Filter in Wireshark for TLS's Server Name Indication field











up vote
8
down vote

favorite
2












Does wireshark have a filter for TLS's Server Name Indication field?










share|improve this question


























    up vote
    8
    down vote

    favorite
    2












    Does wireshark have a filter for TLS's Server Name Indication field?










    share|improve this question
























      up vote
      8
      down vote

      favorite
      2









      up vote
      8
      down vote

      favorite
      2






      2





      Does wireshark have a filter for TLS's Server Name Indication field?










      share|improve this question













      Does wireshark have a filter for TLS's Server Name Indication field?







      wireshark






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Jan 18 '13 at 9:19









      palindrom

      181116




      181116






















          4 Answers
          4






          active

          oldest

          votes

















          up vote
          5
          down vote













          ssl.handshake.extensions_server_name






          share|improve this answer



















          • 6




            Hello Shawn E. Although this might answer the question, can you provide some additional explanations? Maybe that would be helpful for others.
            – nixda
            Jan 21 '13 at 20:20




















          up vote
          4
          down vote



          accepted










          Shawn E's answer is probably the correct answer but my wireshark version doesnt have that filter. Following filters do exists, however:



          To check if the SNI field exists:



          ssl.handshake.extension.type == 0


          or



          ssl.handshake.extension.type == "server_name"


          To check if an extension contains certain domain:



          ssl.handshake.extension.data contains "twitter.com"





          share|improve this answer




























            up vote
            1
            down vote













            Newer Wireshark has R-Click context menu with filters.



            Find Client Hello with SNI for which you'd like to see more of the related packets.



            Drill down to handshake / extension : server_name details and from R-click choose Apply as Filter.



            See attached example caught in version 2.4.4



            SNI-WireShark-contextFilter






            share|improve this answer






























              up vote
              0
              down vote













              For a more complete example, here's the command to show SNIs used in new connections:



              tshark -p -Tfields -e ssl.handshake.extensions_server_name  
              -Y 'ssl.handshake.extension.type == "server_name"'


              (This is what your ISP can easily see in your traffic.)






              share|improve this answer





















                Your Answer








                StackExchange.ready(function() {
                var channelOptions = {
                tags: "".split(" "),
                id: "3"
                };
                initTagRenderer("".split(" "), "".split(" "), channelOptions);

                StackExchange.using("externalEditor", function() {
                // Have to fire editor after snippets, if snippets enabled
                if (StackExchange.settings.snippets.snippetsEnabled) {
                StackExchange.using("snippets", function() {
                createEditor();
                });
                }
                else {
                createEditor();
                }
                });

                function createEditor() {
                StackExchange.prepareEditor({
                heartbeatType: 'answer',
                convertImagesToLinks: true,
                noModals: true,
                showLowRepImageUploadWarning: true,
                reputationToPostImages: 10,
                bindNavPrevention: true,
                postfix: "",
                imageUploader: {
                brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
                contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
                allowUrls: true
                },
                onDemand: true,
                discardSelector: ".discard-answer"
                ,immediatelyShowMarkdownHelp:true
                });


                }
                });














                draft saved

                draft discarded


















                StackExchange.ready(
                function () {
                StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f538130%2ffilter-in-wireshark-for-tlss-server-name-indication-field%23new-answer', 'question_page');
                }
                );

                Post as a guest















                Required, but never shown

























                4 Answers
                4






                active

                oldest

                votes








                4 Answers
                4






                active

                oldest

                votes









                active

                oldest

                votes






                active

                oldest

                votes








                up vote
                5
                down vote













                ssl.handshake.extensions_server_name






                share|improve this answer



















                • 6




                  Hello Shawn E. Although this might answer the question, can you provide some additional explanations? Maybe that would be helpful for others.
                  – nixda
                  Jan 21 '13 at 20:20

















                up vote
                5
                down vote













                ssl.handshake.extensions_server_name






                share|improve this answer



















                • 6




                  Hello Shawn E. Although this might answer the question, can you provide some additional explanations? Maybe that would be helpful for others.
                  – nixda
                  Jan 21 '13 at 20:20















                up vote
                5
                down vote










                up vote
                5
                down vote









                ssl.handshake.extensions_server_name






                share|improve this answer














                ssl.handshake.extensions_server_name







                share|improve this answer














                share|improve this answer



                share|improve this answer








                edited Jan 21 '13 at 20:31









                KronoS

                19.7k4098154




                19.7k4098154










                answered Jan 21 '13 at 20:00









                Shawn E

                671




                671








                • 6




                  Hello Shawn E. Although this might answer the question, can you provide some additional explanations? Maybe that would be helpful for others.
                  – nixda
                  Jan 21 '13 at 20:20
















                • 6




                  Hello Shawn E. Although this might answer the question, can you provide some additional explanations? Maybe that would be helpful for others.
                  – nixda
                  Jan 21 '13 at 20:20










                6




                6




                Hello Shawn E. Although this might answer the question, can you provide some additional explanations? Maybe that would be helpful for others.
                – nixda
                Jan 21 '13 at 20:20






                Hello Shawn E. Although this might answer the question, can you provide some additional explanations? Maybe that would be helpful for others.
                – nixda
                Jan 21 '13 at 20:20














                up vote
                4
                down vote



                accepted










                Shawn E's answer is probably the correct answer but my wireshark version doesnt have that filter. Following filters do exists, however:



                To check if the SNI field exists:



                ssl.handshake.extension.type == 0


                or



                ssl.handshake.extension.type == "server_name"


                To check if an extension contains certain domain:



                ssl.handshake.extension.data contains "twitter.com"





                share|improve this answer

























                  up vote
                  4
                  down vote



                  accepted










                  Shawn E's answer is probably the correct answer but my wireshark version doesnt have that filter. Following filters do exists, however:



                  To check if the SNI field exists:



                  ssl.handshake.extension.type == 0


                  or



                  ssl.handshake.extension.type == "server_name"


                  To check if an extension contains certain domain:



                  ssl.handshake.extension.data contains "twitter.com"





                  share|improve this answer























                    up vote
                    4
                    down vote



                    accepted







                    up vote
                    4
                    down vote



                    accepted






                    Shawn E's answer is probably the correct answer but my wireshark version doesnt have that filter. Following filters do exists, however:



                    To check if the SNI field exists:



                    ssl.handshake.extension.type == 0


                    or



                    ssl.handshake.extension.type == "server_name"


                    To check if an extension contains certain domain:



                    ssl.handshake.extension.data contains "twitter.com"





                    share|improve this answer












                    Shawn E's answer is probably the correct answer but my wireshark version doesnt have that filter. Following filters do exists, however:



                    To check if the SNI field exists:



                    ssl.handshake.extension.type == 0


                    or



                    ssl.handshake.extension.type == "server_name"


                    To check if an extension contains certain domain:



                    ssl.handshake.extension.data contains "twitter.com"






                    share|improve this answer












                    share|improve this answer



                    share|improve this answer










                    answered Jan 30 '13 at 7:59









                    palindrom

                    181116




                    181116






















                        up vote
                        1
                        down vote













                        Newer Wireshark has R-Click context menu with filters.



                        Find Client Hello with SNI for which you'd like to see more of the related packets.



                        Drill down to handshake / extension : server_name details and from R-click choose Apply as Filter.



                        See attached example caught in version 2.4.4



                        SNI-WireShark-contextFilter






                        share|improve this answer



























                          up vote
                          1
                          down vote













                          Newer Wireshark has R-Click context menu with filters.



                          Find Client Hello with SNI for which you'd like to see more of the related packets.



                          Drill down to handshake / extension : server_name details and from R-click choose Apply as Filter.



                          See attached example caught in version 2.4.4



                          SNI-WireShark-contextFilter






                          share|improve this answer

























                            up vote
                            1
                            down vote










                            up vote
                            1
                            down vote









                            Newer Wireshark has R-Click context menu with filters.



                            Find Client Hello with SNI for which you'd like to see more of the related packets.



                            Drill down to handshake / extension : server_name details and from R-click choose Apply as Filter.



                            See attached example caught in version 2.4.4



                            SNI-WireShark-contextFilter






                            share|improve this answer














                            Newer Wireshark has R-Click context menu with filters.



                            Find Client Hello with SNI for which you'd like to see more of the related packets.



                            Drill down to handshake / extension : server_name details and from R-click choose Apply as Filter.



                            See attached example caught in version 2.4.4



                            SNI-WireShark-contextFilter







                            share|improve this answer














                            share|improve this answer



                            share|improve this answer








                            edited Feb 20 at 13:59









                            bertieb

                            5,517112141




                            5,517112141










                            answered Feb 20 at 13:38









                            Tom Silver

                            113




                            113






















                                up vote
                                0
                                down vote













                                For a more complete example, here's the command to show SNIs used in new connections:



                                tshark -p -Tfields -e ssl.handshake.extensions_server_name  
                                -Y 'ssl.handshake.extension.type == "server_name"'


                                (This is what your ISP can easily see in your traffic.)






                                share|improve this answer

























                                  up vote
                                  0
                                  down vote













                                  For a more complete example, here's the command to show SNIs used in new connections:



                                  tshark -p -Tfields -e ssl.handshake.extensions_server_name  
                                  -Y 'ssl.handshake.extension.type == "server_name"'


                                  (This is what your ISP can easily see in your traffic.)






                                  share|improve this answer























                                    up vote
                                    0
                                    down vote










                                    up vote
                                    0
                                    down vote









                                    For a more complete example, here's the command to show SNIs used in new connections:



                                    tshark -p -Tfields -e ssl.handshake.extensions_server_name  
                                    -Y 'ssl.handshake.extension.type == "server_name"'


                                    (This is what your ISP can easily see in your traffic.)






                                    share|improve this answer












                                    For a more complete example, here's the command to show SNIs used in new connections:



                                    tshark -p -Tfields -e ssl.handshake.extensions_server_name  
                                    -Y 'ssl.handshake.extension.type == "server_name"'


                                    (This is what your ISP can easily see in your traffic.)







                                    share|improve this answer












                                    share|improve this answer



                                    share|improve this answer










                                    answered Nov 24 at 4:44









                                    sanmai

                                    407412




                                    407412






























                                        draft saved

                                        draft discarded




















































                                        Thanks for contributing an answer to Super User!


                                        • Please be sure to answer the question. Provide details and share your research!

                                        But avoid



                                        • Asking for help, clarification, or responding to other answers.

                                        • Making statements based on opinion; back them up with references or personal experience.


                                        To learn more, see our tips on writing great answers.





                                        Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


                                        Please pay close attention to the following guidance:


                                        • Please be sure to answer the question. Provide details and share your research!

                                        But avoid



                                        • Asking for help, clarification, or responding to other answers.

                                        • Making statements based on opinion; back them up with references or personal experience.


                                        To learn more, see our tips on writing great answers.




                                        draft saved


                                        draft discarded














                                        StackExchange.ready(
                                        function () {
                                        StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f538130%2ffilter-in-wireshark-for-tlss-server-name-indication-field%23new-answer', 'question_page');
                                        }
                                        );

                                        Post as a guest















                                        Required, but never shown





















































                                        Required, but never shown














                                        Required, but never shown












                                        Required, but never shown







                                        Required, but never shown

































                                        Required, but never shown














                                        Required, but never shown












                                        Required, but never shown







                                        Required, but never shown







                                        Popular posts from this blog

                                        flock() on closed filehandle LOCK_FILE at /usr/bin/apt-mirror

                                        Mangá

                                         ⁒  ․,‪⁊‑⁙ ⁖, ⁇‒※‌, †,⁖‗‌⁝    ‾‸⁘,‖⁔⁣,⁂‾
”‑,‥–,‬ ,⁀‹⁋‴⁑ ‒ ,‴⁋”‼ ⁨,‷⁔„ ‰′,‐‚ ‥‡‎“‷⁃⁨⁅⁣,⁔
⁇‘⁔⁡⁏⁌⁡‿‶‏⁨ ⁣⁕⁖⁨⁩⁥‽⁀  ‴‬⁜‟ ⁃‣‧⁕‮ …‍⁨‴ ⁩,⁚⁖‫ ,‵ ⁀,‮⁝‣‣ ⁑  ⁂– ․, ‾‽ ‏⁁“⁗‸ ‾… ‹‡⁌⁎‸‘ ‡⁏⁌‪ ‵⁛ ‎⁨ ―⁦⁤⁄⁕