Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Jan 2005 16:10:09 +0200
From:      Andriy Gapon <avg@icyb.net.ua>
To:        freebsd-security@freebsd.org
Subject:   Re: debugging encrypted part of isakmp
Message-ID:  <41EFBBC1.7030705@icyb.net.ua>
In-Reply-To: <41E7EADC.7080104@icyb.net.ua>
References:  <41E796DC.2090102@icyb.net.ua> <20050114140709.GD57985@empiric.icir.org> <41E7DAC3.3050707@icyb.net.ua> <20050114152222.GG57985@empiric.icir.org> <41E7EADC.7080104@icyb.net.ua>

next in thread | previous in thread | raw e-mail | index | archive | help
on 14.01.2005 17:53 Andriy Gapon said the following:
> 
> I see. I think it should not be too hard theoretically to write a
> program that would do such decryption offline, using code from isakmpd
> or racoon, and playing for both sides to deduce internal state/random
> values that original parties used. But that's definitely a lot of work.
> 

Looks like wrote nonsence and what I wanted was to break Diffie-Hellman
exchange or to derive DH shared key using encrypted information and
knowing certain parts of original information, both of which are either
not feasible or too hard.
Sorry for wasting your time.

-- 
Andriy Gapon



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?41EFBBC1.7030705>