[gnutls-dev] Possible bug in GnuTLS AES/SHA1
James Westby
jw+debian at jameswestby.net
Mon Jan 8 23:32:22 CET 2007
Apologies for posting again so quickly, but I remembered something else
that I wanted to mention in the mail.
When opening the tcpdumps in wireshark there is a breakdown of the
handshake. Wireshark interprets it like this (without the version
negotiation patch applied):
Server Client
Hello (SSL3.0 and TLS1.0) no compression
13 cipher suites
0x0035 0x002f 0x000a 0x0016 0x0013 0x0005 0x0004
0x0009 0x0012 0x0008 0x0003 0x0011 0x0014
Hello (TLS1.0) no compression
0x002f TLS_RSA_WITH_AES_128_CBC_SHA
Certificate, Certificate request, Hello done
Certificate (none)
Client key exchange, Change cipher spec,
Encrypted handshake
Change cipher spec
Encrypted handshake
Encrypted alert (Bad record MAC).
Which reads reasonable to me.
As for debugging the actual data on the wire I'm not sure of the best
approach for doing this.
Thanks,
James
--
James Westby -- GPG Key ID: B577FE13 -- http://jameswestby.net/
seccure key - (3+)k7|M*edCX/.A:n*N!>|&7U.L#9E)Tu)T0>AM - secp256r1/nistp256
More information about the Gnutls-dev
mailing list