Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-dev: Re: [Wireshark-dev] krb5 dcerpc decryption

From: ronnie sahlberg <ronniesahlberg@xxxxxxxxx>
Date: Tue, 28 Jul 2009 13:01:57 +1000
Hi Metze,

Can you check those two patches again?
I can not decrypt any of the captures you sent.

I built wireshark with your patch and also patched mit 1.6.3 with the
second patch and load it with
LD_PRELOAD=...../lib/libk5crypto.so

But can not decrypt any of the packets.
The modified  krb5_dk_decrypt_maybe_trunc_hmac() is called from
wireshark but this statement is never true :
       if (hdr[0] == 0x05 && hdr[1] == 0x04) {


I agree, we should have our own code here, just as we have for arcfour.
Once I can get the decryption working using these hacks, I can look
into re-implementing this code inside wireshark.



The pidl command line to generate a ws dissector looks like this :
pidl lsa.idl --ws-parser


regards
ronnie sahlberg


On Sat, Jul 25, 2009 at 6:47 PM, Stefan (metze)
Metzmacher<metze@xxxxxxxxx> wrote:
> Hi Ronnie,
>
> could you please apply this patch
> http://gitweb.samba.org/?p=metze/wireshark/wip.git;a=commitdiff;h=d4e3184d5faca653ef053b3469ad3f8ec7605b7e
>
> With that patch decryption of aes encrypted traffic works as long as no
> header signing is used.
>
> I tried some hacks to decrypt it when header signing is on
> and use a hacked mit krb5 1.6 version loaded with LD_LIBRARY_PATH
>
> See
> http://gitweb.samba.org/?p=metze/wireshark/wip.git;a=shortlog;h=refs/heads/ws-metze-gssapi-20090725
>
> I think we should have aes specific decryption code in wireshark like we
> have for arcfour in packet-spnego.c.
>
> With this hacks I can decrypt every packet of the attached captures.
>
> BTW: with what commandline do I have to generate pidl dissectors?
>     I want to add it for the DFS-R (FrsTransport) Interface.
>
> metze
>