Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 3177] Jabber dissector: Detect and dissect SSL payload.

Date: Wed, 7 Jan 2009 09:51:55 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3177





--- Comment #3 from Florian Forster <wireshark.org@xxxxxxxxxxxxxxxxxxx>  2009-01-07 09:51:54 PDT ---
Created an attachment (id=2657)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=2657)
PCAP file with some encrypted Jabber traffic

Sample PCAP file with some Jabber/SSL traffic. This is an (unsuccessful) login
attempt. You can see the clear text communication, right until the <starttls />
token is sent (and answered with a <proceed /> token.

After than you see what appears to be a SSLv2 try and later on a successful
TLSv1 encryption setup. After some traffic the connection is closed due to
invalid credentials.


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.