Wireshark-dev: Re: [Wireshark-dev] how to decode ULP in TLS

From: chuck c <bubbasnmp@xxxxxxxxx>
Date: Sat, 8 Oct 2022 12:57:16 -0500
There is a ULP sample capture attached to https://gitlab.com/wireshark/wireshark/-/issues/11039 that consists of EXPORTED_PDU.
You could try “Export PDUs to File…” (https://www.wireshark.org/docs/wsug_html/#ChIOExportPDUSDialog) then opening that file in Wireshark.

On Sat, Oct 8, 2022 at 10:45 AM Bahjat, Ehab <Ehab.Bahjat@xxxxxxxxxxx> wrote:

Hi

I have a trace of a ULP (OMA UserPlane Location Protocol) session. It is encrypted in TLS, wireshark is able to decrypt the tls packets using pre-master secret log file which I have but I am not able to decode the decrypted data because I couldn’t find ULP in the protocol list for tls as showing below, the only way was using a painful process to remove the encrypted hex string and reassemble the packet again, is there away to decode ULP using tls port number? Thanks !

Ehab Bahjat

 

 

___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <wireshark-dev@xxxxxxxxxxxxx>
Archives:    https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev
             mailto:wireshark-dev-request@xxxxxxxxxxxxx?subject=unsubscribe