![]() ![]() ![]() If you are a network monkey, I am sure you are thrilled with that level of visibility but trust there is much more going on at L7. Wireshark has become a tool to validate connectivity source/destination port/protocol–lame. Troubleshooting the web in todays world without application layer data (L7) is straight up useless. When a destination website support TLS 1.2 or greater, I am no longer able to record traffic, open wireshark and see what is going on past L4. While I love my privacy and fully support end to end encryption, encryption, specifically TLS 1.2 (with PFS) and above, straight up blinds me from a packet capture perspective. According to the Google Transparency Report, they are seeing as much as 90%+ adoption with traffic headed to google: Thanks to wikileaks, HTTPS Everywhere, and Let’s Encrypt, adoption of encryption (HTTPS) has skyrocketed in the past couple of years. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |