I'm trying to decrypt ESP packets that I captured. I have a VPN setup using L2TP. I've read the http://wiki.wireshark.org/ESP_Preferences page. However, I don't know how to verify all the fields required for a windows 7 Machine. For example the Encryption Algorithm, Authentication Algorithm, Encryption key ect. Any guidance would be greatly appreciated. asked 26 Jul '12, 09:01 milesmeridith |
One Answer:
Please see my answer here: http://ask.wireshark.org/questions/12019/how-can-i-decrypt-ikev1-packets Search for "ESP Decryption". To be able to decrypt ESP packets you need a lot of internal state data from your IPSEC implementation. Some Linux versions will give access to that data with this command: ip xfrm state. So, we need to figure out how to get that data from your L2TP server. Is your L2TP server:
UPDATE:
You need to boot a debug kernel (diagnostics firmware).
Then run some of the IPSEC debug commands mentioned in that document. I suggest at least these three:
Maybe there is a way to get that information from the Windows 7 client as well, however I can't find any decent information about that. Regards answered 26 Jul '12, 09:12 Kurt Knochner ♦ edited 26 Jul '12, 10:23 |
It's a sonicwall FW. Thank you for your help btw.
I'll have to check how to get the required data from SonicWall debug output, if it's possible at all...
UPDATE: see my update in the answer