Hi,


I just finished writing a plugin for strongSwan[1], an open source IPsec-based 
VPN Solution, that will export ESP, IKEv1 and IKEv2 decryption tables in a 
wireshark compatible format.[2],[3]

Now I want to test the plugin. Until now, I run strongSwan with the new plugin 
loaded, then I make a wireshark capture with ISAKMP and ESP packets and then I 
check if the packets are decrypted using wireshark gui.


Now, is there a way to check if the wireshark decryption table that was 
generated by the new strongSwan plugin is compatible with wireshark and if it 
is compatible to check if it decrypts the pakets?... all that without using 
wireshark gui.



Cheers,

Codrut.


[1]: https://www.strongswan.org/

strongSwan - IPsec VPN for Linux, Android, FreeBSD, Mac OS 
...<https://www.strongswan.org/>
www.strongswan.org
strongSwan is an Open Source IPsec-based VPN solution for Linux and other UNIX 
based operating systems implementing both the IKEv1 and IKEv2 key exchange 
protocols.



[2]: https://wiki.strongswan.org/issues/1557

Feature #1557: An option to save IKE_SA and CHILD_SA keys for wireshark - 
strongSwan<https://wiki.strongswan.org/issues/1557>
wiki.strongswan.org
Redmine



[3]: https://github.com/strongswan/strongswan/pull/49

[https://avatars0.githubusercontent.com/u/19309810?v=3&s=400]<https://github.com/strongswan/strongswan/pull/49>

An option to save IKE_SA and CHILD_SA keys for wireshark by superCodrut · Pull 
Request #49 · 
strongswan/strongswan<https://github.com/strongswan/strongswan/pull/49>
github.com
This is the first patch series for feature #1557.


___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <wireshark-dev@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
             mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe

Reply via email to