Re: [Wireshark-dev] Support for TLS1.2 decryption using derived keys

2020-05-01 Thread Peter Wu
On Sat, May 02, 2020 at 01:48:12AM +0300, webpentest wrote: > > Since it relies on undocumented structures, maybe you could make an > > automated test that you run with GitHub Actions to check whether it > > keeps working? That can act as usage documentation as well. > > Some automated testing is a

Re: [Wireshark-dev] Support for TLS1.2 decryption using derived keys

2020-05-01 Thread webpentest
On 01.05.2020 23:24, Peter Wu wrote: > I wrote a script to do that and documented its usage on >> http://b.poc.fun/sslkeylog-for-schannel/. It is in now way generic >> (yet), but I successfully use in my research. Feel free to give it a go! >> The main problem really is to get crandom and correlate

[Wireshark-dev] Trying to decode a TLS 1.3 with null cipher

2020-05-01 Thread Ahmed Elsherbiny
Hello, I've written a dissector for a custom protocol. The dissector works well, and now I'm trying to run the protocol over TLS 1.3. The cipher suite being used is TLS_SHA256_SHA256 (Code: 0xC0B4). This is a new cipher suite, it is used for integrity and has a null cipher (The payload is actuall

Re: [Wireshark-dev] Support for TLS1.2 decryption using derived keys

2020-05-01 Thread Peter Wu
On Fri, May 01, 2020 at 02:39:28PM +0300, webpentest wrote: > Hello Peter, > On 01.05.2020 01:23, Peter Wu wrote: > > > >> 1. A generic way to export schannel key material in SSLKEYLOG-like > >> format using elevated privilege and lsass.exe debugging / memory. > >> Preferably - the data that wiresh

Re: [Wireshark-dev] Regenerating packet-parlay.c

2020-05-01 Thread Jaap Keuter
On 5/1/20 12:02 PM, Luke Mewburn wrote: > On 20-05-01 07:34, Jaap Keuter wrote: > | > | > On 1 May 2020, at 04:13, Luke Mewburn wrote: > | > However, looking at the code some more, it appears that generally > | > wireshark_gen.py generates code in the order the operations are defined; >

Re: [Wireshark-dev] Support for TLS1.2 decryption using derived keys

2020-05-01 Thread webpentest
Hello Peter, On 01.05.2020 01:23, Peter Wu wrote: > >> 1. A generic way to export schannel key material in SSLKEYLOG-like >> format using elevated privilege and lsass.exe debugging / memory. >> Preferably - the data that wireshark supports already - master secret >> for tls <= 1.2 and the intermedi

[Wireshark-dev] Building under Ubuntu on WSL

2020-05-01 Thread Neil Piercy
I'm trying to re-building the standard Ubuntu wireshark package 3.2.3-1 from focal installed under WSL from the MS store. First issue was the lack of SYSV_IPC, so default fakeroot builds don't work, but switching to faked tcp as a build option works: "debuild -b -uc -us -r'fakeroot --faked fake

Re: [Wireshark-dev] Regenerating packet-parlay.c

2020-05-01 Thread Luke Mewburn
On 20-05-01 07:34, Jaap Keuter wrote: | | > On 1 May 2020, at 04:13, Luke Mewburn wrote: | > However, looking at the code some more, it appears that generally | > wireshark_gen.py generates code in the order the operations are defined; | > the exception (hah!) is the user exceptions.