Last active
March 4, 2021 06:08
-
-
Save anlsh/bcf5c4b7c079ddbfa8ee16c4ca40218c to your computer and use it in GitHub Desktop.
Failed TLS client hello packet (sent by Python GRPC client)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Frame 23442: 561 bytes on wire (4488 bits), 561 bytes captured (4488 bits) on interface \Device\NPF_Loopback, id 0 | |
Null/Loopback | |
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1 | |
0100 .... = Version: 4 | |
.... 0101 = Header Length: 20 bytes (5) | |
Differentiated Services Field: 0x02 (DSCP: CS0, ECN: ECT(0)) | |
0000 00.. = Differentiated Services Codepoint: Default (0) | |
.... ..10 = Explicit Congestion Notification: ECN-Capable Transport codepoint '10' (2) | |
Total Length: 557 | |
Identification: 0xfe48 (65096) | |
Flags: 0x40, Don't fragment | |
0... .... = Reserved bit: Not set | |
.1.. .... = Don't fragment: Set | |
..0. .... = More fragments: Not set | |
Fragment Offset: 0 | |
Time to Live: 128 | |
Protocol: TCP (6) | |
Header Checksum: 0x0000 [validation disabled] | |
[Header checksum status: Unverified] | |
Source Address: 127.0.0.1 | |
Destination Address: 127.0.0.1 | |
Transmission Control Protocol, Src Port: 55076, Dst Port: 50052, Seq: 1, Ack: 1, Len: 517 | |
Source Port: 55076 | |
Destination Port: 50052 | |
[Stream index: 325] | |
[TCP Segment Len: 517] | |
Sequence Number: 1 (relative sequence number) | |
Sequence Number (raw): 3000020399 | |
[Next Sequence Number: 518 (relative sequence number)] | |
Acknowledgment Number: 1 (relative ack number) | |
Acknowledgment number (raw): 3831241629 | |
0101 .... = Header Length: 20 bytes (5) | |
Flags: 0x018 (PSH, ACK) | |
000. .... .... = Reserved: Not set | |
...0 .... .... = Nonce: Not set | |
.... 0... .... = Congestion Window Reduced (CWR): Not set | |
.... .0.. .... = ECN-Echo: Not set | |
.... ..0. .... = Urgent: Not set | |
.... ...1 .... = Acknowledgment: Set | |
.... .... 1... = Push: Set | |
.... .... .0.. = Reset: Not set | |
.... .... ..0. = Syn: Not set | |
.... .... ...0 = Fin: Not set | |
[TCP Flags: ·······AP···] | |
Window: 10233 | |
[Calculated window size: 2619648] | |
[Window size scaling factor: 256] | |
Checksum: 0xcd9a [unverified] | |
[Checksum Status: Unverified] | |
Urgent Pointer: 0 | |
[SEQ/ACK analysis] | |
[iRTT: 0.000304000 seconds] | |
[Bytes in flight: 517] | |
[Bytes sent since last PSH flag: 517] | |
[Timestamps] | |
[Time since first frame in this TCP stream: 0.001531000 seconds] | |
[Time since previous frame in this TCP stream: 0.001227000 seconds] | |
TCP payload (517 bytes) | |
Transport Layer Security | |
TLSv1.2 Record Layer: Handshake Protocol: Client Hello | |
Content Type: Handshake (22) | |
Version: TLS 1.0 (0x0301) | |
Length: 512 | |
Handshake Protocol: Client Hello | |
Handshake Type: Client Hello (1) | |
Length: 508 | |
Version: TLS 1.2 (0x0303) | |
Random: 45ee6e1450419efe0c7144d8c0f8eb744e6bf97405caa0efbe1ae57e07f8df54 | |
GMT Unix Time: Mar 6, 2007 23:47:32.000000000 Pacific Standard Time | |
Random Bytes: 50419efe0c7144d8c0f8eb744e6bf97405caa0efbe1ae57e07f8df54 | |
Session ID Length: 32 | |
Session ID: 1ddc595983a6e23f1da0bfe462d9f33e38046dd828108d651c2d8381dc9b7d41 | |
Cipher Suites Length: 14 | |
Cipher Suites (7 suites) | |
Cipher Suite: TLS_AES_128_GCM_SHA256 (0x1301) | |
Cipher Suite: TLS_AES_256_GCM_SHA384 (0x1302) | |
Cipher Suite: TLS_CHACHA20_POLY1305_SHA256 (0x1303) | |
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b) | |
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) | |
Compression Methods Length: 1 | |
Compression Methods (1 method) | |
Compression Method: null (0) | |
Extensions Length: 421 | |
Extension: server_name (len=14) | |
Type: server_name (0) | |
Length: 14 | |
Server Name Indication extension | |
Server Name list length: 12 | |
Server Name Type: host_name (0) | |
Server Name length: 9 | |
Server Name: localhost | |
Extension: extended_master_secret (len=0) | |
Type: extended_master_secret (23) | |
Length: 0 | |
Extension: renegotiation_info (len=1) | |
Type: renegotiation_info (65281) | |
Length: 1 | |
Renegotiation Info extension | |
Renegotiation info extension length: 0 | |
Extension: supported_groups (len=4) | |
Type: supported_groups (10) | |
Length: 4 | |
Supported Groups List Length: 2 | |
Supported Groups (1 group) | |
Supported Group: secp256r1 (0x0017) | |
Extension: ec_point_formats (len=2) | |
Type: ec_point_formats (11) | |
Length: 2 | |
EC point formats Length: 1 | |
Elliptic curves point formats (1) | |
EC point format: uncompressed (0) | |
Extension: session_ticket (len=0) | |
Type: session_ticket (35) | |
Length: 0 | |
Data (0 bytes) | |
Extension: application_layer_protocol_negotiation (len=14) | |
Type: application_layer_protocol_negotiation (16) | |
Length: 14 | |
ALPN Extension Length: 12 | |
ALPN Protocol | |
ALPN string length: 8 | |
ALPN Next Protocol: grpc-exp | |
ALPN string length: 2 | |
ALPN Next Protocol: h2 | |
Extension: signature_algorithms (len=20) | |
Type: signature_algorithms (13) | |
Length: 20 | |
Signature Hash Algorithms Length: 18 | |
Signature Hash Algorithms (9 algorithms) | |
Signature Algorithm: ecdsa_secp256r1_sha256 (0x0403) | |
Signature Hash Algorithm Hash: SHA256 (4) | |
Signature Hash Algorithm Signature: ECDSA (3) | |
Signature Algorithm: rsa_pss_rsae_sha256 (0x0804) | |
Signature Hash Algorithm Hash: Unknown (8) | |
Signature Hash Algorithm Signature: Unknown (4) | |
Signature Algorithm: rsa_pkcs1_sha256 (0x0401) | |
Signature Hash Algorithm Hash: SHA256 (4) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: ecdsa_secp384r1_sha384 (0x0503) | |
Signature Hash Algorithm Hash: SHA384 (5) | |
Signature Hash Algorithm Signature: ECDSA (3) | |
Signature Algorithm: rsa_pss_rsae_sha384 (0x0805) | |
Signature Hash Algorithm Hash: Unknown (8) | |
Signature Hash Algorithm Signature: Unknown (5) | |
Signature Algorithm: rsa_pkcs1_sha384 (0x0501) | |
Signature Hash Algorithm Hash: SHA384 (5) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: rsa_pss_rsae_sha512 (0x0806) | |
Signature Hash Algorithm Hash: Unknown (8) | |
Signature Hash Algorithm Signature: Unknown (6) | |
Signature Algorithm: rsa_pkcs1_sha512 (0x0601) | |
Signature Hash Algorithm Hash: SHA512 (6) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: rsa_pkcs1_sha1 (0x0201) | |
Signature Hash Algorithm Hash: SHA1 (2) | |
Signature Hash Algorithm Signature: RSA (1) | |
Extension: next_protocol_negotiation (len=0) | |
Type: next_protocol_negotiation (13172) | |
Length: 0 | |
Extension: key_share (len=71) | |
Type: key_share (51) | |
Length: 71 | |
Key Share extension | |
Client Key Share Length: 69 | |
Key Share Entry: Group: secp256r1, Key Exchange length: 65 | |
Group: secp256r1 (23) | |
Key Exchange Length: 65 | |
Key Exchange: 04d1ac5cecc9db5545c690ddd591f0972d5977f7dac775d9c1b61b0de27b84fe37df14c8… | |
Extension: psk_key_exchange_modes (len=2) | |
Type: psk_key_exchange_modes (45) | |
Length: 2 | |
PSK Key Exchange Modes Length: 1 | |
PSK Key Exchange Mode: PSK with (EC)DHE key establishment (psk_dhe_ke) (1) | |
Extension: supported_versions (len=5) | |
Type: supported_versions (43) | |
Length: 5 | |
Supported Versions length: 4 | |
Supported Version: TLS 1.3 (0x0304) | |
Supported Version: TLS 1.2 (0x0303) | |
Extension: padding (len=236) | |
Type: padding (21) | |
Length: 236 | |
Padding Data: 000000000000000000000000000000000000000000000000000000000000000000000000… |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment