|
1 | 1 | { |
2 | 2 | "magic": "E!vIA5L86J2I", |
3 | | - "timestamp": "2025-10-09T01:42:55.053227+00:00", |
| 3 | + "timestamp": "2025-10-12T01:46:58.224292+00:00", |
4 | 4 | "repo": "IETF-OPSAWG-WG/draft-ietf-opsawg-pcap", |
5 | 5 | "labels": [ |
6 | 6 | { |
|
2971 | 2971 | "updatedAt": "2025-07-06T18:17:11Z" |
2972 | 2972 | } |
2973 | 2973 | ] |
| 2974 | + }, |
| 2975 | + { |
| 2976 | + "number": 190, |
| 2977 | + "id": "I_kwDOAU54e87Qh7Qz", |
| 2978 | + "title": "TLS nonce as an option to packet blocks in the pcapng specification", |
| 2979 | + "url": "https://github.com/IETF-OPSAWG-WG/draft-ietf-opsawg-pcap/issues/190", |
| 2980 | + "state": "OPEN", |
| 2981 | + "author": "sergey-safarov", |
| 2982 | + "authorAssociation": "NONE", |
| 2983 | + "assignees": [], |
| 2984 | + "labels": [], |
| 2985 | + "body": "To troubleshoot WebRTC calls via WebSocket, we need to decrypt TLS connections from the start.\nFor long-running WebSocket connections on a server with a high volume of traffic, I need to filter numerous PCAP files to collect all packets for a single WebSocket connection from the time the connection was established. \nThis is not easy to do.\n\nIt will be fine to record in a PCAP file the `TLS nonce`. In this case, TLS messages will be possible to decrypt from the middle of the TLS connection.\nMore discussion you can find at\nhttps://gitlab.com/wireshark/wireshark/-/issues/20512\n\nCould you extend the pcapng format to add a field to store the TLS nonce? ", |
| 2986 | + "createdAt": "2025-10-09T10:24:47Z", |
| 2987 | + "updatedAt": "2025-10-09T15:19:13Z", |
| 2988 | + "closedAt": null, |
| 2989 | + "comments": [ |
| 2990 | + { |
| 2991 | + "author": "guyharris", |
| 2992 | + "authorAssociation": "COLLABORATOR", |
| 2993 | + "body": "> It will be fine to record in a PCAP ... Could you extend the pcapng format to add a field to store the TLS nonce?\n\n[The PCAP capture file format](https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-pcap) has no provision for storing that, and is not extensible.\n\n[The PCAP Now Generic file format](https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-pcapng), also known as \"pcapng\", has, for example, [Decryption Secrets Blocks](https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-pcapng#name-decryption-secrets-block), which can store any of a number of types of secrets used to decrypt packets, and can have new secret types added, if none of the existing secret types can be used.\n\n[Please submit a pull request](https://github.com/IETF-OPSAWG-WG/draft-ietf-opsawg-pcap/pulls) for [the pcapng specification](https://github.com/IETF-OPSAWG-WG/draft-ietf-opsawg-pcap/blob/master/draft-ietf-opsawg-pcapng.md) to add a TLS nonce type if none of the existing types can store it.", |
| 2994 | + "createdAt": "2025-10-09T15:12:51Z", |
| 2995 | + "updatedAt": "2025-10-09T15:12:51Z" |
| 2996 | + }, |
| 2997 | + { |
| 2998 | + "author": "guyharris", |
| 2999 | + "authorAssociation": "COLLABORATOR", |
| 3000 | + "body": "[The discussion in Wireshark issue #20512](https://gitlab.com/wireshark/wireshark/-/issues/20512) indicates that the nonce would be per-*frame*, so, instead of storing it in a Decryption Secrets Block, it would have to be stored as an [option](https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-pcapng#name-options) for the [Enhanced Packet Block](https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-pcapng#name-enhanced-packet-block).\n\nGiven that, the pull request would have to add a new \"TLS nonce\" option for the Enhanced Packet Block.", |
| 3001 | + "createdAt": "2025-10-09T15:19:13Z", |
| 3002 | + "updatedAt": "2025-10-09T15:19:13Z" |
| 3003 | + } |
| 3004 | + ] |
2974 | 3005 | } |
2975 | 3006 | ], |
2976 | 3007 | "pulls": [ |
|
0 commit comments