[prev in list] [next in list] [prev in thread] [next in thread] 

List:       wireshark-users
Subject:    Re: [Wireshark-users] can't generate keyring material??
From:       "Sake Blok" <sake () euronet ! nl>
Date:       2009-07-22 19:29:07
Message-ID: 237CBC23538F4D73ABC751E7AF4FD4CF () local ! ionip ! nl
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Hi John,

In your preferences you have configured: \
"192.168.19.6,443,http,C:\keys\client.services.domain.com.pem", which means wireshark \
will look for traffic to 192.168.19.6 port 443, while in the trace, traffic has been \
sent to: 10.10.9.12 port 443 (see: "dissect_ssl server 10.10.9.12:443"). I think you \
have your client and server ip mixed and should use \
"10.10.9.12,443,http,C:\keys\client.services.domain.com.pem". Assuming \
"C:\keys\client.services.domain.com.pem" is actually the provite key of the server \
listening on 10.10.9.12:443.

Hope this helps,
Cheers,


Sake

  ----- Original Message ----- 
  From: John Peak -c- 
  To: wireshark-users@wireshark.org 
  Sent: Tuesday, July 21, 2009 8:36 PM
  Subject: [Wireshark-users] can't generate keyring material??



  I am unable to decrypt a capture even though I have a full SSL handshake and the \
key is being read properly.  I find the following two lines in the debug log, but do \
not know what they mean:   ssl_generate_keyring_material not enough data to generate \
key (0x17 required 0x37 or 0x57)   dissect_ssl3_hnd_srv_hello can't generate keyring \
material 

  Does anyone have any ideas?  More detailed trace below... 


  ssl_init keys string: 
  192.168.19.6,443,http,C:\keys\client.services.domain.com.pem 
  ssl_init found host entry \
192.168.19.6,443,http,C:\keys\client.services.domain.com.pem   ssl_init addr \
'192.168.19.6' port '443' filename 'C:\keys\client.services.domain.com.pem' \
password(only for p12 file) '(null)'   Private key imported: KeyID \
79:BC:DC:80:84:C8:2C:ED:4A:00:E3:E8:06:60:BF:21:...   ssl_init private key file \
C:\keys\client.services.domain.com.pem successfully loaded   association_add TCP port \
443 protocol http handle 031E6590 

  ...snip... 

  dissect_ssl enter frame #5091 (first time) 
  ssl_session_init: initializing ptr 0515FB98 size 564 
  association_find: TCP port 37935 found 00000000 
  packet_from_server: is from server - FALSE 
  dissect_ssl server 10.10.9.12:443 
  dissect_ssl can't find private key for this server! Try it again with universal \
port 0   dissect_ssl can't find private key for this server (universal port)! Try it \
again with universal address 0.0.0.0   dissect_ssl can't find any private key! 
    conversation = 0515F8C0, ssl_session = 0515FB98 
    record: offset = 0, reported_length_remaining = 110 
  dissect_ssl3_record: content_type 22 
  decrypt_ssl3_record: app_data len 105 ssl, state 0x00 
  association_find: TCP port 37935 found 00000000 
  packet_from_server: is from server - FALSE 
  decrypt_ssl3_record: using client decoder 
  decrypt_ssl3_record: no decoder available 
  dissect_ssl3_handshake iteration 1 type 1 offset 5 length 101 bytes, remaining 110 
  dissect_ssl3_hnd_hello_common found CLIENT RANDOM -> state 0x01 

  dissect_ssl enter frame #5092 (first time) 
    conversation = 050E0B30, ssl_session = 050E0D38 
    record: offset = 0, reported_length_remaining = 1029 
  dissect_ssl3_record: content_type 23 
  decrypt_ssl3_record: app_data len 1024 ssl, state 0x10 
  association_find: TCP port 37645 found 00000000 
  packet_from_server: is from server - FALSE 
  decrypt_ssl3_record: using client decoder 
  decrypt_ssl3_record: no decoder available 
  association_find: TCP port 37645 found 00000000 
  association_find: TCP port 443 found 044FE8B8 

  dissect_ssl enter frame #5093 (first time) 
    conversation = 050E8268, ssl_session = 050E8470 
    record: offset = 0, reported_length_remaining = 197 
  dissect_ssl3_record: content_type 23 
  decrypt_ssl3_record: app_data len 192 ssl, state 0x10 
  association_find: TCP port 443 found 044FE8B8 
  packet_from_server: is from server - TRUE 
  decrypt_ssl3_record: using server decoder 
  decrypt_ssl3_record: no decoder available 
  association_find: TCP port 443 found 044FE8B8 

  dissect_ssl enter frame #5095 (first time) 
    conversation = 050E8268, ssl_session = 050E8470 
    record: offset = 0, reported_length_remaining = 1380 
    need_desegmentation: offset = 0, reported_length_remaining = 1380 

  dissect_ssl enter frame #5097 (first time) 
    conversation = 050E8268, ssl_session = 050E8470 
    record: offset = 0, reported_length_remaining = 2760 
    need_desegmentation: offset = 0, reported_length_remaining = 2760 

  dissect_ssl enter frame #5099 (first time) 
    conversation = 050E8268, ssl_session = 050E8470 
    record: offset = 0, reported_length_remaining = 4140 
    need_desegmentation: offset = 0, reported_length_remaining = 4140 

  dissect_ssl enter frame #5101 (first time) 
    conversation = 050E8268, ssl_session = 050E8470 
    record: offset = 0, reported_length_remaining = 5520 
    need_desegmentation: offset = 0, reported_length_remaining = 5520 

  dissect_ssl enter frame #5103 (first time) 
    conversation = 050E8268, ssl_session = 050E8470 
    record: offset = 0, reported_length_remaining = 6900 
    need_desegmentation: offset = 0, reported_length_remaining = 6900 

  dissect_ssl enter frame #5105 (first time) 
    conversation = 050E8268, ssl_session = 050E8470 
    record: offset = 0, reported_length_remaining = 8280 
    need_desegmentation: offset = 0, reported_length_remaining = 8280 

  dissect_ssl enter frame #5107 (first time) 
    conversation = 050E8268, ssl_session = 050E8470 
    record: offset = 0, reported_length_remaining = 9660 
    need_desegmentation: offset = 0, reported_length_remaining = 9660 

  dissect_ssl enter frame #5108 (first time) 
    conversation = 050E8268, ssl_session = 050E8470 
    record: offset = 0, reported_length_remaining = 11040 
    need_desegmentation: offset = 0, reported_length_remaining = 11040 

  dissect_ssl enter frame #5110 (first time) 
    conversation = 050E8268, ssl_session = 050E8470 
    record: offset = 0, reported_length_remaining = 12420 
    need_desegmentation: offset = 0, reported_length_remaining = 12420 

  dissect_ssl enter frame #5112 (first time) 
    conversation = 050E8268, ssl_session = 050E8470 
    record: offset = 0, reported_length_remaining = 13309 
  dissect_ssl3_record: content_type 23 
  decrypt_ssl3_record: app_data len 13304 ssl, state 0x10 
  association_find: TCP port 443 found 044FE8B8 
  packet_from_server: is from server - TRUE 
  decrypt_ssl3_record: using server decoder 
  decrypt_ssl3_record: no decoder available 
  association_find: TCP port 443 found 044FE8B8 

  dissect_ssl enter frame #5115 (first time) 
    conversation = 0515F8C0, ssl_session = 0515FB98 
    record: offset = 0, reported_length_remaining = 1380 
    need_desegmentation: offset = 0, reported_length_remaining = 1380 

  dissect_ssl enter frame #5117 (first time) 
    conversation = 0515F8C0, ssl_session = 0515FB98 
    record: offset = 0, reported_length_remaining = 2760 
    need_desegmentation: offset = 0, reported_length_remaining = 2760 

  dissect_ssl enter frame #5119 (first time) 
    conversation = 0515F8C0, ssl_session = 0515FB98 
    record: offset = 0, reported_length_remaining = 4140 
    need_desegmentation: offset = 0, reported_length_remaining = 4140 

  dissect_ssl enter frame #5121 (first time) 
    conversation = 0515F8C0, ssl_session = 0515FB98 
    record: offset = 0, reported_length_remaining = 5520 
    need_desegmentation: offset = 0, reported_length_remaining = 5520 

  dissect_ssl enter frame #5123 (first time) 
    conversation = 0515F8C0, ssl_session = 0515FB98 
    record: offset = 0, reported_length_remaining = 6900 
    need_desegmentation: offset = 0, reported_length_remaining = 6900 

  dissect_ssl enter frame #5125 (first time) 
    conversation = 0515F8C0, ssl_session = 0515FB98 
    record: offset = 0, reported_length_remaining = 8280 
    need_desegmentation: offset = 0, reported_length_remaining = 8280 

  dissect_ssl enter frame #5128 (first time) 
    conversation = 0515F8C0, ssl_session = 0515FB98 
    record: offset = 0, reported_length_remaining = 8434 
  dissect_ssl3_record found version 0x0301 -> state 0x11 
  dissect_ssl3_record: content_type 22 
  decrypt_ssl3_record: app_data len 8429 ssl, state 0x11 
  association_find: TCP port 443 found 044FE8B8 
  packet_from_server: is from server - TRUE 
  decrypt_ssl3_record: using server decoder 
  decrypt_ssl3_record: no decoder available 
  dissect_ssl3_handshake iteration 1 type 2 offset 5 length 70 bytes, remaining 8434 
  dissect_ssl3_hnd_hello_common found SERVER RANDOM -> state 0x13 
  dissect_ssl3_hnd_srv_hello found CIPHER 0x000A -> state 0x17 
  dissect_ssl3_hnd_srv_hello trying to generate keys 
  ssl_generate_keyring_material not enough data to generate key (0x17 required 0x37 \
or 0x57)   dissect_ssl3_hnd_srv_hello can't generate keyring material 
  dissect_ssl3_handshake iteration 0 type 11 offset 79 length 2612 bytes, remaining \
8434   dissect_ssl3_handshake iteration 0 type 13 offset 2695 length 5731 bytes, \
remaining 8434   dissect_ssl3_handshake iteration 0 type 14 offset 8430 length 0 \
bytes, remaining 8434 

  dissect_ssl enter frame #5131 (first time) 
    conversation = 050E8BB8, ssl_session = 050E8DC0 
    record: offset = 0, reported_length_remaining = 1237 
  dissect_ssl3_record: content_type 23 
  decrypt_ssl3_record: app_data len 1232 ssl, state 0x10 
  association_find: TCP port 35796 found 00000000 
  packet_from_server: is from server - FALSE 
  decrypt_ssl3_record: using client decoder 
  decrypt_ssl3_record: no decoder available 
  association_find: TCP port 35796 found 00000000 
  association_find: TCP port 443 found 044FE8B8 

  dissect_ssl enter frame #5132 (first time) 
    conversation = 0515F8C0, ssl_session = 0515FB98 
    record: offset = 0, reported_length_remaining = 1380 
    need_desegmentation: offset = 0, reported_length_remaining = 1380 

  dissect_ssl enter frame #5133 (first time) 
    conversation = 0515F8C0, ssl_session = 0515FB98 
    record: offset = 0, reported_length_remaining = 1564 
  dissect_ssl3_record: content_type 22 
  decrypt_ssl3_record: app_data len 1559 ssl, state 0x17 
  association_find: TCP port 37935 found 00000000 
  packet_from_server: is from server - FALSE 
  decrypt_ssl3_record: using client decoder 
  decrypt_ssl3_record: no decoder available 
  dissect_ssl3_handshake iteration 1 type 11 offset 5 length 1421 bytes, remaining \
1564   dissect_ssl3_handshake iteration 0 type 16 offset 1430 length 130 bytes, \
remaining 1564   dissect_ssl3_handshake can't find private key 

  dissect_ssl enter frame #5136 (first time) 
    conversation = 0515F8C0, ssl_session = 0515FB98 
    record: offset = 0, reported_length_remaining = 139 
  dissect_ssl3_record: content_type 22 
  decrypt_ssl3_record: app_data len 134 ssl, state 0x17 
  association_find: TCP port 37935 found 00000000 
  packet_from_server: is from server - FALSE 
  decrypt_ssl3_record: using client decoder 
  decrypt_ssl3_record: no decoder available 
  dissect_ssl3_handshake iteration 1 type 15 offset 5 length 130 bytes, remaining 139 \


  dissect_ssl enter frame #5137 (first time) 
    conversation = 050E8BB8, ssl_session = 050E8DC0 
    record: offset = 0, reported_length_remaining = 197 
  dissect_ssl3_record: content_type 23 
  decrypt_ssl3_record: app_data len 192 ssl, state 0x10 
  association_find: TCP port 443 found 044FE8B8 
  packet_from_server: is from server - TRUE 
  decrypt_ssl3_record: using server decoder 
  decrypt_ssl3_record: no decoder available 
  association_find: TCP port 443 found 044FE8B8 

  dissect_ssl enter frame #5139 (first time) 
    conversation = 050E8BB8, ssl_session = 050E8DC0 
    record: offset = 0, reported_length_remaining = 1380 
    need_desegmentation: offset = 0, reported_length_remaining = 1380 
   
  John Peak
  jopeak@na.ko.com



------------------------------------------------------------------------------


  ___________________________________________________________________________
  Sent via:    Wireshark-users mailing list <wireshark-users@wireshark.org>
  Archives:    http://www.wireshark.org/lists/wireshark-users
  Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
               mailto:wireshark-users-request@wireshark.org?subject=unsubscribe


[Attachment #5 (text/html)]

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.6000.16850" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>Hi John,</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2>In your preferences you have configured: 
"192.168.19.6,443,http,C:\keys\client.services.domain.com.pem", which means 
wireshark will look for traffic to 192.168.19.6 port 443, while in the trace, 
traffic has been sent to: 10.10.9.12 port 443 (see: "dissect_ssl server 
10.10.9.12:443"). I think you have your client and server ip mixed and should 
use "10.10.9.12,443,http,C:\keys\client.services.domain.com.pem". Assuming 
"C:\keys\client.services.domain.com.pem" is actually the provite key of the 
server listening on 10.10.9.12:443.</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2>Hope this helps,</FONT></DIV>
<DIV><FONT face=Arial size=2>Cheers,</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2>Sake</FONT></DIV>
<DIV>&nbsp;</DIV>
<BLOCKQUOTE 
style="PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 \
2px solid; MARGIN-RIGHT: 0px">  <DIV style="FONT: 10pt arial">----- Original Message \
----- </DIV>  <DIV 
  style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B> 
  <A title=jopeak@na.ko.com href="mailto:jopeak@na.ko.com">John Peak -c-</A> 
  </DIV>
  <DIV style="FONT: 10pt arial"><B>To:</B> <A 
  title=wireshark-users@wireshark.org 
  href="mailto:wireshark-users@wireshark.org">wireshark-users@wireshark.org</A> 
  </DIV>
  <DIV style="FONT: 10pt arial"><B>Sent:</B> Tuesday, July 21, 2009 8:36 
PM</DIV>
  <DIV style="FONT: 10pt arial"><B>Subject:</B> [Wireshark-users] can't generate 
  keyring material??</DIV>
  <DIV><BR></DIV><BR><FONT face=sans-serif size=2>I am unable to decrypt a 
  capture even though I have a full SSL handshake and the key is being read 
  properly. &nbsp;I find the following two lines in the debug log, but do not 
  know what they mean:</FONT> <BR><FONT face=sans-serif size=2>&nbsp; 
  ssl_generate_keyring_material not enough data to generate key (0x17 required 
  0x37 or 0x57)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; 
  dissect_ssl3_hnd_srv_hello can't generate keyring material</FONT> 
  <BR><BR><FONT face=sans-serif size=2>Does anyone have any ideas? &nbsp;More 
  detailed trace below...</FONT> <BR><BR><BR><FONT face=sans-serif 
  size=2>ssl_init keys string:</FONT> <BR><FONT face=sans-serif 
  size=2>192.168.19.6,443,http,C:\keys\client.services.domain.com.pem</FONT> 
  <BR><FONT face=sans-serif size=2>ssl_init found host entry 
  192.168.19.6,443,http,C:\keys\client.services.domain.com.pem</FONT> <BR><FONT 
  face=sans-serif size=2>ssl_init addr '192.168.19.6' port '443' filename 
  'C:\keys\client.services.domain.com.pem' password(only for p12 file) 
  '(null)'</FONT> <BR><FONT face=sans-serif size=2>Private key imported: KeyID 
  79:BC:DC:80:84:C8:2C:ED:4A:00:E3:E8:06:60:BF:21:...</FONT> <BR><FONT 
  face=sans-serif size=2>ssl_init private key file 
  C:\keys\client.services.domain.com.pem successfully loaded</FONT> <BR><FONT 
  face=sans-serif size=2>association_add TCP port 443 protocol http handle 
  031E6590</FONT> <BR><BR><FONT face=sans-serif size=2>...snip...</FONT> 
  <BR><BR><FONT face=sans-serif size=2>dissect_ssl enter frame #5091 (first 
  time)</FONT> <BR><FONT face=sans-serif size=2>ssl_session_init: initializing 
  ptr 0515FB98 size 564</FONT> <BR><FONT face=sans-serif 
  size=2>association_find: TCP port 37935 found 00000000</FONT> <BR><FONT 
  face=sans-serif size=2>packet_from_server: is from server - FALSE</FONT> 
  <BR><FONT face=sans-serif size=2>dissect_ssl server 10.10.9.12:443</FONT> 
  <BR><FONT face=sans-serif size=2>dissect_ssl can't find private key for this 
  server! Try it again with universal port 0</FONT> <BR><FONT face=sans-serif 
  size=2>dissect_ssl can't find private key for this server (universal port)! 
  Try it again with universal address 0.0.0.0</FONT> <BR><FONT face=sans-serif 
  size=2>dissect_ssl can't find any private key!</FONT> <BR><FONT 
  face=sans-serif size=2>&nbsp; conversation = 0515F8C0, ssl_session = 
  0515FB98</FONT> <BR><FONT face=sans-serif size=2>&nbsp; record: offset = 0, 
  reported_length_remaining = 110</FONT> <BR><FONT face=sans-serif 
  size=2>dissect_ssl3_record: content_type 22</FONT> <BR><FONT face=sans-serif 
  size=2>decrypt_ssl3_record: app_data len 105 ssl, state 0x00</FONT> <BR><FONT 
  face=sans-serif size=2>association_find: TCP port 37935 found 00000000</FONT> 
  <BR><FONT face=sans-serif size=2>packet_from_server: is from server - 
  FALSE</FONT> <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: using 
  client decoder</FONT> <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: no 
  decoder available</FONT> <BR><FONT face=sans-serif 
  size=2>dissect_ssl3_handshake iteration 1 type 1 offset 5 length 101 bytes, 
  remaining 110 </FONT><BR><FONT face=sans-serif 
  size=2>dissect_ssl3_hnd_hello_common found CLIENT RANDOM -&gt; state 
  0x01</FONT> <BR><BR><FONT face=sans-serif size=2>dissect_ssl enter frame #5092 
  (first time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; conversation = 
  050E0B30, ssl_session = 050E0D38</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; record: offset = 0, reported_length_remaining = 1029</FONT> 
  <BR><FONT face=sans-serif size=2>dissect_ssl3_record: content_type 23</FONT> 
  <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: app_data len 1024 ssl, 
  state 0x10</FONT> <BR><FONT face=sans-serif size=2>association_find: TCP port 
  37645 found 00000000</FONT> <BR><FONT face=sans-serif 
  size=2>packet_from_server: is from server - FALSE</FONT> <BR><FONT 
  face=sans-serif size=2>decrypt_ssl3_record: using client decoder</FONT> 
  <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: no decoder 
  available</FONT> <BR><FONT face=sans-serif size=2>association_find: TCP port 
  37645 found 00000000</FONT> <BR><FONT face=sans-serif size=2>association_find: 
  TCP port 443 found 044FE8B8</FONT> <BR><BR><FONT face=sans-serif 
  size=2>dissect_ssl enter frame #5093 (first time)</FONT> <BR><FONT 
  face=sans-serif size=2>&nbsp; conversation = 050E8268, ssl_session = 
  050E8470</FONT> <BR><FONT face=sans-serif size=2>&nbsp; record: offset = 0, 
  reported_length_remaining = 197</FONT> <BR><FONT face=sans-serif 
  size=2>dissect_ssl3_record: content_type 23</FONT> <BR><FONT face=sans-serif 
  size=2>decrypt_ssl3_record: app_data len 192 ssl, state 0x10</FONT> <BR><FONT 
  face=sans-serif size=2>association_find: TCP port 443 found 044FE8B8</FONT> 
  <BR><FONT face=sans-serif size=2>packet_from_server: is from server - 
  TRUE</FONT> <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: using server 
  decoder</FONT> <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: no 
  decoder available</FONT> <BR><FONT face=sans-serif size=2>association_find: 
  TCP port 443 found 044FE8B8</FONT> <BR><BR><FONT face=sans-serif 
  size=2>dissect_ssl enter frame #5095 (first time)</FONT> <BR><FONT 
  face=sans-serif size=2>&nbsp; conversation = 050E8268, ssl_session = 
  050E8470</FONT> <BR><FONT face=sans-serif size=2>&nbsp; record: offset = 0, 
  reported_length_remaining = 1380</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; need_desegmentation: offset = 0, reported_length_remaining = 
  1380</FONT> <BR><BR><FONT face=sans-serif size=2>dissect_ssl enter frame #5097 
  (first time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; conversation = 
  050E8268, ssl_session = 050E8470</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; record: offset = 0, reported_length_remaining = 2760</FONT> 
  <BR><FONT face=sans-serif size=2>&nbsp; need_desegmentation: offset = 0, 
  reported_length_remaining = 2760</FONT> <BR><BR><FONT face=sans-serif 
  size=2>dissect_ssl enter frame #5099 (first time)</FONT> <BR><FONT 
  face=sans-serif size=2>&nbsp; conversation = 050E8268, ssl_session = 
  050E8470</FONT> <BR><FONT face=sans-serif size=2>&nbsp; record: offset = 0, 
  reported_length_remaining = 4140</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; need_desegmentation: offset = 0, reported_length_remaining = 
  4140</FONT> <BR><BR><FONT face=sans-serif size=2>dissect_ssl enter frame #5101 
  (first time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; conversation = 
  050E8268, ssl_session = 050E8470</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; record: offset = 0, reported_length_remaining = 5520</FONT> 
  <BR><FONT face=sans-serif size=2>&nbsp; need_desegmentation: offset = 0, 
  reported_length_remaining = 5520</FONT> <BR><BR><FONT face=sans-serif 
  size=2>dissect_ssl enter frame #5103 (first time)</FONT> <BR><FONT 
  face=sans-serif size=2>&nbsp; conversation = 050E8268, ssl_session = 
  050E8470</FONT> <BR><FONT face=sans-serif size=2>&nbsp; record: offset = 0, 
  reported_length_remaining = 6900</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; need_desegmentation: offset = 0, reported_length_remaining = 
  6900</FONT> <BR><BR><FONT face=sans-serif size=2>dissect_ssl enter frame #5105 
  (first time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; conversation = 
  050E8268, ssl_session = 050E8470</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; record: offset = 0, reported_length_remaining = 8280</FONT> 
  <BR><FONT face=sans-serif size=2>&nbsp; need_desegmentation: offset = 0, 
  reported_length_remaining = 8280</FONT> <BR><BR><FONT face=sans-serif 
  size=2>dissect_ssl enter frame #5107 (first time)</FONT> <BR><FONT 
  face=sans-serif size=2>&nbsp; conversation = 050E8268, ssl_session = 
  050E8470</FONT> <BR><FONT face=sans-serif size=2>&nbsp; record: offset = 0, 
  reported_length_remaining = 9660</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; need_desegmentation: offset = 0, reported_length_remaining = 
  9660</FONT> <BR><BR><FONT face=sans-serif size=2>dissect_ssl enter frame #5108 
  (first time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; conversation = 
  050E8268, ssl_session = 050E8470</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; record: offset = 0, reported_length_remaining = 11040</FONT> 
  <BR><FONT face=sans-serif size=2>&nbsp; need_desegmentation: offset = 0, 
  reported_length_remaining = 11040</FONT> <BR><BR><FONT face=sans-serif 
  size=2>dissect_ssl enter frame #5110 (first time)</FONT> <BR><FONT 
  face=sans-serif size=2>&nbsp; conversation = 050E8268, ssl_session = 
  050E8470</FONT> <BR><FONT face=sans-serif size=2>&nbsp; record: offset = 0, 
  reported_length_remaining = 12420</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; need_desegmentation: offset = 0, reported_length_remaining = 
  12420</FONT> <BR><BR><FONT face=sans-serif size=2>dissect_ssl enter frame 
  #5112 (first time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; conversation 
  = 050E8268, ssl_session = 050E8470</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; record: offset = 0, reported_length_remaining = 13309</FONT> 
  <BR><FONT face=sans-serif size=2>dissect_ssl3_record: content_type 23</FONT> 
  <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: app_data len 13304 ssl, 
  state 0x10</FONT> <BR><FONT face=sans-serif size=2>association_find: TCP port 
  443 found 044FE8B8</FONT> <BR><FONT face=sans-serif size=2>packet_from_server: 
  is from server - TRUE</FONT> <BR><FONT face=sans-serif 
  size=2>decrypt_ssl3_record: using server decoder</FONT> <BR><FONT 
  face=sans-serif size=2>decrypt_ssl3_record: no decoder available</FONT> 
  <BR><FONT face=sans-serif size=2>association_find: TCP port 443 found 
  044FE8B8</FONT> <BR><BR><FONT face=sans-serif size=2>dissect_ssl enter frame 
  #5115 (first time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; conversation 
  = 0515F8C0, ssl_session = 0515FB98</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; record: offset = 0, reported_length_remaining = 1380</FONT> 
  <BR><FONT face=sans-serif size=2>&nbsp; need_desegmentation: offset = 0, 
  reported_length_remaining = 1380</FONT> <BR><BR><FONT face=sans-serif 
  size=2>dissect_ssl enter frame #5117 (first time)</FONT> <BR><FONT 
  face=sans-serif size=2>&nbsp; conversation = 0515F8C0, ssl_session = 
  0515FB98</FONT> <BR><FONT face=sans-serif size=2>&nbsp; record: offset = 0, 
  reported_length_remaining = 2760</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; need_desegmentation: offset = 0, reported_length_remaining = 
  2760</FONT> <BR><BR><FONT face=sans-serif size=2>dissect_ssl enter frame #5119 
  (first time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; conversation = 
  0515F8C0, ssl_session = 0515FB98</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; record: offset = 0, reported_length_remaining = 4140</FONT> 
  <BR><FONT face=sans-serif size=2>&nbsp; need_desegmentation: offset = 0, 
  reported_length_remaining = 4140</FONT> <BR><BR><FONT face=sans-serif 
  size=2>dissect_ssl enter frame #5121 (first time)</FONT> <BR><FONT 
  face=sans-serif size=2>&nbsp; conversation = 0515F8C0, ssl_session = 
  0515FB98</FONT> <BR><FONT face=sans-serif size=2>&nbsp; record: offset = 0, 
  reported_length_remaining = 5520</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; need_desegmentation: offset = 0, reported_length_remaining = 
  5520</FONT> <BR><BR><FONT face=sans-serif size=2>dissect_ssl enter frame #5123 
  (first time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; conversation = 
  0515F8C0, ssl_session = 0515FB98</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; record: offset = 0, reported_length_remaining = 6900</FONT> 
  <BR><FONT face=sans-serif size=2>&nbsp; need_desegmentation: offset = 0, 
  reported_length_remaining = 6900</FONT> <BR><BR><FONT face=sans-serif 
  size=2>dissect_ssl enter frame #5125 (first time)</FONT> <BR><FONT 
  face=sans-serif size=2>&nbsp; conversation = 0515F8C0, ssl_session = 
  0515FB98</FONT> <BR><FONT face=sans-serif size=2>&nbsp; record: offset = 0, 
  reported_length_remaining = 8280</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; need_desegmentation: offset = 0, reported_length_remaining = 
  8280</FONT> <BR><BR><FONT face=sans-serif size=2>dissect_ssl enter frame #5128 
  (first time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; conversation = 
  0515F8C0, ssl_session = 0515FB98</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; record: offset = 0, reported_length_remaining = 8434</FONT> 
  <BR><FONT face=sans-serif size=2>dissect_ssl3_record found version 0x0301 
  -&gt; state 0x11</FONT> <BR><FONT face=sans-serif size=2>dissect_ssl3_record: 
  content_type 22</FONT> <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: 
  app_data len 8429 ssl, state 0x11</FONT> <BR><FONT face=sans-serif 
  size=2>association_find: TCP port 443 found 044FE8B8</FONT> <BR><FONT 
  face=sans-serif size=2>packet_from_server: is from server - TRUE</FONT> 
  <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: using server 
  decoder</FONT> <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: no 
  decoder available</FONT> <BR><FONT face=sans-serif 
  size=2>dissect_ssl3_handshake iteration 1 type 2 offset 5 length 70 bytes, 
  remaining 8434 </FONT><BR><FONT face=sans-serif 
  size=2>dissect_ssl3_hnd_hello_common found SERVER RANDOM -&gt; state 
  0x13</FONT> <BR><FONT face=sans-serif size=2>dissect_ssl3_hnd_srv_hello found 
  CIPHER 0x000A -&gt; state 0x17</FONT> <BR><FONT face=sans-serif 
  size=2>dissect_ssl3_hnd_srv_hello trying to generate keys</FONT> <BR><FONT 
  face=sans-serif size=2>ssl_generate_keyring_material not enough data to 
  generate key (0x17 required 0x37 or 0x57)</FONT> <BR><FONT face=sans-serif 
  size=2>dissect_ssl3_hnd_srv_hello can't generate keyring material</FONT> 
  <BR><FONT face=sans-serif size=2>dissect_ssl3_handshake iteration 0 type 11 
  offset 79 length 2612 bytes, remaining 8434 </FONT><BR><FONT face=sans-serif 
  size=2>dissect_ssl3_handshake iteration 0 type 13 offset 2695 length 5731 
  bytes, remaining 8434 </FONT><BR><FONT face=sans-serif 
  size=2>dissect_ssl3_handshake iteration 0 type 14 offset 8430 length 0 bytes, 
  remaining 8434 </FONT><BR><BR><FONT face=sans-serif size=2>dissect_ssl enter 
  frame #5131 (first time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; 
  conversation = 050E8BB8, ssl_session = 050E8DC0</FONT> <BR><FONT 
  face=sans-serif size=2>&nbsp; record: offset = 0, reported_length_remaining = 
  1237</FONT> <BR><FONT face=sans-serif size=2>dissect_ssl3_record: content_type 
  23</FONT> <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: app_data len 
  1232 ssl, state 0x10</FONT> <BR><FONT face=sans-serif size=2>association_find: 
  TCP port 35796 found 00000000</FONT> <BR><FONT face=sans-serif 
  size=2>packet_from_server: is from server - FALSE</FONT> <BR><FONT 
  face=sans-serif size=2>decrypt_ssl3_record: using client decoder</FONT> 
  <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: no decoder 
  available</FONT> <BR><FONT face=sans-serif size=2>association_find: TCP port 
  35796 found 00000000</FONT> <BR><FONT face=sans-serif size=2>association_find: 
  TCP port 443 found 044FE8B8</FONT> <BR><BR><FONT face=sans-serif 
  size=2>dissect_ssl enter frame #5132 (first time)</FONT> <BR><FONT 
  face=sans-serif size=2>&nbsp; conversation = 0515F8C0, ssl_session = 
  0515FB98</FONT> <BR><FONT face=sans-serif size=2>&nbsp; record: offset = 0, 
  reported_length_remaining = 1380</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; need_desegmentation: offset = 0, reported_length_remaining = 
  1380</FONT> <BR><BR><FONT face=sans-serif size=2>dissect_ssl enter frame #5133 
  (first time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; conversation = 
  0515F8C0, ssl_session = 0515FB98</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp; record: offset = 0, reported_length_remaining = 1564</FONT> 
  <BR><FONT face=sans-serif size=2>dissect_ssl3_record: content_type 22</FONT> 
  <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: app_data len 1559 ssl, 
  state 0x17</FONT> <BR><FONT face=sans-serif size=2>association_find: TCP port 
  37935 found 00000000</FONT> <BR><FONT face=sans-serif 
  size=2>packet_from_server: is from server - FALSE</FONT> <BR><FONT 
  face=sans-serif size=2>decrypt_ssl3_record: using client decoder</FONT> 
  <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: no decoder 
  available</FONT> <BR><FONT face=sans-serif size=2>dissect_ssl3_handshake 
  iteration 1 type 11 offset 5 length 1421 bytes, remaining 1564 
  </FONT><BR><FONT face=sans-serif size=2>dissect_ssl3_handshake iteration 0 
  type 16 offset 1430 length 130 bytes, remaining 1564 </FONT><BR><FONT 
  face=sans-serif size=2>dissect_ssl3_handshake can't find private key</FONT> 
  <BR><BR><FONT face=sans-serif size=2>dissect_ssl enter frame #5136 (first 
  time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; conversation = 0515F8C0, 
  ssl_session = 0515FB98</FONT> <BR><FONT face=sans-serif size=2>&nbsp; record: 
  offset = 0, reported_length_remaining = 139</FONT> <BR><FONT face=sans-serif 
  size=2>dissect_ssl3_record: content_type 22</FONT> <BR><FONT face=sans-serif 
  size=2>decrypt_ssl3_record: app_data len 134 ssl, state 0x17</FONT> <BR><FONT 
  face=sans-serif size=2>association_find: TCP port 37935 found 00000000</FONT> 
  <BR><FONT face=sans-serif size=2>packet_from_server: is from server - 
  FALSE</FONT> <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: using 
  client decoder</FONT> <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: no 
  decoder available</FONT> <BR><FONT face=sans-serif 
  size=2>dissect_ssl3_handshake iteration 1 type 15 offset 5 length 130 bytes, 
  remaining 139 </FONT><BR><BR><FONT face=sans-serif size=2>dissect_ssl enter 
  frame #5137 (first time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; 
  conversation = 050E8BB8, ssl_session = 050E8DC0</FONT> <BR><FONT 
  face=sans-serif size=2>&nbsp; record: offset = 0, reported_length_remaining = 
  197</FONT> <BR><FONT face=sans-serif size=2>dissect_ssl3_record: content_type 
  23</FONT> <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: app_data len 
  192 ssl, state 0x10</FONT> <BR><FONT face=sans-serif size=2>association_find: 
  TCP port 443 found 044FE8B8</FONT> <BR><FONT face=sans-serif 
  size=2>packet_from_server: is from server - TRUE</FONT> <BR><FONT 
  face=sans-serif size=2>decrypt_ssl3_record: using server decoder</FONT> 
  <BR><FONT face=sans-serif size=2>decrypt_ssl3_record: no decoder 
  available</FONT> <BR><FONT face=sans-serif size=2>association_find: TCP port 
  443 found 044FE8B8</FONT> <BR><BR><FONT face=sans-serif size=2>dissect_ssl 
  enter frame #5139 (first time)</FONT> <BR><FONT face=sans-serif size=2>&nbsp; 
  conversation = 050E8BB8, ssl_session = 050E8DC0</FONT> <BR><FONT 
  face=sans-serif size=2>&nbsp; record: offset = 0, reported_length_remaining = 
  1380</FONT> <BR><FONT face=sans-serif size=2>&nbsp; need_desegmentation: 
  offset = 0, reported_length_remaining = 1380</FONT> <BR><FONT face=sans-serif 
  size=2>&nbsp;<BR>John Peak<BR>jopeak@na.ko.com<BR></FONT>
  <P>
  <HR>

  <P></P>___________________________________________________________________________<BR>Sent \
  via:&nbsp;&nbsp;&nbsp; Wireshark-users mailing list 
  &lt;wireshark-users@wireshark.org&gt;<BR>Archives:&nbsp;&nbsp;&nbsp; 
  http://www.wireshark.org/lists/wireshark-users<BR>Unsubscribe: 
  https://wireshark.org/mailman/options/wireshark-users<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \
  mailto:wireshark-users-request@wireshark.org?subject=unsubscribe</BLOCKQUOTE></BODY></HTML>




___________________________________________________________________________
Sent via:    Wireshark-users mailing list <wireshark-users@wireshark.org>
Archives:    http://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
             mailto:wireshark-users-request@wireshark.org?subject=unsubscribe

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic