Re: [Wireshark-dev] asn2wrs.py no longer seems to generate the same code ...

2020-05-15 Thread Richard Sharpe
On Fri, May 15, 2020 at 3:33 PM Peter Wu wrote: > > The "asn1" target rebuilds all asn1 dissectors. > Alternatively to rebuild a specific one, use a target such as > "generate_dissector-pkcs1". Sure, but there seems to be multiple issues. 1. The 'documented' command placed in the generated

Re: [Wireshark-dev] Cannot Decrypt Fast BSS Transition (802.11r) Packets

2020-05-15 Thread Mikael Kanstrup
Den fre 15 maj 2020 19:44Richard Sharpe skrev: > On Fri, May 15, 2020 at 10:27 AM Mikael Kanstrup > wrote: > > > > Hi, > > > > Fast BSS Transitioning decryption is unfortunately not supported by > Wireshark. > > > > Wireshark uses passphrase/PSK/PMK together with 4-way handshake to > derive PTK

Re: [Wireshark-dev] asn2wrs.py no longer seems to generate the same code ...

2020-05-15 Thread Peter Wu
The "asn1" target rebuilds all asn1 dissectors. Alternatively to rebuild a specific one, use a target such as "generate_dissector-pkcs1". Example: mkdir build cd build cmake .. cmake --build . --target generate_dissector-pkcs1 Or if you use ninja: mkdir build cd build

Re: [Wireshark-dev] Dissecting http2 traffic

2020-05-15 Thread Anders Broman via Wireshark-dev
Hi, Yes it's related to that bug. And if memory serves the trace would illustrate the problem. I don't see how the compression/decompression could recover as in showing the missing header element. I'm not sure I understand what your objection is. Is it in how to present the non decodable

Re: [Wireshark-dev] asn2wrs.py no longer seems to generate the same code ...

2020-05-15 Thread Richard Sharpe
On Fri, May 15, 2020 at 2:29 PM Richard Sharpe wrote: > > On Fri, May 15, 2020 at 2:30 PM Peter Wu wrote: > > > > Hi Richard, > > > > On Fri, May 08, 2020 at 08:54:58AM -0700, Richard Sharpe wrote: > > [..] > > > It doesn't look like it was manually modified. The last person who > > > touched

Re: [Wireshark-dev] asn2wrs.py no longer seems to generate the same code ...

2020-05-15 Thread Richard Sharpe
On Fri, May 15, 2020 at 2:30 PM Peter Wu wrote: > > Hi Richard, > > On Fri, May 08, 2020 at 08:54:58AM -0700, Richard Sharpe wrote: > [..] > > It doesn't look like it was manually modified. The last person who > > touched that file was Peter Wu, it seems, so maybe he can shed some > > light on

Re: [Wireshark-dev] asn2wrs.py no longer seems to generate the same code ...

2020-05-15 Thread Peter Wu
Hi Richard, On Fri, May 08, 2020 at 08:54:58AM -0700, Richard Sharpe wrote: [..] > It doesn't look like it was manually modified. The last person who > touched that file was Peter Wu, it seems, so maybe he can shed some > light on it. How did you invoke asn2wrs.py? If I run the asn1 ninja/make

Re: [Wireshark-dev] Dissecting http2 traffic

2020-05-15 Thread Peter Wu
On Fri, May 15, 2020 at 06:50:18AM +, Anders Broman via Wireshark-dev wrote: > Hi, > > I think there is a demand to dissect http2 traffic where all packets in a > session is not captured. This is currently not possible. > > As the http2 protocol creates dynamic data for

Re: [Wireshark-dev] Cannot Decrypt Fast BSS Transition (802.11r) Packets

2020-05-15 Thread Richard Sharpe
On Fri, May 15, 2020 at 10:27 AM Mikael Kanstrup wrote: > > Hi, > > Fast BSS Transitioning decryption is unfortunately not supported by Wireshark. > > Wireshark uses passphrase/PSK/PMK together with 4-way handshake to derive PTK > and GTK. FT key hierarchy and key derivation is not handled by

Re: [Wireshark-dev] Cannot Decrypt Fast BSS Transition (802.11r) Packets

2020-05-15 Thread Richard Sharpe
On Wed, May 13, 2020 at 9:01 PM Mohit Khattar via Wireshark-dev wrote: > > Hi, > > We (myself and Jeff Hansen, CC'd) have been having trouble decrypting data > packets on a monitor-mode capture involving packets between an ath9k client > and a Fast BSS Transition-capable wireless network with

Re: [Wireshark-dev] Cannot Decrypt Fast BSS Transition (802.11r) Packets

2020-05-15 Thread Mikael Kanstrup
Hi, Fast BSS Transitioning decryption is unfortunately not supported by Wireshark. Wireshark uses passphrase/PSK/PMK together with 4-way handshake to derive PTK and GTK. FT key hierarchy and key derivation is not handled by the decryption engine so PTK remains unknown which makes decryption

Re: [Wireshark-dev] GSoD Proposal submission process ?

2020-05-15 Thread Tomasz Moń
On Fri, May 15, 2020 at 5:03 PM Muhammad Afzal wrote: > For now, I want to clear one doubt, do i need to submit my proposal right now > to you > or it would be included in the application form? The actual proposal should be submitted using Season of Docs website when the application window

[Wireshark-dev] GSoD Proposal submission process ?

2020-05-15 Thread Muhammad Afzal
My name is Muhammad Afzal and I am from Pakistan. I have read the ideas under GSoD enlighten by the Wireshark community. What I believe is that without solid foundations of Computer Networks history and the reason behind every protocol invention, nobody would be able to give genuine description by

[Wireshark-dev] Dissecting http2 traffic

2020-05-15 Thread Anders Broman via Wireshark-dev
Hi, I think there is a demand to dissect http2 traffic where all packets in a session is not captured. This is currently not possible. As the http2 protocol creates dynamic data for compression/decompression and if the packet adding a new index to the index table is not Present then that header