#TELERIK HTTP SNIFFER CODE#
The sample code is provided on an "AS IS" basis.
#TELERIK HTTP SNIFFER SOFTWARE#
Progress Software Corporation makes no explicit or implied claims to the validity of this information.Īny sample code provided on this site is not supported under any Progress support program or service. However, the information provided is for your information only. Progress Software Corporation makes all reasonable efforts to verify this information.
#TELERIK HTTP SNIFFER FREE#
Please feel free to reopen the issue with more information.The origins of the information on this site may be internal or external to Progress Software Corporation (“Progress”). The format is supported by Wireshark and other tools. The ssl module supports passive introspection of TLS connections with SSLKEYLOGFILE. I recommend that you contact the vendor of your tool. Your connection issue is most likely an incompatibility between recent OpenSSL 1.1.1 and your tool. All steps of the TLS handshake are performed by OpenSSL code. From the description on its Wikipedia page, it sounds like the tool is an active interceptor that uses a man-in-the-middle attack approach. I'm not familiar with Telerik Fiddler and don't have access to the tool. This exact question has recently been asked on StackOverflow: Īuthor: Christian Heimes (christian.heimes) * Ssl.SSLError: wrong version number (_ssl.c:1123) Ssl_sock = _ssl_wrap_socket_impl(sock, context, tls_in_tls)įile "C:\Users\Darren\AppData\Local\Programs\Python\Python39\lib\site-packages\urllib3\util\ssl_.py", line 474, in _ssl_wrap_socket_implįile "C:\Users\Darren\AppData\Local\Programs\Python\Python39\lib\ ssl.py", line 500, in wrap_socketįile "C:\Users\Darren\AppData\Local\Programs\Python\Python39\lib\ ssl.py", line 1040, in _createįile "C:\Users\Darren\AppData\Local\Programs\Python\Python39\lib\ ssl.py", line 1309, in do_handshake This traceback was generated when attempting to access while Fiddler 4.45441 was open:įile "C:\Users\Darren\AppData\Local\Programs\Python\Python39\lib\site-packages\urllib3\connectionpool.py", line 696, in urlopenįile "C:\Users\Darren\AppData\Local\Programs\Python\Python39\lib\site-packages\urllib3\connectionpool.py", line 964, in _prepare_proxyįile "C:\Users\Darren\AppData\Local\Programs\Python\Python39\lib\site-packages\urllib3\connection.py", line 359, in connectĬonn = self._connect_tls_proxy(hostname, conn)įile "C:\Users\Darren\AppData\Local\Programs\Python\Python39\lib\site-packages\urllib3\connection.py", line 496, in _connect_tls_proxyįile "C:\Users\Darren\AppData\Local\Programs\Python\Python39\lib\site-packages\urllib3\util\ssl_.py", line 432, in ssl_wrap_socket Alternatives such as verify=False and adding the Fiddler Root Certificate to Python's cacert.pem file do not rectify this error.
This has been tested to occur with urllib2 and requests modules.
Telerik Fiddler) is intercepting SSL traffic, the program will hang for about a minute and then crash with a WRONG_VERSION_NUMBER error. Messages (3)Īs of Python 3.9.1, when attempting to perform any SSL requests when a packet sniffer tool (e.g. All SSL requests fail with WRONG_VERSION_NUMBER when a packet sniffer is openĬreated on 04:46 by darrenrs, last changed 14:59 by admin.