lua:quic
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
lua:quic [2018/12/13 17:31] – veera | lua:quic [2024/06/04 16:58] (current) – [QUIC protocol analysis using the Trisul Scripting API] thiyagu | ||
---|---|---|---|
Line 2: | Line 2: | ||
- | QUIC (Quick UDP Internet Connection) is a protocol championed by Google to speed up web services by replacing the traditional TCP/ | + | QUIC (Quick UDP Internet Connection) is a protocol championed by Google to speed up web services by replacing the traditional TCP/ |
- | semantics on the UDP based QUIC and call the new thing HTTP/ | + | semantics on the UDP based QUIC and call the new thing HTTP/ |
- | However, right now the only QUIC found in the wild seems to be from the Google stable and used by Google-Chrome. | + | This article |
+ | < | ||
+ | **UPDATES** | ||
+ | < | ||
- | BITMAUL | ||
+ | The QUIC analysis LUA scripts can be found here in the [[https:// | ||
+ | </ | ||
- | Extract the following information | ||
- | Flow Tags | + | ===== Network Security Monitoring for QUIC ===== |
+ | |||
+ | In the NSM((Network Security Monitoring involves collecting multiple types of data characterizing network traffic http:// | ||
+ | |||
+ | We were seeing quite a bit of QUIC traffic to YouTube in one of our probes, so we went ahead and got the PCAPs and started analyzing them using Wireshark and the Google QUIC Crypto ((the CRYPTO protocol is documented here at https:// | ||
+ | |||
+ | * **Connection ID** - a 64-bit random number that would likely be globally unique identifying the QUIC connection. | ||
+ | * **SNI** - Server Name Indicator ; similar to the TLS SNI Extension | ||
+ | * **Client User Agent** : This was surprising to note that QUIC leaks this before the handshake while in HTTPS (HTTP over TLS) this is encrypted and we resort to things like JA3 Hash to guess the User Agent. | ||
+ | * **Certificate Chain** : Similar to the X.509 certificate chain found in TLS. | ||
+ | |||
+ | |||
+ | Then it is a matter of using the open source [[https:// | ||
+ | |||
+ | ==== Explaining the scripts ==== | ||
+ | |||
+ | The scripts are on Github at [[https:// | ||
+ | |||
+ | - A new [[https:// | ||
+ | - A Trisul [[https:// | ||
+ | - The actual QUIC dissector , which returns a LUA table with all fields filled in ( '' | ||
+ | - A QUIC certificate decompressor using LuaJIT FFI into zlib | ||
+ | |||
+ | The [[https:// | ||
+ | |||
+ | ==== Output of the QUIC analysis ==== | ||
+ | |||
+ | |||
+ | The goal of all Trisul scripts is to add some piece of information into the streaming analysis. What we do in quic-simplecounter.lua is. | ||
+ | |||
+ | - Tag (Enrich) every flow with the label QUIC | ||
+ | - Tag every flow with the ConnectionID | ||
+ | - Tag every flow with User Agent and SNI (Server Name) | ||
+ | - Extract certificate chain and add to Trisul as a SSL Cert Resource (think of this as a log ) | ||
+ | |||
+ | |||
+ | This is how the outputs look like. | ||
+ | ===== Flow Tags ===== | ||
+ | |||
+ | To pull out all QUIC flows go to Tools > Explore Flows > then search for tag=QUIC | ||
+ | |||
+ | Click to zoom the image, you can see the QUIC flows tagged with QUIC, ConnectionID, | ||
{{ : | {{ : | ||
+ | You can also search for tag=doubleclick.net to pull out QUIC flows from doubleclick.net | ||
+ | |||
+ | |||
+ | ===== Extract X.509 Certificate in QUIC ===== | ||
+ | |||
+ | Just as we do for all SSL flows, we pull out the certificates in QUIC from the server. Apparently QUIC also uses a 64-bit cert FLV.1 hash for well known certificate chains (like googles), | ||
+ | |||
+ | This took a while for me to get the certificate extraction right due to the following issues. | ||
+ | |||
+ | * the CRT\xff tag contains the certificate which is compressed. This is a bit unexpected because even before the authentication is done, we are running an decompress operation. | ||
+ | * you need to use a pre-shared dictionary to do the decompression, | ||
+ | * the certificate spans multiple UDP packets hence needs some reassembly. Put together a very naive reassembly code in quic-dissect.lua | ||
+ | |||
+ | |||
+ | Go to Resources > SSL Certs > press ENTER or search // | ||
- | Extract X.509 Certificate in QUIC | ||
{{ : | {{ : | ||
+ | |||
+ | ===== Comparison to Bro/Zeek ===== | ||
+ | |||
+ | The Trisul scripting API allows you to write in LUA rather than a mix of C/Bro language which need a compilation step. We find this is a major efficiency advantage. | ||
+ | |||
+ | |||
+ | ===== Conclusion ===== | ||
+ | |||
+ | The goal here is to show the power of the Trisul scripting API rather than a production grade QUIC analyzer. | ||
+ | |||
+ | While the script is working fine in our test environment but putting into production would need some extra work. Particularly when QUIC is used for HD streaming, we need a more efficient way to shunt the stream after the initial handshake otherwise we enter the C->Lua interface for every UDP packet. | ||
+ | Head over to the Github page for the [[https:// |
lua/quic.1544702510.txt.gz · Last modified: 2018/12/13 17:31 by veera