You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Anyone know how to take the Encryption Keys to decrypt packet in wireshark using the dissector ?
I try all in my knowledge but I'm not having success.
My scenario:
I have a Matter plug "Sengled", and i use the chip-tool to connect with it. Everything work right, but my goal is create the Interaction Model for wireshark. And my problem is being able to find the decryption key, in particulary during the exchange.
Thank you very much for everyone who will help me in this work.
The text was updated successfully, but these errors were encountered:
@tuppulix unfortunately even if you instrument your chip-tool to output the session keys generated here, the current version of the dissector does not incorporate the nodeid in the nonce calculation, so decryption of production devices isn't supported.
@turon Is it possible during the connection to take the key that the device exchanges with the chip tool? Maybe printing it to a log file. And then use it on WireShark to decrypt it?
Anyone know how to take the Encryption Keys to decrypt packet in wireshark using the dissector ?
I try all in my knowledge but I'm not having success.
My scenario:
I have a Matter plug "Sengled", and i use the chip-tool to connect with it. Everything work right, but my goal is create the Interaction Model for wireshark. And my problem is being able to find the decryption key, in particulary during the exchange.
Thank you very much for everyone who will help me in this work.
The text was updated successfully, but these errors were encountered: