[strongSwan-dev] How to dump the SK_ei, SK_er, SK_ai, SK_ar of the IKE_SA
Andreas Steffen
andreas.steffen at strongswan.org
Wed Mar 31 07:05:23 CEST 2010
Hi Aaron,
with the ipsec.conf setting
charondebug="ike 4"
SK_ei, SK_er, SK_ai, SK_ar are written to the log.
As an alternative the command
ipsec stroke loglevel ike 4
achieves the same when the charon daemon is already running.
Best regards
Andreas
Aaron Zhang wrote:
> Hi all.
>
>
>
> Are there any ways to dump the SK_ei, SK_er, SK_ai, SK_ar of the IKE_SA
> which are useful to decrypt the IKE_AUTH packet with wireshark.
>
> I set the debug as 4 for all debug type. But there are not such information.
>
>
>
> thanks
>
> -Aaron
======================================================================
Andreas Steffen andreas.steffen at strongswan.org
strongSwan - the Linux VPN Solution! www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 3430 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.strongswan.org/pipermail/dev/attachments/20100331/661ed7b2/attachment.bin>
More information about the Dev
mailing list