Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 14 Jan 2005 15:22:22 +0000
From:      Bruce M Simpson <bms@spc.org>
To:        Andriy Gapon <avg@icyb.net.ua>
Cc:        freebsd-security@freebsd.org
Subject:   Re: debugging encrypted part of isakmp
Message-ID:  <20050114152222.GG57985@empiric.icir.org>
In-Reply-To: <41E7DAC3.3050707@icyb.net.ua>
References:  <41E796DC.2090102@icyb.net.ua> <20050114140709.GD57985@empiric.icir.org> <41E7DAC3.3050707@icyb.net.ua>

next in thread | previous in thread | raw e-mail | index | archive | help

On Fri, Jan 14, 2005 at 04:44:19PM +0200, Andriy Gapon wrote:
> So, I am looking for the easiest way to decrypt isakmp packets using
> both packet data and information like pre-shared keys, certificates etc.

There's probably not a lot that you can do here, short of turning on all
the debugging switches you can find for the opaque IKE implementation
you're dealing with; unless the isakmp decoder in tcpdump were modified
to accept keying material. We already do this for AH, ESP, TCP-MD5 but
not IKE itself as that's a non-trivial task.

Regards,
BMS



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050114152222.GG57985>