[Bro] First orig_h packet after 3 way handshake
bmixonb1 at cs.unm.edu
Thu Jul 14 10:26:33 PDT 2016
I'm looking at Tor+obfs4. Normally, everything parsed out using the
events in the SSL module would be perfect but since the handshake is
obfuscated, none of those events fire. I was trying to look at the
packet that _should_ be the client hello in order to see if there is
anything regular about that particular payload.
On 07/13/2016 05:17 PM, Johanna Amann wrote:
> Out of curiosity - what are you trying to do?
> (I am always curious what people try to get from the SSL handshake that
> we do not parse out yet...)
> On 13 Jul 2016, at 16:04, Ben Mixon-Baca wrote:
>> Unfortunately for what I am doing, I cannot.
>> On 07/13/2016 03:58 PM, Azoff, Justin S wrote:
>>>> On Jul 13, 2016, at 6:36 PM, Ben Mixon-Baca <bmixonb1 at cs.unm.edu>
>>>> Does Bro have an event that will get fired for the first packet after
>>>> the tcp 3-way handshake, or is there a way to get at that easily or
>>>> it require a lot of state to be maintained in the script?
>>>> I am trying to get at this first packet following the 3 way handshake
>>>> because that is where the client hello in the ssl handshake should be.
>>> Can you use the ssl_client_hello event?
>>> event ssl_client_hello(c: connection, version: count, possible_ts:
>>> time, client_random: string, session_id: string, ciphers: index_vec)
>> Bro mailing list
>> bro at bro-ids.org
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 490 bytes
Desc: OpenPGP digital signature
Url : http://mailman.ICSI.Berkeley.EDU/pipermail/bro/attachments/20160714/54a8507e/attachment.bin
More information about the Bro