<div dir="ltr">Hi,<div><br></div><div>I was intending to decrypt isakmp packets for ike version 1 using wireshark.</div><div>In wireshark it needs the Initiator cookie and encryption key to decrypt the packets.</div><div><br></div><div>I have enabled debug logs by adding: <span style="color:rgb(0,0,0);white-space:pre-wrap">enc = 3 in strongswan.conf file.</span></div><div><font color="#000000"><span style="white-space:pre-wrap">I followed this link </span></font>
<a href="https://osqa-ask.wireshark.org/questions/12019/how-can-i-decrypt-ikev1-andor-esp-packets">https://osqa-ask.wireshark.org/questions/12019/how-can-i-decrypt-ikev1-andor-esp-packets</a> </div><div>But this was used when strongswan used Pluto daemon but now Charon is being used. </div><div><br></div><div>So how to identify the initiator cookie and encryption key from logs for ike version 1.</div><div><br></div><div>Thanks <font color="#000000"><span style="white-space:pre-wrap"><br></span></font><div><br></div>-- <br><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr">Best Regards,<div><br></div><div>Yogesh Purohit</div></div></div></div></div>