-
-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use a NSS Key Log file to decrypt a TLS session #3374
Conversation
Codecov Report
@@ Coverage Diff @@
## master #3374 +/- ##
==========================================
- Coverage 85.90% 85.89% -0.02%
==========================================
Files 274 274
Lines 56684 56728 +44
==========================================
+ Hits 48695 48725 +30
- Misses 7989 8003 +14
|
This PR is ready to be reviewed. I would like to get an opinion related to the size of the |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks good to me. The packet size is fine. Do you want to merge it now and do TLS 1.3 separately?
Let’s merge this now! I will add TLS1.3 later.
…Sent from my iPhone
On 10 Oct 2021, at 11:48, gpotter2 ***@***.***> wrote:
@gpotter2 approved this pull request.
This looks good to me. The packet size is fine. Do you want to merge it now and do TLS 1.3 separately?
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub, or unsubscribe.
|
Thank you, this is very nice PoC but still not usable in real world. Doesn't work with multiple TLS connections. Holds only last connection keys with "dublicate warning". @gpotter2 please do not merge anymore PRs that doesn't work. |
My .pcap traffic is TLS 1.3 that's not supported in your PR. Btw I'm waiting for full multiple-connection TLS 1.2 & 1.3 decryption as soon as you can 😔 |
I believe you are mistaken in believing that we owe you features in some way. Be assured that Scapy is provided with absolutely "no warranty". |
* Use a NSS Key Log file to decrypt a TLS session * Decrypting TLS 1.2 using a known master secret * Test TLS 1.2 decryption using a NSS Key Log
how get nsskeylog? use scapy |
This PR adds support for the NSS Key Log.
It allows Scapy to reuse the keys to decrypt TLS sessions.
Currently, it only supports TLS 1.2, but TLS 1.3 is on the road map (it will fix #3073).
A possible usage is: