Hi, How does wireshark recognizes: Handshake protocol: Encrypted Handshake message. From the rfc, it doesn't seem to have this type? how can we recognize it from the bytes? Diana & Shahar asked 18 Mar '15, 06:33 Dianalab9 edited 19 Mar '15, 03:42 grahamb ♦ |
3 Answers:
Wireshark lists this as an "Encrypted Handshake" message because:
When you tell Wireshark to do SSL decryption (by using the private key of the server), the message would have been decrypted and you would see that it is indeed one of the listed handshake messages. answered 19 Mar '15, 02:59 SYN-bit ♦♦ |
Handshake messages are encrypted after ChangeCipherSpec message with appropriate preceding parameters. From RFC 5246 (TLS 1.2), section 7.4. Handshake protocol:
The current state is described in section 6.1. Connection states:
In practice, you will see unencrypted Client Hello, Server Hello, Certificate, Server Key Exchange, Certificate Request, Certificate Verify and Client Key Exchange messages. The Finished handshake message is encrypted since it occurs after the Change Cipher Spec message. answered 19 Mar '15, 06:26 Lekensteyn Thank you. The above helped but we have one more question: We have a single frame that the beginning of it's SSL Bytes are (Hex) 16 03 03 00 40 01 ..... 16 - is content type HANDSHAKE 03 03 - version 00 40 - length 01 - message type 'Client Hello' For some reason wireshark recognizes it as Encrypted Handshake Message. We assume wireshark is right but we don't understand how it recognizes it as Encrypted Handshake Message instead of Client Hello. Can you please explain? (20 Jul '15, 02:27) Dianalab9 Does it really dissect said part as encrypted handshake message? ContentType 16 (=22, Handshake) and HandshakeType 1 (ClientHello) can actually be dissected. Got a packet capture that you can share? (20 Jul '15, 03:41) Lekensteyn (21 Jul '15, 05:12) Dianalab9 I've published below partial screen shot; can you take a look? (21 Jul '15, 05:13) Dianalab9 @Dianalab9 that screenshot is not helpful, it contains no additional information. Can you reproduce it with a recent Wireshark stable version, say, the 1.12.z series? (22 Jul '15, 11:54) Lekensteyn |
You are talking about HTTP over TLS, so you should look for SSL.
answered 18 Mar '15, 07:41 Roland We've looked at this but it only has the following: case hello_request: HelloRequest; case client_hello: ClientHello; case server_hello: ServerHello; case certificate: Certificate; case server_key_exchange: ServerKeyExchange; case certificate_request: CertificateRequest; case server_hello_done: ServerHelloDone; case certificate_verify: CertificateVerify; case client_key_exchange: ClientKeyExchange; case finished: Finished; How do we recognize: "Handshake protocol: Encrypted Handshake message" (18 Mar '15, 08:19) Dianalab9 What are you trying to achieve? Do you want to filter only for packets that contain "Encrypted Handshake message" or do you want to write some script/program and you want to know how to identify it? (18 Mar '15, 12:29) Roland |
Thanks alot!