Re: [Wireshark-users] Malformed SSL - Is it really?

2007-04-13 Thread Sake Blok
On Thu, Apr 12, 2007 at 11:24:48PM -0400, Small, James wrote:
> 
> > > > [Malformed Packet: SSL]
> > > >
> > > > Is the packet really malformed, or is it possible that Wireshark
> > > > doesn't support the cipher being used?  If so, is there any way to
> > > > tell if the packet is really malformed versus Wireshark just not
> > > > understanding it/the encryption scheme?
> > 
> > Oh, it could also be that there are frames missing in the tcp-stream.
> > That means the ssl-dissector can't reassemble it's stream properly
> > and that creates a "malformed" packet. You can check this by
> > disabling the "Allow subdissector to reassemble TCP streams"
> > option in the tcp protocol preferences. The "malformed" message
> > will then disappear.
> > 
> 
> [Small, James] Sake, when I do that, these "SSL" frames no longer show
> up as malformed, instead they show up as unreassembled:

That's exactly what I was aiming at...

> I guess I'm not sure if that's an error or not.  I was capturing from
> the client, but does that mean that a reply from the server might have
> gotten lost and caused this problem?  But if that were the case, I
> should see a missing sequence number or retransmission in the stream
> which I don't.

Are you sure you see all packets of the tcp-session? Sometimes you
do not see a retransmission because the endpoints did get all the
data, but the capturing system did not (I have seen SPAN-ports
drop 0,1% of packets, even on expensive hardware, I'm not sure 
if they still drop packets, but you always have to be aware that
you might not see all the packets that were there).

> > > Could you file this as a bug on bugzilla with a sample trace
> > > (with the whole tcp-session if possible)?
> > 
> 
> [Small, James] No problem if there's something wrong - at this point I'm
> not sure.

I'm not sure either, is it possible for you to filter out this one
TCP-session and send it to the list (or me)?

Cheers,


Sake
___
Wireshark-users mailing list
[EMAIL PROTECTED]
http://www.wireshark.org/mailman/listinfo/wireshark-users


Re: [Wireshark-users] Malformed SSL - Is it really?

2007-04-12 Thread Small, James
Hi Sake,

> > > [Malformed Packet: SSL]
> > >
> > > Is the packet really malformed, or is it possible that Wireshark
> > > doesn't support the cipher being used?  If so, is there any way to
> > > tell if the packet is really malformed versus Wireshark just not
> > > understanding it/the encryption scheme?
> 
> Oh, it could also be that there are frames missing in the tcp-stream.
> That means the ssl-dissector can't reassemble it's stream properly
> and that creates a "malformed" packet. You can check this by
> disabling the "Allow subdissector to reassemble TCP streams"
> option in the tcp protocol preferences. The "malformed" message
> will then disappear.
> 

[Small, James] Sake, when I do that, these "SSL" frames no longer show
up as malformed, instead they show up as unreassembled:
No. TimeSourceDestination   Protocol
Src Port Dst Port Delta   Info
182 7.590722172.24.101.100172.24.100.107SSL
443  1096 0.099158[Unreassembled Packet]

Frame 182 (1314 bytes on wire, 1314 bytes captured)
Ethernet II, Src: StBernar_00:8c:e5 (00:07:e8:00:8c:e5), Dst:
Dell_00:be:6b (00:12:3f:00:be:6b)
Internet Protocol, Src: 172.24.101.100 (172.24.101.100), Dst:
172.24.100.107 (172.24.100.107)
Transmission Control Protocol, Src Port: 3128 (3128), Dst Port: 1096
(1096), Seq: 2330, Ack: 1407, Len: 1260
Source port: 3128 (3128)
Destination port: 1096 (1096)
Sequence number: 2330(relative sequence number)
[Next sequence number: 3590(relative sequence number)]
Acknowledgement number: 1407(relative ack number)
Header length: 20 bytes
Flags: 0x10 (ACK)
Window size: 65535
Checksum: 0x3d02 [correct]
[SEQ/ACK analysis]
Hypertext Transfer Protocol
Secure Socket Layer
[Unreassembled Packet: SSL]


I guess I'm not sure if that's an error or not.  I was capturing from
the client, but does that mean that a reply from the server might have
gotten lost and caused this problem?  But if that were the case, I
should see a missing sequence number or retransmission in the stream
which I don't.

Also, as you suspected, transmitting via port 3128 is to a proxy, in
this case a St. Bernard iPrism Proxy Appliance.

> > Could you file this as a bug on bugzilla with a sample trace
> > (with the whole tcp-session if possible)?
> 

[Small, James] No problem if there's something wrong - at this point I'm
not sure.

Thanks,
  --Jim
___
Wireshark-users mailing list
[EMAIL PROTECTED]
http://www.wireshark.org/mailman/listinfo/wireshark-users


Re: [Wireshark-users] Malformed SSL - Is it really?

2007-04-12 Thread Sake Blok
On Thu, Apr 12, 2007 at 10:09:41PM +0200, Sake Blok wrote:
> > Transmission Control Protocol, Src Port: 3128 (3128), Dst Port: 1136 
> > (1136), Seq: 9184, Ack: 1341, Len: 1260
> > Hypertext Transfer Protocol
> > Secure Socket Layer
> > TLSv1 Record Layer: Application Data Protocol: http
> > Content Type: Application Data (23)
> > Version: TLS 1.0 (0x0301)
> > Length: 1048
> > Encrypted Application Data: 
> > 986EF11CE4141826D529372C664768C27C0E749FFC4BB768...
> > [Malformed Packet: SSL]
> > 
> > Is the packet really malformed, or is it possible that Wireshark 
> > doesn't support the cipher being used?  If so, is there any way to 
> > tell if the packet is really malformed versus Wireshark just not
> > understanding it/the encryption scheme?

Oh, it could also be that there are frames missing in the tcp-stream.
That means the ssl-dissector can't reassemble it's stream properly
and that creates a "malformed" packet. You can check this by
disabling the "Allow subdissector to reassemble TCP streams"
option in the tcp protocol preferences. The "malformed" message
will then disappear.

> Could you file this as a bug on bugzilla with a sample trace
> (with the whole tcp-session if possible)?

Only if it is not a reassembly issue of course :)

Cheers,


Sake
___
Wireshark-users mailing list
[EMAIL PROTECTED]
http://www.wireshark.org/mailman/listinfo/wireshark-users


Re: [Wireshark-users] Malformed SSL - Is it really?

2007-04-12 Thread Sake Blok
On Tue, Apr 10, 2007 at 11:07:29AM -0400, Small, James wrote:
> Hello,
> 
> When using Wireshark 0.99.5 on Windows, sometimes I see:
> [Malformed Packet: SSL]
> 
> e.g.:
> No. TimeSourceDestination   Protocol Src 
> Port Dst Port Delta   Info
> 381 15.301101   172.24.101.100172.24.100.107TLSv1443  
> 1136 0.017923Application Data, [Malformed Packet]
> Frame 381 (1314 bytes on wire, 1314 bytes captured)
> Arrival Time: Apr 10, 2007 10:20:40.195898000
> [Time delta from previous packet: 0.017923000 seconds]
> [Time since reference or first frame: 15.301101000 seconds]
> Frame Number: 381
> Packet Length: 1314 bytes
> Capture Length: 1314 bytes
> [Frame is marked: True]
> [Protocols in frame: eth:ip:tcp:http:ssl]
> [Coloring Rule Name: HTTP]
> [Coloring Rule String: http || tcp.port == 80]
> Ethernet II, Src: StBernar_00:8c:e5 (00:07:e8:00:8c:e5), Dst: Dell_00:be:6b 
> (00:12:3f:00:be:6b)
> Internet Protocol, Src: 172.24.101.100 (172.24.101.100), Dst: 172.24.100.107 
> (172.24.100.107)
> Transmission Control Protocol, Src Port: 3128 (3128), Dst Port: 1136 (1136), 
> Seq: 9184, Ack: 1341, Len: 1260
> Hypertext Transfer Protocol
> Secure Socket Layer
> TLSv1 Record Layer: Application Data Protocol: http
> Content Type: Application Data (23)
> Version: TLS 1.0 (0x0301)
> Length: 1048
> Encrypted Application Data: 
> 986EF11CE4141826D529372C664768C27C0E749FFC4BB768...
> [Malformed Packet: SSL]
> 
> Is the packet really malformed, or is it possible that Wireshark 
> doesn't support the cipher being used?  If so, is there any way to 
> tell if the packet is really malformed versus Wireshark just not
> understanding it/the encryption scheme?

Hmmm... it does not look like an unsupported cipher, because then the
whole session should be malformed. And next to that, Wireshark gives a
message about unsupported ciphers...

If you look at the frame info, it shows protocols in frame:
[Protocols in frame: eth:ip:tcp:http:ssl]

From the uses tcp-port (3128) it shows that this is a proxied SSL
session (many proxies use 3128 as proxy-port). I think somehow 
the SSL dissector has problems with SSL over a proxy.

Could you file this as a bug on bugzilla with a sample trace
(with the whole tcp-session if possible)?

Cheers,


Sake
___
Wireshark-users mailing list
[EMAIL PROTECTED]
http://www.wireshark.org/mailman/listinfo/wireshark-users