Hi, everyone. I'm learning QUIC protocol with Wireshark. When I capture traffic from www.google.com (or www.youtube.com), after using TLS keylog.txt, Wireshark shows the decrypted QUIC panel. However, these decrypted payloads seem not to be dissected properly as a higher layer protocol (maybe HTTP3?). So, I could not export any useful objects from the decrypted traffic.

However, when I request other websites, e.g., www.xiaohongshu.com, which also uses QUIC, after importing keylog.txt, I could see the HTTP3 packets. So I wonder why this would happen.

I learned that Google may use its own QUIC version, i.e., GQUIC, but Wireshark seems to display my capture as the normal QUIC traffic. I wonder if it is possible to dissect these decrypted Google/YouTube traffic, or am I doing some wrong in decryption?