Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Does not work with TLS record of ClientHello from Chrome 124 #665

Open
perklet opened this issue Apr 17, 2024 · 0 comments
Open

Does not work with TLS record of ClientHello from Chrome 124 #665

perklet opened this issue Apr 17, 2024 · 0 comments

Comments

@perklet
Copy link

perklet commented Apr 17, 2024

Describe the bug
It seems that dpkt can not parse pcap files captured for Chrome 124 with the X25519Kyber768 key encapsulation method.

It alwasy gives a NeedData error:

dpkt.dpkt.NeedData: TLSRecord data was too short.

To Reproduce

  • Open wireshark or tcpdump and listen on 443 port
  • Use Chrome 124 to visit a https website
  • Capture a file with ClientHello in it
  • Parse the pcap file with dpkt

Expected behavior
The pcap file should be parsed correctly.

Screenshots
I have verified that the pcap file is valid and can be opened in Wireshark.
image

Details(please complete the following information):

  • OS: macOS sonoma
  • Python Version 3.11.5

Additional context
N/A

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant