[strongSwan-dev] How to dump the SK_ei, SK_er, SK_ai, SK_ar of the IKE_SA

Andreas Steffen andreas.steffen at strongswan.org
Wed Mar 31 07:05:23 CEST 2010


Hi Aaron,

with the ipsec.conf setting

  charondebug="ike 4"

SK_ei, SK_er, SK_ai, SK_ar are written to the log.
As an alternative the command

  ipsec stroke loglevel ike 4

achieves the same when the charon daemon is already running.

Best regards

Andreas

Aaron Zhang wrote:
> Hi all.
> 
>  
> 
> Are there any ways to dump the SK_ei, SK_er, SK_ai, SK_ar of the IKE_SA
> which are useful to decrypt the IKE_AUTH packet with wireshark.
> 
> I set the debug as 4 for all debug type. But there are not such information.
> 
>  
> 
> thanks
> 
>   -Aaron

======================================================================
Andreas Steffen                         andreas.steffen at strongswan.org
strongSwan - the Linux VPN Solution!                www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 3430 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.strongswan.org/pipermail/dev/attachments/20100331/661ed7b2/attachment.bin>


More information about the Dev mailing list