Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Encryption Keys, how to find it ? #6

Open
tuppulix opened this issue Apr 26, 2024 · 2 comments
Open

Encryption Keys, how to find it ? #6

tuppulix opened this issue Apr 26, 2024 · 2 comments

Comments

@tuppulix
Copy link

Anyone know how to take the Encryption Keys to decrypt packet in wireshark using the dissector ?
I try all in my knowledge but I'm not having success.

My scenario:
I have a Matter plug "Sengled", and i use the chip-tool to connect with it. Everything work right, but my goal is create the Interaction Model for wireshark. And my problem is being able to find the decryption key, in particulary during the exchange.

Thank you very much for everyone who will help me in this work.

@turon
Copy link
Collaborator

turon commented Apr 27, 2024

@tuppulix unfortunately even if you instrument your chip-tool to output the session keys generated here, the current version of the dissector does not incorporate the nodeid in the nonce calculation, so decryption of production devices isn't supported.

@tuppulix
Copy link
Author

@turon Is it possible during the connection to take the key that the device exchanges with the chip tool? Maybe printing it to a log file. And then use it on WireShark to decrypt it?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants