The scenario is that I use openconnect to connect cisco phone to cisco IOS's sslvpn server.
phone will be registered to the call manager and the call manager communicate with phone using skinny msg.
I already have the private key of the sslvpn server and use it in wireshark.
My wireshark's version is 1.6.5 My setting is that:
IP address is set to the sslvpn server's ip.
port is set to 443
Protocol is set to http
key is the location of the private key.
I found that I can see some http msg decrypted using this setting.(without the private key, the http msg can not be seen.)
But other msg is still "TLSv1 Application Data".(should be skinny msg)
I try to set to change ssl decrypt protocol from ”http“ to "skinny"
the error shows that "error in column 'Protocol': Could not find dissector for: 'skinny'"
I try to set "http" to "tcp" and there is some tcp.
So is there a way to decrypt these Application Data to right skinny msg?
Thanks for your help!
asked 15 Mar '12, 06:49