Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 5423] SSL decryption does not work for Opera or Chromium c

Date: Sat, 20 Nov 2010 12:34:26 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5423

--- Comment #7 from Henry Story <henry.story@xxxxxxxxxxx> 2010-11-20 12:34:24 PST ---
(In reply to comment #6)
> I checked the Opera capture file and it shows that a Diffie Hellman cipher has
> been chosen. By the nature of the DH protocol, decryption will not work without
> supplying the keying material that is dynamically created. You can restrict the
> list of acceptable ciphers to circumvent this problem.

I don't think you can do this in Chromium, though it is possible in Opera.

I am still trying to work out how to disable it on the Java Server. Clearly it
would be useful if one can disable DH in the browser.

What I am wondering is how one should debug DH encoded sessions if they cannot
be 
parsed by Wireshark? This means that browsers should make available full TCP
histories
so that one can follow exactly how pages were build, including headers sent and
headers received.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.