TLS 1.3: CCM ciphers not decrypted due to invalid AAD length
Recently I had implemented a callback function SSL_CTX_set_keylog_callback()that sets the TLS key logging callback. This callback is called whenever TLS key material is generated or received, in order to allow applications to store this keying material for debugging purposes. I am able to get the required keys and also using that keys I am able to decrypt the packets but some cipher suite are not decrypted. This below 3 ciphers are able to decrypt TLS_CHACHA20_POLY1305_SHA256 TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384
And with same config and same code change this below cipher suites are not decrypted, although I am getting the required keys for this. TLS_AES_128_CCM_SHA256 TLS_AES_128_CCM_8_SHA256
I came to know that those 3 working cipher suite are default ciphers and the last two non-working collections need to be explicitly added if required. When creating a list. https://www.microfocus.com/documentat...
May I know if Wireshark supports all 5 tlsv1.3 ciphers or not?
Can you set the preference for
packet-tls-utils.c:TLS debug file (tls.debug_logfile)
(TLS preference settings), do the decode and check the log for errors.I get these -
tls_decrypt_aead_record failed to set AAD: Invalid length
- and would like to confirm the same for your decode.https://github.com/gpg/libgcrypt/blob...:
Yes, I have tried the same as you suggested, I am also getting the same error.
Update title on the Gitlab issue also.
7885: tls 1.3: set CCM aad_len for draft >= 25 is merged in and available to test in the Automated builds (
Version 4.1.0rc0-94-g4915b646d074 (v4.1.0rc0-94-g4915b646d074).
or newer)