Hi,

> It  seems to me that the way Wireshark handles some aspects of the SSL
> communication  is wrong or at least inconsistent.

It is a "feature" of the Wireshark BER ASN.1 handling (packet-ber.c) -
only the Value of the ASN.1 Tag/Length/Value are selected - which to
be fair is often what you want.

Nothing is wrong with the SSL communication - or indeed inconsistent.
Wireshark just currently doesn't do what you would like/expect it to
do. But that can be changed! 8^)

> Let us take a packet
> where  the  server  furnishes its certificate. If we select the string
> "Certificate:  3082..." in the middle window, corresponding bytes will
> be  automatically selected in the lower one. Export in the CER-file by
> means  of  the  context  menu  must leave us with a valid certificate.
> However, its signature turns out to be invalid. What is the reason? To
> get  a  right  X.509 DER certificate we must add to the selected bytes
> four  preceding  ones.

I came across this same issue and as I regularly want to be able to
extract various bits of ASN.1 (including certificates) from captures,
I added a local BER preference in my Wireshark.

It allows the ASN.1 tag and length bytes to be selected in addition to
the value - which then allows the intact, valid  ASN.1 to be  exported
as you would wish/expect. (Though it doesn't currently worked with
IMPLICITly tagged fields).

Given there is more interest than just me maybe I should check it in.

> By the way, the first two them are also 30 82, which could be the origin of 
> the confusion.

'30' indicates SEQUENCE
'82' indicates the next two bytes contain the length of the SEQUENCE

Graeme
_______________________________________________
Wireshark-dev mailing list
Wireshark-dev@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-dev

Reply via email to