1
1
mirror of https://github.com/wader/fq.git synced 2024-12-23 13:22:58 +03:00
fq/format/tls/testdata/split.jq
Mattias Wadman 9852f56b74 tls: Add TLS 1.0, 1.1, 1.2 decode and decryption
What it can do:
- Decodes records and most standard messages and extensions.
- Decryptes records and reassemples application data stream if a keylog is provided
  and the cipher suite is supported.
- Supports most recommended and used ciphers and a bunch of older ones.

What it can't do:
- SSL v3 maybe supported, is similar to TLS 1.0, not tested.
- Decryption and renegotiation/cipher change.
- Record defragmentation not supported, seems rare over TCP.
- TLS 1.3
- SSL v2 but v2 compat header is supported.
- Some key exchange messages not decoded yet

Decryption code is heavly based on golang crypto/tls and zmap/zcrypto.

Will be base for decoding http2 and other TLS based on protocols.

Fixes #587
2023-03-05 13:52:12 +01:00

45 lines
1.1 KiB
Plaintext

# go run . -L format/tls/testdata -o keylog=@format/tls/testdata/dump.pcapng.keylog -f format/tls/testdata/split.jq format/tls/testdata/dump.pcapng | tar -C format/tls/testdata/ciphers -x
include "to_tar";
def ipv4_tcp_tuple:
( . as {source_ip: $sip, destination_ip: $dip}
| grep_by(format=="tcp_segment") as {source_port: $sport, destination_port: $dport}
| [[$sip,$sport],[$dip,$dport]]
| sort
);
def connetions_tuples:
( [ grep_by(format=="ipv4_packet")
| ipv4_tcp_tuple
]
| unique[]
);
def to_ipv4_pcap(packets):
# TODO: hack
[ ("d4c3b2a1020004000000000000000000ffff0000e4000000" | from_hex)
, ( packets | tobytes | [band(.size;0xff),band(bsr(.size;8);0xff),0,0] as $sz
| [0,0,0,0,0,0,0,0,$sz,$sz,.])
] | tobytes;
( .[0].blocks
| . as $packets
| to_tar(
( $packets
| connetions_tuples as $tuple
| to_ipv4_pcap(
( $packets
| grep_by(format=="ipv4_packet")
| select($tuple ==ipv4_tcp_tuple)
)
)
| . as $pcap_bytes
| pcap
| .tcp_connections[0].server.stream.records[0].message as {$cipher_suit}
| {filename: "\($cipher_suit).pcap", data: $pcap_bytes}
)
)
)