Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Ethereal-dev: Re: [Ethereal-dev] Decoding some more SSL cipher suites in packet-ssl.c

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

From: Marco van den Bovenkamp <marco@xxxxxxxxxxxxxxxxxxx>
Date: Sat, 17 Jul 2004 12:24:45 +0200
Marco van den Bovenkamp wrote:
Hello,

Whilst playing with the Eudora Palm mail client, Qpopper and POP3-over-SSL, I noticed that Eudora advertised a cipher suite Ethereal 0.10.5 didn't recognize.

Some Googling found an IETF draft (http://research.sun.com/projects/crypto/draft-ietf-tls-ecc-05.txt) defining it, and a few others.

The attached patch (relative to the 2004-07-16 snapshot) adds decoding them to packet-ssl.c.

New patch, adding the Camellia-based cipher suites from http://www.ietf.org/internet-drafts/draft-ietf-tls-camellia-04.txt as well. It replaces the previous patch.

--

		Regards,

			Marco.
*** packet-ssl.c	Thu Jun  3 04:36:39 2004
--- packet-ssl.c.new	Sat Jul 17 12:19:43 2004
***************
*** 42,47 ****
--- 42,59 ----
   *
   * for PCT 1 draft specs.
   *
+  * See 
+  *
+  *	http://research.sun.com/projects/crypto/draft-ietf-tls-ecc-05.txt
+  *
+  * for Elliptic Curve Cryptography cipher suites.
+  *
+  * See
+  *
+  * 	http://www.ietf.org/internet-drafts/draft-ietf-tls-camellia-04.txt
+  *
+  * for Camellia-based cipher suites.
+  *
   * Notes:
   *
   *   - Uses conversations in a no-malloc fashion.  Since we just want to
***************
*** 347,352 ****
--- 359,376 ----
      { 0x000038, "TLS_DHE_DSS_WITH_AES_256_CBC_SHA" },
      { 0x000039, "TLS_DHE_RSA_WITH_AES_256_CBC_SHA" },
      { 0x00003A, "TLS_DH_anon_WITH_AES_256_CBC_SHA" },
+     { 0x000041, "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA" },
+     { 0x000042, "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA" },
+     { 0x000043, "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA" },
+     { 0x000044, "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA" },
+     { 0x000045, "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA" },
+     { 0x000046, "TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA" },
+     { 0x000047, "TLS_ECDH_ECDSA_WITH_NULL_SHA" },
+     { 0x000048, "TLS_ECDH_ECDSA_WITH_RC4_128_SHA" },
+     { 0x000049, "TLS_ECDH_ECDSA_WITH_DES_CBC_SHA" },
+     { 0x00004A, "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA" },
+     { 0x00004B, "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA" },
+     { 0x00004C, "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA" },
      { 0x000060, "TLS_RSA_EXPORT1024_WITH_RC4_56_MD5" },
      { 0x000061, "TLS_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5" },
      { 0x000062, "TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA" },
***************
*** 354,359 ****
--- 378,389 ----
      { 0x000064, "TLS_RSA_EXPORT1024_WITH_RC4_56_SHA" },
      { 0x000065, "TLS_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA" },
      { 0x000066, "TLS_DHE_DSS_WITH_RC4_128_SHA" },
+     { 0x000084, "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA" },
+     { 0x000085, "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA" },
+     { 0x000086, "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA" },
+     { 0x000087, "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA" },
+     { 0x000088, "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA" },
+     { 0x000089, "TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA" },
      /* these from http://www.mozilla.org/projects/
           security/pki/nss/ssl/fips-ssl-ciphersuites.html */
      { 0x00fefe, "SSL_RSA_FIPS_WITH_DES_CBC_SHA"},