[strongSwan] How to find encryption key for ikev1
Thomas Egerer
hakke_007 at gmx.de
Thu Jul 16 14:03:42 CEST 2020
Hi Yogesh,
you should familiarize yourself with the fundamental concepts
behind IKE before asking questions. Don't blindly follow an
outdated online tutorial. Use the save-keys plugin that's
easiest and the documentation is up-to-date.
btw. your keysize depends on the negotiated crypto algorithm
using the IV instead will decrypt you nothing.
Thomas
On 7/16/20 1:44 PM, Yogesh Purohit wrote:
> Hi Thomas,
>
> Thanks for the update.
> Yes I have enabled log level as 4 for ike in strongswan.conf with enc as 3.
> ike = 4
> enc = 3
>
> I am seeing a lot of logs in the log file but I am not sure which one is the encryption key. As per the link https://osqa-ask.wireshark.org/questions/12019/how-can-i-decrypt-ikev1-andor-esp-packets it should be of 16 bytes.
> But none of them is of 16 bytes.
>
> SKEYID => 20 bytes @ 0x7a33d40047d0
> 0: AE C9 8E BB 0D 18 4B 39 84 E2 6C 4D E6 B9 E8 C1 ......K9..lM....
> 16: F7 AD 59 FC ..Y.
> SKEYID_d => 20 bytes @ 0x7a33d40047b0
> 0: 8B F3 BF C2 4A 62 B0 F9 08 E8 C1 20 84 FA 12 4B ....Jb..... ...K
> 16: 2E 64 57 CE .dW.
> SKEYID_a => 20 bytes @ 0x7a33d4005760
> 0: 2B 89 D8 AD 2F C3 08 F1 8D FA 4E 17 B6 30 DE C1 +.../.....N..0..
> 16: AD 5A B6 AB .Z..
> SKEYID_e => 20 bytes @ 0x7a33d4003c30
> 0: 33 B4 1A 7A 3C 36 C5 9A 6B 6F 77 0A 5D 46 13 8A 3..z<6..kow.]F..
> 16: C4 77 89 1B .w..
> encryption key Ka => 32 bytes @ 0x7a33c000c320
> 0: 21 82 8C 59 BC 06 3C 92 58 E6 7E AB D6 0A 85 9F !..Y..<.X.~.....
> 16: 3E 74 20 54 5F E6 92 46 75 A6 76 E8 E1 96 96 B3 >t T_..Fu.v.....
>
> Only this I see as 16 bytes:
>
> initial IV => 16 bytes @ 0x7a33d4003c30
> 0: 7A 5A F1 F8 DA EA 50 C1 D3 83 0E DC A1 C5 A0 8F zZ....P.........
>
> So either encryption key is 32 bytes in the versions which uses charon daemon instead of pluto ? Please do let me know if my assumption is correct or I am looking in the wrong place.
>
> Since I am using an older version of Strongswan hence I am not sure about the save-keys plugin.
>
>
>
> Thanks
>
>
> On Thu, Jul 16, 2020 at 4:42 PM Thomas Egerer <hakke_007 at gmx.de <mailto:hakke_007 at gmx.de>> wrote:
>
> Hi Yogesh,
>
> the loglevel 3 will never reveal any keys to you. You'd need
> to enable loglevel 4. An easier way is to use the save-keys
> plugin. It even creates the appropriate output files to use
> in wireshark. See [1] how to enable and configure it.
>
> Thomas
>
> [1] https://wiki.strongswan.org/issues/3258
>
> On 7/16/20 7:02 AM, Yogesh Purohit wrote:
> > Hi,
> >
> > I was intending to decrypt isakmp packets for ike version 1 using wireshark.
> > In wireshark it needs the Initiator cookie and encryption key to decrypt the packets.
> >
> > I have enabled debug logs by adding: enc = 3 in strongswan.conf file.
> > I followed this link https://osqa-ask.wireshark.org/questions/12019/how-can-i-decrypt-ikev1-andor-esp-packets
> > But this was used when strongswan used Pluto daemon but now Charon is being used.
> >
> > So how to identify the initiator cookie and encryption key from logs for ike version 1.
> >
> > Thanks
> >
> > --
> > Best Regards,
> >
> > Yogesh Purohit
>
>
>
> --
> Best Regards,
>
> Yogesh Purohit
More information about the Users
mailing list