Dissect decrypted QUIC packets from Google

asked 2025-02-20 02:32:25 +0000

Linxiao Yu gravatar image

updated 2025-02-20 02:37:51 +0000

Hi, everyone. I'm learning QUIC protocol with Wireshark. When I capture traffic from www.google.com (or www.youtube.com), after using TLS keylog.txt, Wireshark shows the decrypted QUIC panel. However, these decrypted payloads seem not to be dissected properly as a higher layer protocol (maybe HTTP3?). So, I could not export any useful objects from the decrypted traffic.

However, when I request other websites, e.g., www.xiaohongshu.com, which also uses QUIC, after importing keylog.txt, I could see the HTTP3 packets. So I wonder why this would happen.

I learned that Google may use its own QUIC version, i.e., GQUIC, but Wireshark seems to display my capture as the normal QUIC traffic. I wonder if it is possible to dissect these decrypted Google/YouTube traffic, or am I doing some wrong in decryption? Any help is appreciated. :)

Sorry that I don't have enough points to post images, I upload the images, .pcap along with keylog.txt files for www.google.com, www.youtube.com and www.xiaohongshu.com separately. Sorry for that inconvenience. :)

The Wireshark version is: Version 4.4.3 (v4.4.3-0-g66d7a52feb06).

edit retag flag offensive close merge delete