Replies: 2 comments 4 replies
-
Please provide complete logs, complete run parameters you removed. Secondly, the picture is incomplete. |
Beta Was this translation helpful? Give feedback.
-
Will the Why on the official website of curl, the parameters displayed are indeed In addition, #703 demonstrates a client written in Golang, which uses goang's own TLS module, and the demonstrated command is However, you started the |
Beta Was this translation helpful? Give feedback.
-
I am trying to use ecapture to decrypt http3 packet but failed.
Using below "sudo ecapture tls -m pcap -i ens3 --pcapfile=ecapture.pcapng port 443" command. when I looked at ecapture.pcapng, http2 packet is captured and decrypted, but http3 packet only show as quic header but remaining payload decryption failed.
Anyone have http3 successful packet captured example can be shared?
2024-12-23T14:07:21Z INF AppName="eCapture(旁观者)"
2024-12-23T14:07:21Z INF HomePage=https://ecapture.cc
2024-12-23T14:07:21Z INF Repository=https://github.com/gojue/ecapture
2024-12-23T14:07:21Z INF Author="CFC4N [email protected]"
2024-12-23T14:07:21Z INF Description="Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64."
2024-12-23T14:07:21Z INF Version=linux_amd64:v0.9.1:6.5.0-1025-azure
2024-12-23T14:07:21Z INF Listen=localhost:28256
2024-12-23T14:07:21Z INF eCapture running logs logger=
2024-12-23T14:07:21Z INF the file handler that receives the captured event eventCollector=
2024-12-23T14:07:21Z INF listen=localhost:28256
2024-12-23T14:07:21Z INF https server starting...You can upgrade the configuration file via the HTTP interface.
2024-12-23T14:07:21Z INF Kernel Info=6.1.0 Pid=2724
2024-12-23T14:07:21Z INF BTF bytecode mode: CORE. btfMode=0
2024-12-23T14:07:21Z INF module initialization. isReload=false moduleName=EBPFProbeOPENSSL
2024-12-23T14:07:21Z INF Module.Run()
2024-12-23T14:07:21Z WRN OpenSSL/BoringSSL version not found. error="OpenSSL/BoringSSL version not found" soPath=/usr/lib/x86_64-linux-gnu/libssl.so.3
2024-12-23T14:07:21Z WRN Try to detect libcrypto.so.3. If you have doubts, See #675 for more information.
2024-12-23T14:07:21Z INF Try to detect imported libcrypto.so imported=libcrypto.so.3 soPath=/usr/lib/x86_64-linux-gnu/libcrypto.so.3
2024-12-23T14:07:21Z INF origin versionKey="openssl 3.0.15" versionKeyLower="openssl 3.0.15"
2024-12-23T14:07:21Z INF OpenSSL/BoringSSL version found Android=false library version="openssl 3.0.15"
2024-12-23T14:07:21Z INF HOOK type:Openssl elf ElfType=2 IFindex=2 IFname=ens3 PcapFilter="port 443" binrayPath=/usr/lib/x86_64-linux-gnu/libssl.so.3
2024-12-23T14:07:21Z INF Hook masterKey function Functions=["SSL_get_wbio","SSL_in_before","SSL_do_handshake"]
2024-12-23T14:07:21Z INF target all process.
2024-12-23T14:07:21Z INF target all users.
2024-12-23T14:07:21Z INF setupManagers eBPFProgramType=PcapNG
2024-12-23T14:07:21Z INF BPF bytecode file is matched. bpfFileName=user/bytecode/openssl_3_0_0_kern_core.o
2024-12-23T14:07:21Z INF packets saved into pcapng file. pcapng path=/home/yinghli/ecapture.pcapng
2024-12-23T14:07:22Z INF perfEventReader created mapSize(MB)=4
2024-12-23T14:07:22Z INF perfEventReader created mapSize(MB)=4
2024-12-23T14:07:22Z INF module started successfully. isReload=false moduleName=EBPFProbeOPENSSL
Beta Was this translation helpful? Give feedback.
All reactions