Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-users: Re: [Wireshark-users] Debugging SSHv2, decrypting data

From: Kevin <masonke@xxxxxxxxx>
Date: Sun, 12 Oct 2008 20:00:33 -0700
You can add -v -vv -vvv to the ssh client command line to have it display detailed debugging information. From man ssh: -v Verbose mode. Causes ssh to print debugging messages about its progress. This is helpful in debugging connection, authentica- tion, and configuration problems. Multiple -v options increase
             the verbosity.  The maximum is 3.

This isnt packet decoding, but will help with the troubleshooting.

Kevin

On Oct 10, 2008, at 14:48 , Stephen Fisher wrote:

On Fri, Oct 10, 2008 at 04:49:20PM -0400, Forrest Aldrich wrote:

I'm working on tracking down a bizarre interaction between 2 remote
systems.

In order to track this down, I'm looking for a means to decrypt the
session and packet contents from a *.pcap file, so I can see exactly
what data are in this packet that's causing the connection to slam
shut (only happens in SSH).

Wireshark does not support decrypting SSH sessions at this time.

You may have already tried this, but I usually put the OpenSSH daemon
(if that's what you're using) on the machine you're connecting to to
debug/interactive (non-daemon/background) mode.


Steve

_______________________________________________
Wireshark-users mailing list
Wireshark-users@xxxxxxxxxxxxx
https://wireshark.org/mailman/listinfo/wireshark-users