sngrep F2 save TLS issue
sngrep -k tls.key and F2 save tls dialog to test.pcap next sngrep -k tls.key -I test.pcap , then no callflow . maybe bug.
Did sngrep F2 save , then saved TCP data packet only . nerver save tls handshake Then must issue.
I have one idea , add fuction for support tls ip:port define . Then sngrep will recod ssl connect use tls handshake or ip:port static recod
The ip:port setting sounds good, but I would like to also make it work without the setting
If add one function for ip+port , then no need cap tls handshake aways , force decrypt tls . then solve issue for tls online callflow or offline import pcap.
and another idea , you can add one function random try decrypt tcp stream , if found sip header from TCP decrypted packets then add one global ssl recod. will solve issue . but best static ip+port for static ssl record for any case
Did sngrep F2 save , then saved TCP data packet only . nerver save tls handshake Then must issue.
Yet, it should save everything, i'll check it out.
and another idea , you can add one function random try decrypt tcp stream , if found sip header from TCP decrypted packets then add one global ssl recod. will solve issue . but best static ip+port for static ssl record for any case
This doesn't make too much sense to me. One global ssl record only will allow one connection to be decrypted. Each packet can only be decrypted if you have the previous one of the TCP stream. You can not randomly decrypt packets.
Anyway, TLS decrypting is highly discouraged and if someday sngrep 2.0.0 comes to live, most probably TLS support will be dropped.
Until then, thanks for all the feedback and support!
Regards
Hi,
Previous commit should allow a new setting for sngreprc to configure server IP:PORT
set capture.tlsserver 192.168.0.1:5061
This most probably won't fix the problem described here but it's just an enhancement.
Regards!
Thanks for the pcap!
TLS handshake is not being saved into the file. I'll see if I can fix this as soon as I have some spare time.
Regards!
Then can export include tls handshake packet?
Then best add one option to force deceypt use default cipher
exam:
set capture.tlsserver 192.168.1.1:5061
set capture.tlsserver_cipher_default=AES256-SHA