Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 5692] TLSv1 ignored unknown record

Date: Mon, 14 Feb 2011 06:31:27 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5692

Sake <sake@xxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |INVALID

--- Comment #1 from Sake <sake@xxxxxxxxxx> 2011-02-14 06:31:25 PST ---
(In reply to comment #0)
> In a regular TLS stream the regular server replies (the requests are properly
> decoded) are marked as "ignored unknown records", see attached capture. The
> browser did receive the image properly.

You have to enable reassembly in the TCP and SSL dissectors to make Wireshark
aware of SSL records spanning multiple packets. Once you do, Wireshark will
show the frames as "[TCP segment of a reassembled PDU]" and "Application Data".

In order for Wireshark to even attempt to do reassembly, all frames need to
pass the checksum check. In your tracefile (made on the server if I'm correct),
the checksums of all outgoing packets are bad. Which indicates TCP checksum
offloading to the NIC. So you need to disable checksum checking too...

The relevant settings are:

tcp.check_checksum: FALSE
tcp.desegment_tcp_streams: TRUE

ssl.desegment_ssl_records: TRUE
ssl.desegment_ssl_application_data: TRUE

These settings are the default, so you must have changed one of them somewhere
across the line...

Hope this helps. Closing the bug as invalid as all seems to work as designed
given the proper settings.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.