Hi,
I just finished writing a plugin for strongSwan[1], an open source IPsec-based
VPN Solution, that will export ESP, IKEv1 and IKEv2 decryption tables in a
wireshark compatible format.[2],[3]
Now I want to test the plugin. Until now, I run strongSwan with the new plugin
loaded, then I make
Hi,
I'm working at a strongSwan plugin that will generate a IKEv2 decryption table
for wireshark.
In IKEv2 decryption table(wireshark) at encryption algorithm field there are
only the following algorithms: "3DES[RFC2451]", "AES-CBC-128[RFC3602]",
"AES-CBC-192[RFC3602]", "AES-CBC-256[RFC3602]"