Re: [Wireshark-dev] IEEE 802.11 WPA3 decryption support

2019-03-26 Thread Mikael Kanstrup

On 25/03/2019 22:41, Guy Harris wrote:

On Mar 25, 2019, at 2:32 AM, Kanstrup, Mikael  wrote:


I started working on WPA3 decryption support. Some parts of it has already been 
merged.

So does this mean we'll prove Michael Berg of Tamosoft wrong?

https://twitter.com/TamoSoft/status/1049975990695399424

"WPA3 will make it impossible to perform on-the-fly or post-capture decryption of 
WiFi packets by tools like CommView for WiFi. Good security, but still upsetting from the 
packet analysis standpoint..."

No. That is still valid. I'm not trying to magically decrypt traffic 
without knowledge about the decryption keys. For WPA2 PSK the PSK == PMK 
is same for all connections towards a certain network making it possible 
to decrypt all traffic as long as you've recorded the 4-way handshake 
messages.


For WPA3 PMK is unique for each association and the passphrase -> PMK 
generation is strong. This gives:


- With password alone you cannot decrypt any traffic
- With password + 4-way handshake you cannot decrypt any traffic
- If you somehow can get hold of PMK you can only decrypt that specific 
connection. No other(s).


WPA3 decryption with Wireshark will only decrypt traffic where you know 
the PMK. This is similar to what is supported for WPA2 enterprise 
already today.



The dot11crypt engine duplicate quite a lot IEEE 802.11 dissector functionality

Yes, and it shouldn't.


Agree. Thanks for feedback!

/Mikael

___
Sent via:Wireshark-dev mailing list 
Archives:https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev
mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe

Re: [Wireshark-dev] extcap tools

2019-03-26 Thread Guy Harris
On Mar 23, 2019, at 1:21 PM, Ross Jacobs  wrote:

> I am confused by differences in extcap between the CLI and the GUI. By 
> default (in 3.0.0 on both Windows, Macos), extcap tools are presented as 
> interfaces on the capture page. 
> 

And in TShark, they're presented in the list of devices printed by the -D flag, 
because it can capture on them.

> Questions 
> 1. In the Wireshark GUI, if you go to About > Plugins, you can see the extcap 
> directories.

By which you presumably mean "you can see the full path of all extcap 
*executables*.

If you want to see the extcap *directory*, you want About > Folders.

> Is it possible to get the extcap directory using a CLI command like tshark,

tshark -G folders, which is the equivalent of About > Folders.

There is no way to list the full paths of extcap executables from the command 
line; tshark -G plugins, which looks as if it's *intended* to be the equivalent 
of About > Folders, lists only run-time-loadable-object and Lua plugins, not 
extcap plugins.

> 2. Why does dumpcap -D not show the same interfaces that the GUI does?

Either because 1) there's a bug or 2) it can't capture on extcap devices, so it 
shouldn't report them.  From a quick test, it appears that 2) is the case here.
___
Sent via:Wireshark-dev mailing list 
Archives:https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev
 mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe

Re: [Wireshark-dev] extcap tools

2019-03-26 Thread Guy Harris
On Mar 26, 2019, at 1:57 PM, Guy Harris  wrote:

> There is no way to list the full paths of extcap executables from the command 
> line; tshark -G plugins, which looks as if it's *intended* to be the 
> equivalent of About > Folders, lists only run-time-loadable-object and Lua 
> plugins, not extcap plugins.

I've checked in a change to make "tshark -G plugins" show extcap plugins as 
well.
___
Sent via:Wireshark-dev mailing list 
Archives:https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev
 mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe