Skip to content

Commit 686f348

Browse files
author
ID Bot
committed
Script updating archive at 2025-10-12T01:47:00Z. [ci skip]
1 parent e292d4b commit 686f348

File tree

1 file changed

+32
-1
lines changed

1 file changed

+32
-1
lines changed

archive.json

Lines changed: 32 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"magic": "E!vIA5L86J2I",
3-
"timestamp": "2025-10-09T01:42:55.053227+00:00",
3+
"timestamp": "2025-10-12T01:46:58.224292+00:00",
44
"repo": "IETF-OPSAWG-WG/draft-ietf-opsawg-pcap",
55
"labels": [
66
{
@@ -2971,6 +2971,37 @@
29712971
"updatedAt": "2025-07-06T18:17:11Z"
29722972
}
29732973
]
2974+
},
2975+
{
2976+
"number": 190,
2977+
"id": "I_kwDOAU54e87Qh7Qz",
2978+
"title": "TLS nonce as an option to packet blocks in the pcapng specification",
2979+
"url": "https://github.com/IETF-OPSAWG-WG/draft-ietf-opsawg-pcap/issues/190",
2980+
"state": "OPEN",
2981+
"author": "sergey-safarov",
2982+
"authorAssociation": "NONE",
2983+
"assignees": [],
2984+
"labels": [],
2985+
"body": "To troubleshoot WebRTC calls via WebSocket, we need to decrypt TLS connections from the start.\nFor long-running WebSocket connections on a server with a high volume of traffic, I need to filter numerous PCAP files to collect all packets for a single WebSocket connection from the time the connection was established. \nThis is not easy to do.\n\nIt will be fine to record in a PCAP file the `TLS nonce`. In this case, TLS messages will be possible to decrypt from the middle of the TLS connection.\nMore discussion you can find at\nhttps://gitlab.com/wireshark/wireshark/-/issues/20512\n\nCould you extend the pcapng format to add a field to store the TLS nonce? ",
2986+
"createdAt": "2025-10-09T10:24:47Z",
2987+
"updatedAt": "2025-10-09T15:19:13Z",
2988+
"closedAt": null,
2989+
"comments": [
2990+
{
2991+
"author": "guyharris",
2992+
"authorAssociation": "COLLABORATOR",
2993+
"body": "> It will be fine to record in a PCAP ... Could you extend the pcapng format to add a field to store the TLS nonce?\n\n[The PCAP capture file format](https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-pcap) has no provision for storing that, and is not extensible.\n\n[The PCAP Now Generic file format](https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-pcapng), also known as \"pcapng\", has, for example, [Decryption Secrets Blocks](https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-pcapng#name-decryption-secrets-block), which can store any of a number of types of secrets used to decrypt packets, and can have new secret types added, if none of the existing secret types can be used.\n\n[Please submit a pull request](https://github.com/IETF-OPSAWG-WG/draft-ietf-opsawg-pcap/pulls) for [the pcapng specification](https://github.com/IETF-OPSAWG-WG/draft-ietf-opsawg-pcap/blob/master/draft-ietf-opsawg-pcapng.md) to add a TLS nonce type if none of the existing types can store it.",
2994+
"createdAt": "2025-10-09T15:12:51Z",
2995+
"updatedAt": "2025-10-09T15:12:51Z"
2996+
},
2997+
{
2998+
"author": "guyharris",
2999+
"authorAssociation": "COLLABORATOR",
3000+
"body": "[The discussion in Wireshark issue #20512](https://gitlab.com/wireshark/wireshark/-/issues/20512) indicates that the nonce would be per-*frame*, so, instead of storing it in a Decryption Secrets Block, it would have to be stored as an [option](https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-pcapng#name-options) for the [Enhanced Packet Block](https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-pcapng#name-enhanced-packet-block).\n\nGiven that, the pull request would have to add a new \"TLS nonce\" option for the Enhanced Packet Block.",
3001+
"createdAt": "2025-10-09T15:19:13Z",
3002+
"updatedAt": "2025-10-09T15:19:13Z"
3003+
}
3004+
]
29743005
}
29753006
],
29763007
"pulls": [

0 commit comments

Comments
 (0)