This is our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

I captured traffic on my WLAN adapter while connected to my VPN, and all of the traffic which I know to be HTTP over SSL is being interpreted as QUIC.

I understand that Google has attempted to hijack UDP 443 for its new protocol, but most of us still hold to the IANA standard that UDP 443 is HTTPS, and Wireshark should interpret it that way as long as HTTPS is the far more common usage of that port.

asked 13 Jun '16, 11:25

Michael_Romans's gravatar image

Michael_Romans
6225
accept rate: 0%

Can you share a capture in a publicly accessible spot, e.g. CloudShark?

(14 Jun '16, 01:19) Jaap ♦

Hi Jaap,

I'll get another capture when I get back to my hotel tonight. Every time I connect to my VPN at SharkFest the tunnel breaks.

(15 Jun '16, 11:38) Michael_Romans

The QUIC dissector registers for that port static guint g_quics_port = 443; and hogs the packets. You can turn the dissector off or do decode as.

permanent link

answered 15 Jun '16, 13:45

Anders's gravatar image

Anders ♦
4.6k952
accept rate: 17%

Your answer
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here

By RSS:

Answers

Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:

×319
×69
×8
×4
×2

question asked: 13 Jun '16, 11:25

question was seen: 2,753 times

last updated: 15 Jun '16, 13:45

p​o​w​e​r​e​d by O​S​Q​A