Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix the issue where TLS Sniffer fails when the length of the ClientHello packet exceeds the TCP MSS #1711

Merged
merged 3 commits into from
Dec 12, 2024

Conversation

laburaps
Copy link

Problem:

When the length of the ClientHello message exceeds the TCP MSS (usually 1460 or 1448), due to the fragmentation of the ClientHello message during transmission, it may prevent TLSSniffer from obtaining sufficient data in first peek to parse the packet, leading to parsing failure.

Solution:

During the TLS Sniffer parsing process, the required packet length can be determined. If the first parsing attempt fails, a retry can be initiated. Within a timeout period, once the data of the corresponding length is obtained, re-parsing can be performed.

@wwqgtxx wwqgtxx merged commit c7fc93d into MetaCubeX:Alpha Dec 12, 2024
55 checks passed
@laburaps laburaps deleted the PR-RetryForTLSSniffer branch December 13, 2024 08:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants