Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feature: create wireshark IKE + ESP decryption config #8

Open
laf0rge opened this issue Aug 19, 2021 · 1 comment
Open

feature: create wireshark IKE + ESP decryption config #8

laf0rge opened this issue Aug 19, 2021 · 1 comment

Comments

@laf0rge
Copy link

laf0rge commented Aug 19, 2021

For R&D, it is very useful to look at the decrypted traffic in wireshark. One can copy+paste the various key material manually from stdout of the program to the wireshark UI, but that's very tmie consuming and inefficient.

I'm planning to create a patch that generates the esp_sa and ikev2_decryption_table lines for the related files in ~/.wireshark/

@fasferraz
Copy link
Owner

I also thought doing something similar, but my main setup is using this tool in one VM, and an ePDG in another VM or in the network, so i usually do the wireshark capture directly in windows vmnet1/8 interfaces, or via trace directly in the ePDG (that already generates ununcrypted payloads).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants