-
Notifications
You must be signed in to change notification settings - Fork 487
Description
Hello,
I am trying to decrypt SRTP traffic from a WebRTC call. As part of extracting the actual keys, I have gone through RFC5764 and finally, I believe that I have extracted the keys from the code base. But, I am facing two issues while decrypting the .pcap using these keys using rtp_decoder (libsrtp). Please find the below data:
Extracted Keys:
Server SRTP Master Key: 031bc5fed658271e4f612240074c3aee6b2b9073fa1c77e0c28169524e425287
Server SRTP Master Salt: efdf044df29da031490b4ee9
Client SRTP Master Key: 30fe74f23edcd7816e6609cc5f81400f146ce6b557657fcc6383aeeb17510de4
Client SRTP Master Salt: 55950d4e9b809416b9e681a4
libsrtp/test$ ./rtp_decoder -a -t 10 -e 256 -k "031bc5fed658271e4f612240074c3aee6b2b9073fa1c77e0c28169524e425287efdf044df29da031490b4ee9" < dev2.pcap > dev.txt
Using libsrtp3 3.0.0-pre [0x3000000]
security services: confidentiality message authentication
setting tag len 10
error: too few digits in key/salt (should be 92 digits, found 88)
./rtp_decoder -a -t 10 -e 256 -b "30fe74f23edcd7816e6609cc5f81400f146ce6b557657fcc6383aeeb17510de455950d4e9b809416b9e681a4" < dev2.pcap > dev.txt
Using libsrtp3 3.0.0-pre [0x3000000]
security services: confidentiality message authentication
setting tag len 10
set master key/salt to df47deef87f6dde75c77bf35e9eebad3d71ce5ff35e34d1fd78e9c7ba6f9e7be/b9edf71ceb7f3769e79bd7be75d1
Starting decoder
_* buffer overflow detected *: terminated_
This is where I am stuck. Could you suggest and help me to resolve? Thank you.
Best Regards,
Chandramouli.