Support dissecting the encrypted (phase 2) tunneled packets of EAP-TTLS
This issue was migrated from bug 15603 in our old bug tracker.
Original bug information:
Reporter: Mikael Kanstrup
Status: RESOLVED FIXED
Product: Wireshark
Component: Dissection engine (libwireshark)
OS: Linux
Platform: x86
Version: Git
Attachments:
eap-ttls.pcapng: Example capture file
server.key: Server private key (needed for decrypting the TLS traffic)
eap-ttls.lua: Lua script to show dissection is possible
eap-ttls-eap-gtc.pcapng: Example capture: EAP-TTLS-EAP-GTC
eap-ttls-eap-md5.pcapng: Example capture: EAP-TTLS-EAP-MD5-Challenge
eap-ttls-mschapv2.pcapng: Example capture: EAP-TTLS-MSCHAPV2
eap-ttls-pap.pcapng: Example capture: EAP-TTLS-PAP
eap-ttls.lua: (Updated)Lua script to show dissection is possible
See also:
Issue #12880 (closed)
Issue #15597 (closed)