Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Another tool that can be used by an unprivileged user for analysing network traffic is rootless Podman with Pasta.

Just add the podman run option

--network=pasta:--pcap,myfile.pcap

Pasta then records the network traffic into a PCAP file that could later be analysed.

I wrote a simple example where I used tshark to analyse the recorded PCAP file https://github.com/eriksjolund/podman-networking-docs?tab=re...



Very good to know about. But you still have the problem of decrypting TLS traffic.


I don't know if it's a standard but I believe a lot of tls libraries honor the SSLKEYLOGFILE env-var https://wiki.wireshark.org/TLS#:~:text=and%20curl%20when-,th...


That seems like an unnecessary vulnerability waiting to happen.


Can’t wait till they patch it away and we lose the ability to investigate our own https traffic.


At some point someone needs to take responsibility for allowing modification of environment variables via something dumb like http. Debugging interfaces are fine- we should expect more from developers.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: