Hello, I have the following case: I am trying to decrypt the communication between a client and a web server. I have the private key and I have setup wireshark correctly since I an able to decrypt most of the traffic. However for I face the following issue: Messages from client to server are not decrypted while messages from server to clients are decrypted correctly. I observed the following: When the client sends the Change Cipher Spec message to the server, initially this message reports as finished. Immediately this message is retransmitted and reports Encrypted Handshake Message.
I think that this may cause my problems. Can you please provide some assistance? asked 06 Aug '13, 06:24 it_trb edited 06 Aug '13, 08:59 grahamb ♦ |
2 Answers:
It looks like all outbound packets are captured twice causing wireshark to interpret them as 'retransmissions'. You need to look at the ip.id to see if it is a real retransmit or a duplicte packet. Telling from the delta time I assume it's the latter. I suggest to run answered 06 Aug '13, 20:34 mrEEde2 |
I experienced the same issue. A retransmitted "Change Cipher Spec" message (from server to client) causes the wrong decryption of all the TLS messages received at the client side. By ignoring the retransmitted CCS (Right Click -> Ignore Packet (toggle) ) the decryption works fine for me. answered 12 Oct '15, 03:51 theo66 |
That sounds like a bug. Could you raise a bug report at the Wireshark bugzilla, and attach a capture illustrating the problem so it can be fixed?
Unfortunately I can't attach my capture traces, however I don't think it's a bug. I discovered that by enabling the TCP option "Do not call subdissector for error packets" the TLS sessions are correctly decripted without the "hack" I mention before.