From owner-freebsd-security@FreeBSD.ORG Fri Jan 14 15:53:09 2005 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 20F3C16A4CE for ; Fri, 14 Jan 2005 15:53:09 +0000 (GMT) Received: from citadel.icyb.net.ua (citadel.icyb.net.ua [212.40.38.140]) by mx1.FreeBSD.org (Postfix) with ESMTP id 5E94F43D1F for ; Fri, 14 Jan 2005 15:53:07 +0000 (GMT) (envelope-from avg@icyb.net.ua) Received: from [212.40.38.87] (oddity.topspin.kiev.ua [212.40.38.87]) by citadel.icyb.net.ua (8.8.8p3/ICyb-2.3exp) with ESMTP id RAA21057; Fri, 14 Jan 2005 17:53:01 +0200 (EET) (envelope-from avg@icyb.net.ua) Message-ID: <41E7EADC.7080104@icyb.net.ua> Date: Fri, 14 Jan 2005 17:53:00 +0200 From: Andriy Gapon User-Agent: Mozilla Thunderbird 1.0 (X11/20041230) X-Accept-Language: en-us, en MIME-Version: 1.0 To: Bruce M Simpson References: <41E796DC.2090102@icyb.net.ua> <20050114140709.GD57985@empiric.icir.org> <41E7DAC3.3050707@icyb.net.ua> <20050114152222.GG57985@empiric.icir.org> In-Reply-To: <20050114152222.GG57985@empiric.icir.org> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Mailman-Approved-At: Sat, 15 Jan 2005 15:30:13 +0000 cc: freebsd-security@freebsd.org Subject: Re: debugging encrypted part of isakmp X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Security issues [members-only posting] List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 14 Jan 2005 15:53:09 -0000 on 14.01.2005 17:22 Bruce M Simpson said the following: > On Fri, Jan 14, 2005 at 04:44:19PM +0200, Andriy Gapon wrote: > >>So, I am looking for the easiest way to decrypt isakmp packets using >>both packet data and information like pre-shared keys, certificates etc. > > > There's probably not a lot that you can do here, short of turning on all > the debugging switches you can find for the opaque IKE implementation > you're dealing with; unless the isakmp decoder in tcpdump were modified > to accept keying material. We already do this for AH, ESP, TCP-MD5 but > not IKE itself as that's a non-trivial task. I see. I think it should not be too hard theoretically to write a program that would do such decryption offline, using code from isakmpd or racoon, and playing for both sides to deduce internal state/random values that original parties used. But that's definitely a lot of work. -- Andriy Gapon