
Now, I've seen varying reports as to whether Wireshark can properly parse TDS packets with encoded TLS. So the simple answer to your question, "determine the version of SSL/TLS", is "TLS 1.2". This documentĭescribes TLS Version 1.2, which uses the version The version of the protocol being employed.


0x16 is the TLS "Handshake" header indicator,Ġx03 0x03 is the TLS version (TLS 1.2, as per RFC 5246):.In the Microsoft Message Analyzer screencap you posted, we can see the TDS header (boxed in Red, starts with 0x12), followed several bytes later by the TLS CLIENT_HELLO packet (boxed in Blue, starts with 0x16 0x03 0x03): If you view the TDS protocol documentation, it specifies that the SSL packets are encapsulated within a TDS wrapper: A TLS/SSL negotiation packet is a PRELOGIN (0x12) packet header encapsulated It is anĪpplication layer request/response protocol. (RPC) returning of data and Transaction Manager Requests. Invocation of a stored procedure, also known as a Remote Procedure Call Negotiation specification of requests in SQL (including Bulk Insert) the Tabular Data Stream Protocol, which facilitates interaction withĪ database server and provides for authentication and channel encryption You are viewing a connection which uses MS-TDS ("Tabular Data Stream Protocol"). Is being used with the encryption of data between a client workstationĪnd another workstation on the same LAN running SQL Server.
:max_bytes(150000):strip_icc()/001_wireshark-tutorial-4143298-5c117483c9e77c0001c08bdf.jpg)
Credit for pointing to the actual answer in comments goes to and Wireshark, I am trying to determine the version of SSL/TLS that (Adding a new answer which should be definitive, leaving the old around as it's useful debug for how we got here.
