Hi all! I have been working on a WireGuard dissector for Wireshark with decryption support for both Transport data and handshake messages.
Since the extract-keys utility included with WG is quite limited (needs CONFIG_DEVKMEM=y and cannot obtain handshake secrets), I took a different approach using kprobes and am able to obtain the three handshake secrets too. (Future work includes obtaining just the ephemeral keys and then deriving the keys from that.) For code, documentation, screenshots and sample captures, see https://github.com/Lekensteyn/wireguard-dissector Dissection is functionally complete. The main remaining tasks include adding expert info when the protocol is not being followed and verification/decryption of Cookie Replies. -- Kind regards, Peter Wu https://lekensteyn.nl _______________________________________________ WireGuard mailing list [email protected] https://lists.zx2c4.com/mailman/listinfo/wireguard
