Date: Thu, 20 Jan 2005 16:10:09 +0200 From: Andriy Gapon <avg@icyb.net.ua> To: freebsd-security@freebsd.org Subject: Re: debugging encrypted part of isakmp Message-ID: <41EFBBC1.7030705@icyb.net.ua> In-Reply-To: <41E7EADC.7080104@icyb.net.ua> References: <41E796DC.2090102@icyb.net.ua> <20050114140709.GD57985@empiric.icir.org> <41E7DAC3.3050707@icyb.net.ua> <20050114152222.GG57985@empiric.icir.org> <41E7EADC.7080104@icyb.net.ua>
next in thread | previous in thread | raw e-mail | index | archive | help
on 14.01.2005 17:53 Andriy Gapon said the following: > > I see. I think it should not be too hard theoretically to write a > program that would do such decryption offline, using code from isakmpd > or racoon, and playing for both sides to deduce internal state/random > values that original parties used. But that's definitely a lot of work. > Looks like wrote nonsence and what I wanted was to break Diffie-Hellman exchange or to derive DH shared key using encrypted information and knowing certain parts of original information, both of which are either not feasible or too hard. Sorry for wasting your time. -- Andriy Gapon
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?41EFBBC1.7030705>