1 | initial version |
When implementations fail during the TLS handshake, they typically do either:
tcp.flags.reset==1
tls.alert_message.level
Combining the two:
tcp.flags.reset==1 or tls.alert_message.level
Note that normal TLS sessions may also use the TCP RST (reset) flag to tear down a connection to close down a successful session. If you see Application Data packets in the same TCP stream, then this would indicate that.
2 | No.2 Revision |
When implementations fail during the TLS handshake, they typically do either:
tcp.flags.reset==1
tls.alert_message.level
Combining the two:
tcp.flags.reset==1 or tls.alert_message.level
Note that normal TLS sessions may also use the TCP RST (reset) flag to tear down a connection to close down a successful session. If you see Application Data packets in the same TCP stream, then this would indicate that.
If you are using Wireshark 2.6 or older, note that the filter is named ssl.alert_message.level
instead.
3 | No.3 Revision |
When implementations fail during the TLS handshake, they typically do either:
tcp.flags.reset==1
tls.alert_message.level
Combining the two:
tcp.flags.reset==1 or tls.alert_message.level
Note that normal TLS sessions may also use the TCP RST (reset) flag to tear down a connection to close down a successful session. If you see Application Data packets in the same TCP stream, then this would indicate that.
If you are using Wireshark 2.6 or older, note that the filter is named ssl.alert_message.level
instead.