Wireshark-bugs: [Wireshark-bugs] [Bug 11642] New: couldn't decrypt the outter-EAP TLS connection
Date: Tue, 27 Oct 2015 19:59:05 +0000
Bug ID 11642
Summary couldn't decrypt the outter-EAP TLS connection in RADIUS EAP-TTLS
Product Wireshark
Version 1.10.2
Hardware x86
OS Windows 7
Status UNCONFIRMED
Severity Major
Priority Low
Component Capture file support (libwiretap)
Assignee bugzilla-admin@wireshark.org
Reporter peweerathunga@gmail.com

Created attachment 13941 [details]
server key

Build Information:
Version 1.10.2 (SVNRev 51934 from /trunk-1.10)

Copyright 1998-2013 Gerald Combs <gerald@wireshark.org> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GTK+ 2.24.14, with Cairo 1.10.2, with Pango 1.30.1, with
GLib 2.34.1, with WinPcap (4_1_3), with libz 1.2.5, without POSIX capabilities,
without libnl, with SMI 0.4.8, with c-ares 1.9.1, with Lua 5.1, without Python,
with GnuTLS 2.12.18, with Gcrypt 1.4.6, without Kerberos, with GeoIP, with
PortAudio V19-devel (built Sep 10 2013), with AirPcap.

Running on 64-bit Windows 7 Service Pack 1, build 7601, with WinPcap version
4.1.3 (packet.dll version 4.1.0.2980), based on libpcap version 1.0 branch
1_0_rel0b (20091008), GnuTLS 2.12.18, Gcrypt 1.4.6, without AirPcap.
       Intel(R) Xeon(R) CPU E5-1650 0 @ 3.20GHz, with 16307MB of physical
memory.


Built using Microsoft Visual C++ 10.0 build 40219

Wireshark is Open Source Software released under the GNU General Public
License.

Check the man page and http://www.wireshark.org for more information.
--
We couldn't decrypt the outter-EAP TLS connection in RADIUS EAP-TTLS exchange
using the attached server key.


You are receiving this mail because:
  • You are watching all bug changes.