From owner-freebsd-security@FreeBSD.ORG Thu Jan 20 14:10:17 2005 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 324EB16A4CE for ; Thu, 20 Jan 2005 14:10:17 +0000 (GMT) Received: from citadel.icyb.net.ua (citadel.icyb.net.ua [212.40.38.140]) by mx1.FreeBSD.org (Postfix) with ESMTP id 6E0CE43D31 for ; Thu, 20 Jan 2005 14:10:12 +0000 (GMT) (envelope-from avg@icyb.net.ua) Received: from [212.40.38.87] (oddity.topspin.kiev.ua [212.40.38.87]) by citadel.icyb.net.ua (8.8.8p3/ICyb-2.3exp) with ESMTP id QAA00106 for ; Thu, 20 Jan 2005 16:10:09 +0200 (EET) (envelope-from avg@icyb.net.ua) Message-ID: <41EFBBC1.7030705@icyb.net.ua> Date: Thu, 20 Jan 2005 16:10:09 +0200 From: Andriy Gapon User-Agent: Mozilla Thunderbird 1.0 (X11/20041230) X-Accept-Language: en-us, en MIME-Version: 1.0 To: freebsd-security@freebsd.org References: <41E796DC.2090102@icyb.net.ua> <20050114140709.GD57985@empiric.icir.org> <41E7DAC3.3050707@icyb.net.ua> <20050114152222.GG57985@empiric.icir.org> <41E7EADC.7080104@icyb.net.ua> In-Reply-To: <41E7EADC.7080104@icyb.net.ua> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Mailman-Approved-At: Fri, 21 Jan 2005 13:13:20 +0000 Subject: Re: debugging encrypted part of isakmp X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Security issues [members-only posting] List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 20 Jan 2005 14:10:17 -0000 on 14.01.2005 17:53 Andriy Gapon said the following: > > I see. I think it should not be too hard theoretically to write a > program that would do such decryption offline, using code from isakmpd > or racoon, and playing for both sides to deduce internal state/random > values that original parties used. But that's definitely a lot of work. > Looks like wrote nonsence and what I wanted was to break Diffie-Hellman exchange or to derive DH shared key using encrypted information and knowing certain parts of original information, both of which are either not feasible or too hard. Sorry for wasting your time. -- Andriy Gapon