Troubleshoot TLS Handshake Failures using Wireshark

Sdílet
Vložit
  • čas přidán 20. 05. 2024
  • In this video we'll be covering how to troubleshoot some common TLS handshake problems using Wireshark. We'll review what a healthy handshake looks like, then dive into three failure scenarios:
    1 - The target server is not running TLS on the specified port
    2 - The target server does not accept the client's TLS version or cipher list
    3 - The client does not accept the server's TLS certificate
    Additional resources:
    tls.ulfheim.net/ - An illustrated step-by-step guide to the TLS 1.2 handshake
    tools.ietf.org/html/rfc5246 - TLS1.2 RFC (Request for Comments)
    www.ssllabs.com/ssltest/ - Tool for testing public-facing TLS servers
    badssl.com - Site featuring various misconfigured SSL pages, useful for testing
  • Věda a technologie

Komentáře • 80

  • @sureshjoshi5933
    @sureshjoshi5933 Před 2 lety +5

    Perfectly explained in a very simple way !! Loved it.

  • @adw1a
    @adw1a Před 2 lety +2

    TLS Troubleshooting is explained in detail. The video quality is very good! The references shared are relevant to understanding the topic. Thank you for creating this video.

  • @weedee77
    @weedee77 Před 2 lety +2

    TLS troubleshooting demystified. Very useful information and explained in easy-to-understand manner. Thank you!

  • @gullitlevia787
    @gullitlevia787 Před rokem

    So far it's the best video on SSL/TLS. Thank you very much

  • @lienn8032
    @lienn8032 Před 9 měsíci

    Appreciated the detailed easy to understand explanation. Thanks!!!

  • @jayshakti8562
    @jayshakti8562 Před 2 lety

    As soon as I saw this video, I immediately hit the subscribe button. I request you please make more videos like this on tls protocols, cryptography algorithms, key exchange algorithms.....and many more in a detailed way 🙏🙏

  • @PremKumar-cy4ly
    @PremKumar-cy4ly Před 3 lety +2

    Perfect explanation, really helped me right now on investigation. Thanks!

  • @hadestech8147
    @hadestech8147 Před 3 měsíci

    Wow… Outstanding classes. I found the content to be very informative, thorough, well covered, and the proper pace for me. Thank you. Great work.

  • @supriyamishra1886
    @supriyamishra1886 Před 2 lety

    detailed explanation , thank you so much for the video , hope to see more videos on networking in coming days:)

  • @ThisCanNotBTheFuture
    @ThisCanNotBTheFuture Před 2 lety +5

    Excellent lesson. Really hope you'll consider doing more. Maybe, analyzing kerberos, LDAP, etc.?

    • @plaintextpackets
      @plaintextpackets  Před 2 lety +1

      Thanks! I’ve had a crazy busy year but hopefully will do a few more videos soon.

  • @phillipdane7852
    @phillipdane7852 Před 3 lety +2

    Easily the best video on TLS. Would love to see something similar but for analyzing TLS renegotiations!

    • @plaintextpackets
      @plaintextpackets  Před 3 lety +1

      Thanks Philip, I’ll add TLS renegotiation to the video list!

    • @sureshjoshi5933
      @sureshjoshi5933 Před 2 lety

      @@plaintextpackets would you be able to create one more vedio on how to apply filters in wireshark for understanding the sequence of packet flow !!

    • @masajjad
      @masajjad Před 9 měsíci

      @@plaintextpackets enjoyed the hands-on approach and all supporting materials provided in description. by any chance have you published that video? :) eager to see under the microscope of wireshark ... play by play. I'm sure you will nail that one as well. keep up the good work. Thanks for explaining an extremely complex topic in a simple way.

    • @plaintextpackets
      @plaintextpackets  Před 9 měsíci +1

      I will try to get one out soon. My day job is very busy so I usually make a batch of videos when I have a bit of down time. Thank you for the support!

    • @masajjad
      @masajjad Před 9 měsíci

      @@plaintextpackets this is epic. "Down time" lol 😆 man you sound like breathe networking

  • @SAURABHKUMAR-yw4dd
    @SAURABHKUMAR-yw4dd Před 2 lety

    One word for your explanation "Awesome"!!!!!

  • @Manish_Yadav0719
    @Manish_Yadav0719 Před rokem

    The first website mentioned in the video made my day ❤

  • @akshaydoifode1097
    @akshaydoifode1097 Před 2 lety

    Awesome explanation and references provided are really helpful
    Thanks sir🙂

  • @aidataverse
    @aidataverse Před 2 lety

    Awesome ,Comprehensive & useful content

  • @blahdelablah
    @blahdelablah Před rokem

    This was excellent, very clearly explained. You've got yourself a new subscriber.

  • @ciscoliveciscolive8048
    @ciscoliveciscolive8048 Před 2 lety +1

    The best SSL Video Explained

  • @sujeetbadnale9441
    @sujeetbadnale9441 Před 7 měsíci

    Thank You. This is high quality content that too for free. God Bless You. I must say you have demystified many things at once at least for me, like Using Wireshark, TLS etc. Thank you again. Keep creating content. God Bless again.

  • @devart321
    @devart321 Před 3 lety

    Ohh my god...Nicely explained TLS..Thank you so much :)

  • @alikhalidsalim4865
    @alikhalidsalim4865 Před 2 lety

    So helpful. Thanks man. Please post more vids.

  • @MyVirtualboy
    @MyVirtualboy Před rokem

    Great video - thanks for you contribution.

  • @engbmwa
    @engbmwa Před 8 měsíci

    many thanks

  • @helpinghand2508
    @helpinghand2508 Před 2 lety +1

    Thank you. It helped. stay happy.

  • @vikashverma6946
    @vikashverma6946 Před 2 lety

    Amazing content , thanks a lot.

  • @jandg2530
    @jandg2530 Před 2 lety

    Thank you for putting this up. Explained it to where i understood everything and was not bored to sleep

  • @mike_on_tech
    @mike_on_tech Před 2 lety

    Great video! Thanks

  • @upelister
    @upelister Před měsícem

    Thank you.😊

  • @devart321
    @devart321 Před 3 lety

    Expecting few more detailed videos on other topics as well.....Pleasssss

    • @plaintextpackets
      @plaintextpackets  Před 2 lety

      Thanks, I’ve been moving so haven’t had time. Hopefully soon.

  • @linuxlove1912
    @linuxlove1912 Před 3 měsíci

    Thanks for the video..!!!

  • @adriantucci6886
    @adriantucci6886 Před 2 lety

    Great video and excellent explanation! Do you have a video explaining what happens when the server trusted ca list doesnt include your certificate?

  • @mailman2097
    @mailman2097 Před 9 měsíci

    great

  • @paulsiny12345
    @paulsiny12345 Před 2 lety

    What does it mean when the server send an encryption alert type 21 before a FIN? Does that mean close notify?

  • @aldehc99
    @aldehc99 Před 2 lety

    Thanks for this beautiful explanation. When there is a self singed certificate sent by the server, the client can trust it by adding it to the client local cert store, right?, Then I think it is supposed to send the client key exchange to the server.

    • @plaintextpackets
      @plaintextpackets  Před 2 lety

      Yep if you add the self signed to your trust store the handshake should go forward as normal

  • @ShivamPandey-we4ek
    @ShivamPandey-we4ek Před 3 lety

    nice video !!!

  • @Themahaaveer
    @Themahaaveer Před 2 měsíci +2

    Please make a video on how to identify encrypted tcp packets from unencrypted ones. I am self hosting rustdesk and in wireshark i cannot see tls handshake or anything related to ciphers. All i see is plain tcp packets. But rustdesk says connection is encrypted when i use keys and unencrypted when i dont use keys. how do i actually make sure it is encrypted in wireshark ? Thanks for making great videos

    • @plaintextpackets
      @plaintextpackets  Před 2 měsíci

      I got you. What port is it running? You’ll only see the handshake when the session starts so if it’s a RDP tool it might keep the session open. You can try restarting the app on your PC while capturing and see if the handshake comes in.
      If it’s using its own custom protocol it may be difficult to tell if they are really encrypting things but the above may help. Feel free to send me a sample too if you need a second pair of eyes

    • @Themahaaveer
      @Themahaaveer Před 2 měsíci +1

      @@plaintextpackets Thanks for the quick reply. Once the connection is established, both clients talk in random ports. I'll try restarting the service to try to capture the handshake. The server uses 5 different ports in 20000 range but I'm using it on 30000 range. I'll capture both unencrypted and encrypted traffic when clients are on remote session. The server uses rendezvous protocol to establish connection between clients.

    • @plaintextpackets
      @plaintextpackets  Před 2 měsíci

      If you'd like feel free to join the discord to troubleshoot further: discord.gg/NrxCCkdZ

  • @fabiantoro7146
    @fabiantoro7146 Před 3 měsíci

    Very nice explanation. Something caught my attention: why in the first example the Client Hello packet says "TLSv1" and the rest do say "TLSv1.2"? Is it normal or bad thing? Thank you very much

    • @plaintextpackets
      @plaintextpackets  Před 3 měsíci +1

      This is a good point. Wireshark will show the TLS version under the 'Record Layer' heading, and also under the 'Handshake Protocol: Client Hello' heading. The version which the client is actually using is the one under 'Handshake Protocol: Client Hello'. This can be confusing, but is a function of how the TLS protocol is constructed.

  • @mike_on_tech
    @mike_on_tech Před 2 lety

    @12:00 Why does the Length in the column (~1500 bytes) differ from the message size (the certificates alone show as being nearly 2400 bytes)?

    • @plaintextpackets
      @plaintextpackets  Před 2 lety

      The length column in this case is showing the packet length. The certificate length is showing the total size of the cert message, but that gets spanned over multiple packets.

  • @senthilkumarramalingam8298

    nice..

  • @kathytatum2099
    @kathytatum2099 Před 2 lety

    Can you explain this to me? I can connect fine through a regular browser, but when I try and use Webinspect this is what I get:
    Client Hello (TLS 1.2)
    Server Ack
    Server Hello, Certificate (TLS 1.2, Suite (0xc030) *not self signed
    Server Key Exchange, Certificate Request, Server Hello Done
    Client Ack
    Client Fin, Ack
    Client SYN, ECN, CWR
    Server Ack
    Server Fin, Ack
    I am wondering what could be blocking my certificate being sent when using Webinspect but not when I use Firefox or IE. Ciphers are available on both sides, as I can connect without Webinspect. I know this may be a Webinspect question (already tried with them) but I'm trying to get an outside opinion

    • @plaintextpackets
      @plaintextpackets  Před 2 lety

      Sounds like webinspect is not sending your TLS client certificate (since the server is asking for one), or it does not trust the server’s certificate. Either could be true since it’s the client who kills the connection after the server cert. If you can run WI without cert validation enabled you can tell if it’s because of the server certificate.

  • @nijisworld9341
    @nijisworld9341 Před rokem

    Hello, I am unable to access one my application url using chrome, Edge or Firefox. But able to access the same using IE.
    I took wireshark trace for working and non working scenario. And noticed except IE other browsers are using TLS. 1.0. IE using Tls. 1.2..
    Why it is like that?

    • @plaintextpackets
      @plaintextpackets  Před rokem

      Different browsers have different TLS client compatibility. For example many browsers have now shut off support for TLS 1.0 because it’s considered depreciated, so those browsers will fail when trying to access servers that only support TLS 1.0. If you want to send me the packet capture I can take a look to see if I can help find the root cause.

  • @alimohammed817
    @alimohammed817 Před 2 lety

    hi sir , if I secure sip over TLS by certificate , can any one capture the traffic and decrypt TLS ? if yes , how he can decrypt , what he use ??

    • @plaintextpackets
      @plaintextpackets  Před 2 lety

      You can only decrypt TLS if you are using old versions and cipher suites, if you use TLS 1.2 with new ciphers it is impossible for the average person to decrypt.

  • @krunalshah9898
    @krunalshah9898 Před 11 měsíci

    I have an issue when using mutual authentication i.e 2 way authentication, I get warning: no suitable certificate found - continuing without client authentication

    • @plaintextpackets
      @plaintextpackets  Před 11 měsíci

      Can you post the PCAP or is it sensitive? You can also DM me. Sounds like the client certificate is not installed correctly or maybe has another issue. Do you see the client sending its certificate to the server?

    • @krunalshah9898
      @krunalshah9898 Před 11 měsíci

      @Plaintext Packets I see cert authorities part showing some CN names just before the serverhellodone, and no certificate found error immediately after serverhellodone

    • @plaintextpackets
      @plaintextpackets  Před 11 měsíci

      Do you see a CertificateRequest message coming from the server?

    • @krunalshah9898
      @krunalshah9898 Před 11 měsíci

      ​@Plaintext Packets yes there is and also it has cert authorities which has some CN names

    • @plaintextpackets
      @plaintextpackets  Před 11 měsíci

      Ok that’s good, so after that do you see a certificate sent by the client IP, or does the connection close after the server sends its certificate? Also, which IP initiates the FIN?

  • @felipesalvadoriii8159
    @felipesalvadoriii8159 Před 2 lety

    hi can i email you? and ask help for my tls issue? thank you

  • @deLuka93
    @deLuka93 Před rokem

    18:15 important

    • @deLuka93
      @deLuka93 Před rokem

      Just some notes for me, thanks for the great video. :)

  • @8802082642
    @8802082642 Před rokem

    Just what i was looking for. Excellent content and explanation with pcap's. Any idea how I can correspond the TLS session on client side to server side pcap taken in parallel? Any pointer will be welcomed. Thank you for sharing this.

  • @PhucLe-qm9vt
    @PhucLe-qm9vt Před 3 lety +1

    So far it's the best video on SSL/TLS. Thank you very much