> I have been trying that. it shows handshake for TLSv1 for some sites and
> not for others.
>
> I might be using it wrong.. but am not also sure if it supports analyzing
> https by default..
>
> Have you tried it ?

If Wireshark doesn't work, try Microsoft Network Monitor (NetMon).

Wireshark is written using OpenSSL. NetMon is written using Microosft's CryptoAPI, and doesn't use OpenSSL. In case that makes a difference in your SSL packet analysis.

It is not open source. It is freeware, supplied by the platform vendor. Actually, part of it is open source, some of the MS filters are on CodePlex.com.

NetMon has 2 advantages over Wireshark:
1) Written by platform vendor with their understanding of the protocol they implemented, so useful for some nuances of Windows-centric protocols (esp. MS Office-related). [1] 2) Most (all?) open source alternatives rely on WinPCap, which hasn't been maintained in years[2], unlike Unix LibPcap, or Microsoft NetMon driver. So modern sniffing on Windows can have problems with Wireshark and other WinPCap-dependent software.
[1]http://social.technet.microsoft.com/Forums/en/netmon/thread/86c8614c-d0f1-42d0-814c-e85529964861
[2]http://www.winpcap.org/pipermail/winpcap-users/2012-December/004690.html

MSDN tries hard to show you outdated NetMon 2.x info, pay attention only to 3.x pages.
http://www.microsoft.com/en-us/download/details.aspx?id=4865
http://nmexperts.codeplex.com/
http://nmparsers.codeplex.com/

Also, depending on your SSL usage, try Microsoft Fiddler (Fiddler2). It is their developer tool for analysing web app dev, including -- I believe -- HTTPS traffic. Useful in same case as #1 above.
http://www.fiddler2.com/

Just for grins, try using Wireshark on Linux, using LibPcap, instead of WinPcap, to see if that impacts your results.

HTH.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to