←back to thread

306 points carlos-menezes | 1 comments | | HN request time: 0.248s | source
Show context
exabrial ◴[] No.41891042[source]
I wish QUIC had a non-TLS mode... if I'm developing locally I really just want to see whats going over the wire sometimes and this adds a lot of un-needed friction.
replies(2): >>41891081 #>>41891135 #
krater23 ◴[] No.41891081[source]
You can add the private key of your server in wireshark and it will automatically decrypt the packets.
replies(2): >>41891463 #>>41908681 #
jborean93 ◴[] No.41891463[source]
This only works tor RSA keys and I believe ciphers that do not have forward secrecy. Quic is TLS 1.3 and all the ciphers in that protocol do forward secrecy so cannot be decrypted in this way. You’ll have to use a tool that provides the TLS session info through the SSLKEYLOGFILE format.
replies(1): >>41896920 #
1. giuscri ◴[] No.41896920[source]
Like which one?