You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Segmented packets are read in and misinterpreted as SSLv2 handshakes.
Packets are often segmented TLS application Data packets when compared to Wireshark.
Scapy version
2.5.0
Python version
3.12.1
Operating system
Windows 11
Additional environment information
Develop a class in the SSLv2 handshake that recognizes and ignores segmented packets.
How to reproduce
sniff TLS packets and segmented TLS packets get misinterpreted as SSLv2_handshakes.
Actual result
No response
Expected result
No response
Related resources
No response
The text was updated successfully, but these errors were encountered:
See the following I've raised the warning for UnknownCipherSuite as an error, and have been logging them in my packet captures. In comparison to the packet captures in Wireshark. Application Data is being read as SSLv2ClientMasterkey.
See the zip file containing code I'm using to capture packets with warning raised as error and logged. Tests for unknown cipher suite.zip
Just a note the first two captures in the log file are in the pcap. To save longevity of analysis. Only meant to do two to save having to analyze a bunch of packets.
Brief description
Segmented packets are read in and misinterpreted as SSLv2 handshakes.
Packets are often segmented TLS application Data packets when compared to Wireshark.
Scapy version
2.5.0
Python version
3.12.1
Operating system
Windows 11
Additional environment information
Develop a class in the SSLv2 handshake that recognizes and ignores segmented packets.
How to reproduce
sniff TLS packets and segmented TLS packets get misinterpreted as SSLv2_handshakes.
Actual result
No response
Expected result
No response
Related resources
No response
The text was updated successfully, but these errors were encountered: