I am looking at the Wireshark trace from a Lutron RadioRa2 repeater communicating with Alarm.com (209.222.135.33) over UDP port 1130. If I follow UDP stream in wireshark, I am getting gibberish. Is there a way to decrypt and see what information is being sent to Alarm.com? Thanks asked 01 Mar '13, 09:54 net_tech edited 01 Mar '13, 22:25 Guy Harris ♦♦ |
2 Answers:
I don't know what CASP traffic is (please explain), but on the webpage of alarm.com they claim to be able to do this with their products through a mobile app.
I really hope they encrypt that traffic to prevent an eavesdropper from intercepting the door commands, modifying it and unlocking the door instead of locking it. So I strongly assume (hope) they use encrypted communication and that's the reason why you 'get gibberish'. If that is true, I don't see a realistic way to decrypt the traffic, unless you hack into their systems to steal the crypto keys ;-)) If the traffic is not encrypted, they are maybe using a binary protocol. Unless you know the structure of that protocol, there is again no realistic way to decipher the communication. Regards answered 01 Mar '13, 10:08 Kurt Knochner ♦ edited 01 Mar '13, 10:09 |
From /etc/services:
So traffic on port 1130 should probably not be encrypted at the transport layer. The document you refer too has one paragraph on security:
So, it might be IPsec. Or it might be encryption at the application layer. In any case, wireshark currently has no casp dissector AFAICT. So the first steps would be to create a casp dissector (based on the protocol specification). answered 01 Mar '13, 10:43 SYN-bit ♦♦ Well, looking at the CASP specfication and the packet data, I don't hink this traffic is CASP traffic. Look at the fourth byte in each frame, it is not always 1, 2 or 3... which it should be according to page 6 in the specification. (01 Mar '13, 10:50) SYN-bit ♦♦ Looking a bit deeper into the packets, each packet seems to have the following structure:
(01 Mar '13, 11:06) SYN-bit ♦♦ |
this is what I found about CASP http://user.informatik.uni-goettingen.de/~casp/draft-schulzrinne-nsis-casp-01.pdf
Wireshark identifies Port 1130 as CASP traffic, so my guess it is CASP
Hm.. can you please post a few sample packets (pcap format!) somewhere (google docs, one-click hoster, cloudshark.org)?
sure
http://www.cloudshark.org/captures/28719c863324
If you look at the data, you will see, that there is a structure, based on the length of the packets.
UPDATE: As @SYN-bit figured out, 0x7d is probably a protocol identifier, the second octet is the data length and the third octet probably flags an/or message type!?!