You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Problems encountered when generating "tls" information for TLS flows, specifically in the "srlt" sequence.
After the Client Change Cipher Spec message in a TLS flow, the next handshake message which is encypted is incorrectly annotated as "tp":22, "hs_types":[0,0]. As I think, the "hs_types" should be none here since this message is encrypted and cannot be identified.
There seems to be some failures in generating correct TLS content types within the "srlt" sequence. Here are some examples (the numbers without brackets are TLS content types, thoses in brackets are specific TLS handshake types):
[[1], [2], [11], [12], [14], [16], 20, 22, 23, 23, [4], 20, 22, 23, 23, 23, 23, 23, 0, 23, 23, 23, 23, 23, 34, 150, 3, 140, 67]
We can see that sometimes the content type numbers are beyond the scope of 20, 21, 22 and 23, which is nonsense. The correct type numbers are actually 23 after checking the original pcap files (not all are verified).
The text was updated successfully, but these errors were encountered:
wtoxin
changed the title
Incorrect TLS handshake type for encrypted handshake messages in a TLS flow
Incorrect TLS handshake types and TLS content types when generating TLS session metadata
Nov 7, 2019
Problems encountered when generating "tls" information for TLS flows, specifically in the "srlt" sequence.
We can see that sometimes the content type numbers are beyond the scope of 20, 21, 22 and 23, which is nonsense. The correct type numbers are actually 23 after checking the original pcap files (not all are verified).
The text was updated successfully, but these errors were encountered: