Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 3203] [PATCH] Tor Dissector

Date: Wed, 20 May 2009 10:43:34 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3203





--- Comment #2 from hoganrobert <robert@xxxxxxxxxxxxxxx>  2009-05-20 10:43:33 PDT ---
A sample dump is available at:
http://roberthogan.net/stuff/dissector/examples/

You can follow the instructions at:

http://roberthogan.net/stuff/dissector/tordissector-README.txt

under section 'CAPTURE AND DISSECT TOR TRAFFIC'.

I haven't been able to fuzz test the decoder yet because there is no fuzz
testing client available for Tor. To fuzz the raw packets myself I would have
to dump them unencrypted and then reverse perform the onion-layer crypto on
each as well as the SSL crypto. I can look into doing that but I may be some
time.

Also, I think it might be best to postpone applying this patch until the
complementary patch for Tor enters the 0.2.2.x series. I'll return here when
that happens.

Let me know about the fuzz testing requirements. I've followed your advise on
dissect_relay_resolve_payload().


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.