EDIT 2015-10-04 16:23+02:00 :
Revised this post for typoes, improved the wording in some sentences, and added the [***] note in bottom.
EDIT END
I'll try and post the files upfront this time, so you can check as soon as you read this and possibly (or should I say hopefully; there will be some feathers ruffled, and maybe adverse consequences/actions against me) [and possibly] in a few next posts. There are issues, and I am not ready to go the Javascript way onto the possibly-Schmoog-friendly
ask.wireshark.org in my tiny, and in a peculiar way, regimatic environment (the internet is broken down and control given to smaller entities per the local power/regime, with the master entity, the U.S. (read: the NSA) keeping all the threads, therefore the "in a peculiar way") [*].
The files to look up and run the commands below against, will be on:
http://www.croatiafidelis.hr/foss/cap/c ... lis-login/
The important file without which you can't decrypt any of te SSL streams, and that needs to be set up as previously explained (in the PDF linked document by SANS Training), is the file with the session keys for all of this set (or even more). [**]
The SSLKEYLOGFILE_151001_1358_g0n.log.
Maybe you can do best to download just the
dLo.sh file. Make a dir where you have perms. Enter that dir and run it:
It will download all that is currently in the cap-151001-legalis-login/ .
Download them to be able to run the commands below, and check on the veracity of my claims/help us solve what I can not solve.
Because I also post this because I may need some help to figure out things. If any of you wizards are benevolently reading this, from Wireshark mailing lists, from higher echalons in Gentoo, or elsewhere, and you know how to solve the real hurdles that will be in your plain sight, if those hurdles are at all solvable, do join in with your kind advice. You will have my gratitude, and I am sure, respect from other readers of this topic!
The first set to examine is of the time: 2015-10-01 13:58 CET (as it carries the timestamp 151001_1358, and I live in Zagreb, Croatia).
tshark -r dump_151001_1358_g0n.pcap -q -z expert,note,tcp
Code: Select all
Errors (3)
=============
Frequency Group Protocol Summary
2 Malformed TCP New fragment overlaps old data (retransmission?)
1 Undecoded SPDY Inflation failed. Aborting.
Warns (37)
=============
Frequency Group Protocol Summary
34 Sequence TCP Connection reset (RST)
1 Undecoded SSL BER: Dissector for OID not implemented. Contact Wireshark developers if you want this supported
2 Sequence TCP TCP transmission window is now completely full
Notes (267)
=============
Frequency Group Protocol Summary
97 Sequence TCP TCP keep-alive segment
88 Sequence TCP ACK to a TCP keep-alive segment
62 Sequence TCP This frame is a (suspected) retransmission
17 Sequence TCP Duplicate ACK (#1)
1 Malformed HTTP HTTP body subdissector failed, trying heuristic subdissector
1 Sequence TCP Duplicate ACK (#2)
1 Sequence TCP Duplicate ACK (#3)
A preemption first. Looking back, did anybody see anything faulty in my Gentoo's setup in those network traffic captures on that maildrop-users mailing list hosted on SourceForge?
I'm so glad, now, that I already posted those dumps. See my two previous posts (and maybe read further back if you parachuted in here).
Now if anybody would be trying to sell us the crap that I should need to fix my machine, because it were, in his opinion, broken, such (possible) individual only needs to redirect his/her own attention to how smooth my setup works on internet conversations with honest hosts. Thanks. Period dot.
I can't give detailed analysis of this traffic capture as I don't yet speek Lua (no time to study it now) and it's too much work do it manually, but maybe I could call readers' attention to three particular tcp streams: We'll be pasting, in the filter, first "tcp.stream eq 61" (because the screencast tells us to, even though it's out of order), then "tcp.stream eq 16", and then "tcp.stream eq 56".
I'll post some extracted files in the corresponding folder named after the dump:
dump_151001_1358_g0n.d/
1) So you should see how it is that the screencast tells us to look up the stream 61 first, to get a clearer picture. You can see there troubles right at start if you download and view the screencast Screen_151001_1358_g0n.mkv.
WARNING: if your technical interests are strict on this topic, skip to "WARNING END"
But a note is due. I want to try and see if I can ask some legalese on the Croatian Legal Forums (Hrvatski Pravni Portal) in connection with my correspondence with my providers who arbitrarily breached my rights as well as the agreement btwn me and each of them respectively, who censored me based on their baseless false accusations that I sent spam emails, some of which you can read even here on Gentoo Forums in my translation:
Postfix smtp/TLS, Bkp/Cloning Mthd, Censorship/Intrusion
https://forums.gentoo.org/viewtopic-t-9 ... ml#7682770
as well as now (hopefully they haven't taken my NGO's site down) on:
http://www.croatiafidelis.hr/foss/cenz/ ... a1.en.html
(but that is the only translated email, the rest is in Croatian; it's:
a Snapshot (taken in a hurry) of Lurker deployed on my SOHO
http://www.croatiafidelis.hr/foss/cenz/ ... iro-rovis/
btwn me, Miroslav Rovis, and Iskon, and T-com
that I want to talk legalese to juridical poeple and citizens there).
That is why I am trying to login/register at
http://www.legalis.hr , the Croatian Legal Forums.
WARNING END
You can see there, in that screencast, after the first half a minute:
A script on this page may be busy, or it may have stopped responding. You can stop the script now, open the script in the debugger, or let the script continue.
Script: http: //rsgde.adocean.pl/files/... <snipping a little>/simpaBanner2.Js:1
I chose to "Debug script" but then very soon decided I wasn't going to delve into it. Too little knowledge of Javascript here.
Anyway, that same script is available in the dump.
$ tshark -r dump_151001_1358_g0n.pcap -z expert,note,tcp | grep rsgde | grep simpaBanner
Code: Select all
1163 34.721663000 192.168.1.2 -> rsgde.adocean.pl HTTP 425 GET /files/akimiqplupg/yileewlqpw/vdmegvlrkn/js/simpaBanner2.js HTTP/1.1
So paste in the filter:
It would even more extend these posts if I repeated the method of extracting content. See previous posts.
The script is in the said folder and it is named:
dump_151001_1358_g0n_s61_01_SimpaBanner2.js. What is wrong with the script I can not tell for reasons already stated.
2)
tcp.stream eq 16
It decrypts, yes it does. But what is decrypted, is some fragment of some compressed file, or some encrypted matter (so, if this latter is the case, it's encryption upon encryption, and there is no key other than in the Schmoog's own archives, to decrypt the inner encryption, again: if that is the case [***]). Have a look, as I'll post what anybody can decrypt with the setup of his/her Wireshark as we have so far learned:
Follow and save ssl stream, and compare it to this one that you can download (it ought to be exactly the same, to the bit), and then you tell me what you can make of it:
dump_151001_1358_g0n_s16-ssl.dump
The only string that makes some sense to me if I look up that dump with hexedit is "PRI * HTTP/2.0". All else is gibberish.
3)
tcp.stream eq 56
This one is fascinating!
The conversation is with some Zucky the great "philantropist"'s Facebook host:
It's easy to extract it. Click on any of the lines with TLSv1.2, follow SSL stream, Save as:
dump_151001_1358_g0n_s56-ssl.dump
It's, allegedly (read on) gzip'd.
It's two GET's in there. Second first.
NOTE: 'man hexedit' ...
Search, in hex, for "47455400". Set mark at the second found. Search to end. That will select to end. Copy. Paste into a file, naming that file:
dump_151001_1358_g0n_s56-ssl_02.dump
Reapeat the search (or in some other fashion set the cursor again at the start of the second GET. Truncate.
Set the mark at the first get. Search to end. That will select the entire remaining content from there. Paste into file:
dump_151001_1358_g0n_s56-ssl_01.dump
Open file: dump_151001_1358_g0n_s56-ssl_01.dump
I don't see there could be anything there to extract.
Open file: dump_151001_1358_g0n_s56-ssl_02.dump
Serch in ascii for gzip finds one instance. Move to top. Search in hex for "1F8B08". Mark. Move to end. Copy. Paste into file: dump_151001_1358_g0n_s56-ssl_02.gz
And here we go, here's the
fascinating thing!:
Code: Select all
$ ls -l dump_151001_1358_g0n_s56-ssl_02.gz
-rw-r--r-- 1 ukra ukra 5993 2015-10-02 14:42 dump_151001_1358_g0n_s56-ssl_02.gz
$ file dump_151001_1358_g0n_s56-ssl_02.gz
dump_151001_1358_g0n_s56-ssl_02.gz: gzip compressed data, from Unix
$ gunzip dump_151001_1358_g0n_s56-ssl_02.gz
gzip: dump_151001_1358_g0n_s56-ssl_02.gz: invalid compressed data--format violated
$
The kind and philantropist Zucky's Facebook violates the gzip format! Pls do show me, pls. do prove me wrong! I'm really not claiming complete certainty because I'm really not an expert by any means. However, the file is there for everybody to see.
Do tell us why that gzip'd archive can not be extracted and why gzip shouts out so loud that the
format has been
violated!
I want to see (but not immediately; this is tiring work) what the true experts on Wireshark.org may want to say about this little snippet of content with this credibly (IMO) alleged violation. [***]bis
Anyway, I basically decided that, looking up all the plethora of almost all the world's top surveillors being pulled in by my only trying to open, and possibly login/register with the Croatian Legal Forums... (almost all; I believe there are some who will sorely miss Billy the Senior Philantropist's M$ not pulled in)...
And so I decided I try and do some filtering to see if I can talk to the Croatian Legal Forums without having to deal with than many of the big players' surveilling tentacles.
By filtering some of that plethora of domains out at the input of my iptables, dropping their packets on the floor, with emplying the filtering capability that I compiled in my kernel, and deploying it by adequate filtering rules.
Have a look at how many of those hosts are set to get their tentacles in my machine by my mere opening the initial
http://www.legalis.hr page and trying to login/register in:
dump_151001_1358_g0n_RESO.txt
I'll continue this story in the next post.
---
[*] I'd really kindly ask the inventor
Tim Berners Lee whether (1) he knew ahead of his invention that such would be the case, and I'd kindly ask him (2) not to keep boasting with the benefits of the internet; nothing is better for it, unless the big brains, and big players, don't engage against (the first), or stop surveillance (the second), surveillance the cancer of the internet, like, exampli gratia,
Bruce Schneier does, of the world's true intellectual internet elite; but does anyone know of any big players refraining from spreading this cancer?
[**] I really have nothing to hide currently, and yet few readers will doubt that I am fighting so that we, the poor users, especially the FOSS *nix users (too little hope for M$, Apple and such, users), be able to hide our personal correspondence, our browsing habits, and anything we want to hide. Because it is our time, our life, our streets in our cities (and not, say, Schmoog's), our friends and our communities, and it does not pertain to the surveillors, to control any of it, to track, to inspect and hoard data about, any of it, by any constitution of any country of the world that is at least somewhat free. You can start from the Constitution of the United States of America, this important amendment granting they are not allowed to control you:
https://en.wikipedia.org/wiki/Fourth_Am ... nstitution
and I can tell you that the right to hide my communications, as I please, is in the Constitution of the Republic of Croatia, as well. Just the hiding that I talk as legitimae here, is not hiding things and you move you code into people's computors like Facebook appears to have done above. I don't approve of such hiding of things. Because that's not privacy, that's attack on other people's property what FB apparently does. In this note I remotely paraphrase Eric Google's, in 201x, repeating of Göbels', in 194x, soundbite: "If you have nothing to hide, you have nothing to worry about!", if the kind reader hasn't noticed.
[***] and [***]bis It is more study that is needed, of the HTTP2 standard (as well as of SPDY), as I explain in the later posts in this topic, starting from:
https://forums.gentoo.org/viewtopic-t-1 ... ml#7823392
as well as on Wireshark ML:
https://www.wireshark.org/lists/wiresha ... 00000.html
to see if these packets really carry concealed content, which IMO would be breach of my privacy, because the ground is mine, not Schoog's, not Facebook's nor any others', it's my machine. It's like entering somebody's home with a concealed gun, if it really can not be decrypted without Quantum PC power, what they put in those packets...