Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 3203] [PATCH] Tor Dissector

Date: Wed, 20 May 2009 14:59:34 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3203





--- Comment #5 from hoganrobert <robert@xxxxxxxxxxxxxxx>  2009-05-20 14:59:34 PDT ---
sorry, didn't mean to be obtuse: I have fuzzed a sample payload using the
wireshark tools but since the tor payload is ssl-encrypted this only real tests
the existing ssl dissector, since ssl decryption uniformly fails. A true fuzz
test will involve fuzzing both the ssl plaintext payload and also the tor
plaintext payload which is wrapped in up to three layers of aes encryption. I
will look into doing this before requesting check-in.


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.