mirror of
https://github.com/zeek/zeek.git
synced 2025-10-17 14:08:20 +00:00
![]() It turns out that Chrome supports an experimental mode to support TLS 1.3, which uses a non-standard way to negotiate TLS 1.3 with a server. This non-standard way to negotiate TLS 1.3 breaks the current draft RFC and re-uses an extension on the server-side with a different binary formatting, causing us to throw a binpac exception. This patch ignores the extension when sent by the server, continuing to correctly parse the server_hello reply (as far as possible). From what I can tell this seems to be google working around the fact that MITM equipment cannot deal with TLS 1.3 server hellos; this change makes the fact that TLS 1.3 is used completely opaque unless one looks into a few extensions. We currently log this as TLS 1.2. |
||
---|---|---|
.. | ||
cert-no-cn.pcap | ||
certificate-with-sct.pcap | ||
chrome-34-google.trace | ||
chrome-63.0.3211.0-canary-tls_experiment.pcap | ||
CVE-2015-3194.pcap | ||
dhe.pcap | ||
dtls-openssl.pcap | ||
ecdhe.pcap | ||
ecdsa-cert.pcap | ||
google-duplicate.trace | ||
heartbleed-encrypted-short.pcap | ||
heartbleed-encrypted-success.pcap | ||
heartbleed-encrypted.pcap | ||
heartbleed-success.pcap | ||
heartbleed.pcap | ||
imap-starttls.pcap | ||
irc-starttls.pcap | ||
missing-intermediate.pcap | ||
ocsp-http-get.pcap | ||
ocsp-request-only.pcap | ||
ocsp-request-response.pcap | ||
ocsp-response-only.pcap | ||
ocsp-revoked.pcap | ||
ocsp-stapling-digicert.trace | ||
ocsp-stapling-twimg.trace | ||
ocsp-stapling.trace | ||
pop3-starttls.pcap | ||
signed_certificate_timestamp-2.pcap | ||
signed_certificate_timestamp.pcap | ||
smtp-starttls.pcap | ||
ssl-v2.trace | ||
ssl.v3.trace | ||
telesec.pcap | ||
tls-1.2-handshake-failure.trace | ||
tls-13draft19-early-data.pcap | ||
tls-conn-with-extensions.trace | ||
tls-early-alert.trace | ||
tls-expired-cert.trace | ||
tls-fragmented-handshake.pcap.gz | ||
tls1.2.trace | ||
tls13draft16-chrome55.0.2879.0-canary-aborted.pcap | ||
tls13draft16-chrome55.0.2879.0-canary.pcap | ||
tls13draft16-ff52.a01-aborted.pcap | ||
tls13draft16-ff52.a01.pcap | ||
webrtc-stun.pcap | ||
x509-generalizedtime.pcap | ||
xmpp-dialback-starttls.pcap | ||
xmpp-starttls.pcap |