

Tshark: An error occurred while writing to the file "bar.pcapng": Internal error. Use tshark to read and write the generated foo.pcapng: $ tshark -r foo.pcapng -w bar.pcapng Tcpdump: listening on pktap, link-type PKTAP (Apple DLT_PKTAP), capture size 262144 bytes Wireshark‘s tshark program can’t process macOS‘s pcapng file well. Posted on JJCategories Technology Tags openssl, tcpdump, TLS, wireshark 1 Comment on Use OpenSSL to simulate TLS 1.3 “Session Resumption” tshark can’t process macOS’s pcapng file well Then the keys.txt can be used to decrypt the two TLS 1.3 sessions (refer Use Wireshark to decrypt TLS flows). (5) Combine two keys file into one: $ cat keys1.txt keys2.txt > keys.txt (3) Initiate another TLS 1.3 session to reuse the saved “ Session Ticket“: $ echo | openssl s_client -connect :443 -tls1_3 -sess_in sess.pem -keylogfile keys2.txt Once the connection is established, input “ GET /” to trigger TLS 1.3 Server to send “ New Session Ticket” message, and this will be saved in sess.pem file. (2) Open another terminal to initiate the first TLS 1.3 session: $ openssl s_client -connect :443 -tls1_3 -sess_out sess.pem -keylogfile keys1.txt (1) Open one terminal to launch tcpdump to capture TLS packets: $ pfexec /opt/ooce/sbin/tcpdump -w tls.pcap port 443 The Operation System I used is OmniOS, and OpenSSL version is 1.1.1k, but I think the methods here can also be applied to other platforms: Thanks the great help from OpenSSL community, I finally can simulate an TLS 1.3 “Session Resumption”. chadhomo on Update keyring first if your Arch Linux is old enough.Alex Bio on Fix “Permission denied rb_file_s_symlink” error of installing homebrew.Darius on Fix “Permission denied rb_file_s_symlink” error of installing homebrew.TK on Linking error of _ntl_gbigint_body in using NTL.

nanxiao on Linking error of _ntl_gbigint_body in using NTL.
