any packet loss on this route and I am certain wireshark is able to capture all traffic without dropping any packets. The proof is that Firefox stalls and it means it also never sees the packet too.

First, here what client does:

And how server replies:

You can see that client sends 3 "HTTP/1.1" requests to which server replies "304 Not Modified".

Now, out of those 3 replies, only 2 reach the client (packet size:311, packets #102 & #109).

One packet is lost.

When packet #109 arrives, Wireshark marks it as "[TCP Previous segment not captured] Application Data" because he knows by Seq/ack number that one packet wasn't seen.

Server then begins re-transmission attempts - packets #155 - 193.

None of them appear on the client!

How this is even possible? It happens with about a 1/10 chance on the page load. I suspect it could be NAT in my cable router as can't find any other viable explanations.

Do you have any ideas?


Wireshark not successfully using Pre-Master-Secret log to decrypt SSL/TLS

$
0
0

Following the method found here I was able to decrypt SSL/TLS on my Windows 7 Ultimate laptop with Wireshark. However using the same method on my Windows 7 Professional desktop (with the same version of Wireshark) the process failed to work. Every time I followed an SSL stream it showed the conversation as 0 bytes.

I set the user environment variable, SSLKEYLOGFILE, as C:\Users\David\sslkeylog.log and the sslkeylog.log is working perfectly. It's logging exactly like my laptop's sslkeylog.log. So I update Wireshark's preferences and start but Wireshark fails to decrypt with it. I've restarted my computer and tested but with no success. What's my problem? Here's part of my Wireshark debug file:

Wireshark SSL debug log

dissect_ssl enter frame #37 (first time)
ssl_session_init: initializing ptr 0000000007A63130 size 712
association_find: TCP port 49440 found 0000000000000000
packet_from_server: is from server - FALSE
  conversation = 0000000004E42148, ssl_session = 0000000007A63130
  record: offset = 0, reported_length_remaining = 208
dissect_ssl3_record: content_type 22 Handshake
decrypt_ssl3_record: app_data len 203, ssl state 0x00
association_find: TCP port 49440 found 0000000000000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 1 offset 5 length 199 bytes, remaining 208
packet_from_server: is from server - FALSE
ssl_find_private_key server 74.125.21.99:443
ssl_find_private_key: no keys found
dissect_ssl3_hnd_hello_common found CLIENT RANDOM -> state 0x01

dissect_ssl enter frame #44 (first time)
ssl_session_init: initializing ptr 0000000007A63DF0 size 712
association_find: TCP port 49441 found 0000000000000000
packet_from_server: is from server - FALSE
  conversation = 0000000004E42240, ssl_session = 0000000007A63DF0
  record: offset = 0, reported_length_remaining = 208
dissect_ssl3_record: content_type 22 Handshake
decrypt_ssl3_record: app_data len 203, ssl state 0x00
association_find: TCP port 49441 found 0000000000000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 1 offset 5 length 199 bytes, remaining 208
packet_from_server: is from server - FALSE
ssl_find_private_key server 74.125.21.99:443
ssl_find_private_key: no keys found
dissect_ssl3_hnd_hello_common found CLIENT RANDOM -> state 0x01

dissect_ssl enter frame #51 (first time)
ssl_session_init: initializing ptr 0000000007A64A90 size 712
association_find: TCP port 49443 found 0000000000000000
packet_from_server: is from server - FALSE
  conversation = 0000000004E423E0, ssl_session = 0000000007A64A90
  record: offset = 0, reported_length_remaining = 208
dissect_ssl3_record: content_type 22 Handshake
decrypt_ssl3_record: app_data len 203, ssl state 0x00
association_find: TCP port 49443 found 0000000000000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 1 offset 5 length 199 bytes, remaining 208
packet_from_server: is from server - FALSE
ssl_find_private_key server 74.125.21.99:443
ssl_find_private_key: no keys found
dissect_ssl3_hnd_hello_common found CLIENT RANDOM -> state 0x01

dissect_ssl enter frame #52 (first time)
ssl_session_init: initializing ptr 0000000007A64F20 size 712
association_find: TCP port 49442 found 0000000000000000
packet_from_server: is from server - FALSE
  conversation = 0000000004E42310, ssl_session = 0000000007A64F20
  record: offset = 0, reported_length_remaining = 208
dissect_ssl3_record: content_type 22 Handshake
decrypt_ssl3_record: app_data len 203, ssl state 0x00
association_find: TCP port 49442 found 0000000000000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 1 offset 5 length 199 bytes, remaining 208
packet_from_server: is from server - FALSE
ssl_find_private_key server 74.125.21.99:443
ssl_find_private_key: no keys found
dissect_ssl3_hnd_hello_common found CLIENT RANDOM -> state 0x01

dissect_ssl enter frame #53 (first time)
ssl_session_init: initializing ptr 0000000007A653B0 size 712
association_find: TCP port 49444 found 0000000000000000
packet_from_server: is from server - FALSE
  conversation = 0000000004E424B0, ssl_session = 0000000007A653B0
  record: offset = 0, reported_length_remaining = 208
dissect_ssl3_record: content_type 22 Handshake
decrypt_ssl3_record: app_data len 203, ssl state 0x00
association_find: TCP port 49444 found 0000000000000000
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 1 offset 5 length 199 bytes, remaining 208
packet_from_server: is from server - FALSE
ssl_find_private_key server 74.125.21.99:443
ssl_find_private_key: no keys found
dissect_ssl3_hnd_hello_common found CLIENT RANDOM -> state 0x01

dissect_ssl enter frame #58 (first time)
packet_from_server: is from server - TRUE
  conversation = 0000000004E42148, ssl_session = 0000000007A63130
  record: offset = 0, reported_length_remaining = 1430
dissect_ssl3_record found version 0x0303(TLS 1.2) -> state 0x11
dissect_ssl3_record: content_type 22 Handshake
decrypt_ssl3_record: app_data len 77, ssl state 0x11
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 2 offset 5 length 73 bytes, remaining 82
dissect_ssl3_hnd_hello_common found SERVER RANDOM -> state 0x13
ssl_restore_session Cannot restore using an empty SessionID
trying to use SSL keylog in C:\Users\David\sslkeylog.log

SSL Decrypt difficulty

$
0
0

I'm trying to decrypt an https stream between Safari (where I'm also running wireshark) and an openlitespeed server on a linux box. I have the private key for the server and it is in the proper format. I have disabled Diffie Hellman and have SSLv3 and TLSv1.2 enabled. I've used different combinations of SSLv3 and TLS versions and all have the same result. Wireshark is picking up the private key correctly, but I'm getting an error that no decoders are available. Here's the top of the debug log with SSLv3 and TLSv1.2, no DH, no SPDY. Wireshark build info below.

Wireshark SSL debug log

ssl_association_remove removing TCP 8095 - http handle 0x10a22a660
Private key imported: KeyID 85:8c:ff:ee:74:26:7b:8f:00:f2:39:d0:3e:35:f7:40:...
ssl_load_key: swapping p and q parameters and recomputing u
ssl_init IPv4 addr '10.0.0.25' (10.0.0.25) port '8095' filename '/Users/tommcd/lsws/server.key' password(only for p12 file) ''
ssl_init private key file /Users/tommcd/lsws/server.key successfully loaded.
association_add TCP port 8095 protocol http handle 0x10a22a660

dissect_ssl enter frame #4 (first time)
ssl_session_init: initializing ptr 0x10cba16e0 size 712
association_find: TCP port 49623 found 0x0
packet_from_server: is from server - FALSE
  conversation = 0x10ad01058, ssl_session = 0x10cba16e0
  record: offset = 0, reported_length_remaining = 177
dissect_ssl3_record: content_type 22 Handshake
decrypt_ssl3_record: app_data len 172, ssl state 0x00
association_find: TCP port 49623 found 0x0
packet_from_server: is from server - FALSE
decrypt_ssl3_record: using client decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 1 offset 5 length 168 bytes, remaining 177
packet_from_server: is from server - FALSE
ssl_find_private_key server 10.0.0.25:8095
ssl_find_private_key: testing 1 keys
dissect_ssl3_hnd_hello_common found CLIENT RANDOM -> state 0x01

dissect_ssl enter frame #6 (first time)
packet_from_server: is from server - TRUE
  conversation = 0x10ad01058, ssl_session = 0x10cba16e0
  record: offset = 0, reported_length_remaining = 877
dissect_ssl3_record found version 0x0303(TLS 1.2) -> state 0x11
dissect_ssl3_record: content_type 22 Handshake
decrypt_ssl3_record: app_data len 93, ssl state 0x11
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available
dissect_ssl3_handshake iteration 1 type 2 offset 5 length 89 bytes, remaining 98
dissect_ssl3_hnd_hello_common found SERVER RANDOM -> state 0x13
dissect_ssl3_hnd_srv_hello found CIPHER 0xC027 -> state 0x17
dissect_ssl3_hnd_srv_hello trying to generate keys
ssl_generate_keyring_material not enough data to generate key (0x17 required 0x37 or 0x57)
dissect_ssl3_hnd_srv_hello can't generate keyring material
  record: offset = 98, reported_length_remaining = 779
dissect_ssl3_record: content_type 22 Handshake
decrypt_ssl3_record: app_data len 555, ssl state 0x17
packet_from_server: is from server - TRUE
decrypt_ssl3_record: using server decoder
decrypt_ssl3_record: no decoder available

Wireshark build info

2014-09-11 16:52:00.660 defaults[75025:507]
The domain/default pair of (kCFPreferencesAnyApplication, AppleHighlightColor) does not exist
wireshark 1.12.1rc0-74-g3131847 (v1.12.0rc0-74-g3131847 from master-1.12)

Copyright 1998-2014 Gerald Combs <gerald@wireshark.org> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GTK+ 2.24.17, with Cairo 1.10.2, with Pango 1.30.1, with
GLib 2.36.0, with libpcap, with libz 1.2.3, without POSIX capabilities, with SMI
0.4.8, without c-ares, without ADNS, with Lua 5.1, without Python, with GnuTLS
2.12.19, with Gcrypt 1.5.0, with MIT Kerberos, with GeoIP, with PortAudio
V19-devel (built Jul 16 2013 19:05:52), with AirPcap.

Running on Mac OS X 10.9.4, build 13E28 (Darwin 13.3.0), with locale .UTF-8,
with libpcap version 1.3.0 - Apple version 41, with libz 1.2.5, GnuTLS 2.12.19,
Gcrypt 1.5.0, without AirPcap.
       Intel(R) Core(TM) i5-2500S CPU @ 2.70GHz

Built using llvm-gcc 4.2.1 (Based on Apple Inc. build 5658) (LLVM build
2336.9.00).

HTTPS over TLS - encripted type

$
0
0

Hi,

How does wireshark recognizes: Handshake protocol: Encrypted Handshake message. From the rfc, it doesn't seem to have this type? how can we recognize it from the bytes?

Diana & Shahar

HTTPS over TLS - encrypted type

$
0
0

Hi,

How does wireshark recognizes: Handshake protocol: Encrypted Handshake message. From the rfc, it doesn't seem to have this type? how can we recognize it from the bytes?

Diana & Shahar

where is "ssl_set_master_secret() called in Wireshark?

$
0
0

I'm not able to find where is it called? or how is it used? here is a link for this function from wireshark documentation.

Viewing all 276 articles
Browse latest View live