You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We would like to be able to capture and analyze the traffic between rtpengine and the WebRTC endpoints that we are connecting. Unfortunately, since the negotiation is in the media plane and we don't have access to the DTLS key since it gets generated at startup we are unable to do any capturing.
Two possible options that would be nice would be:
a) The ability to specify a DTLS cert/key that would be used.
b) Have an option to make rtpengine print the DTLS cert/key at startup.
Thanks,
Jarrod
The text was updated successfully, but these errors were encountered:
I may be wrong but it seems like if I have the DTLS cert/key then it should
be possible to decrypt the DTLS handshake and then further since the DTLS
handshake provides the keying material for the SRTP we would be able to get
the SRTP keys and decrypt the the traffic.
On the other hand, yes, if it was possible to log the call id and the SRTP
key used then it would be helpful in allowing us to decrypt all the SRTP
traffic without bothering with the handshake so I suppose this would be a
nice option as well (maybe even the nicest option).
We would like to be able to capture and analyze the traffic between rtpengine and the WebRTC endpoints that we are connecting. Unfortunately, since the negotiation is in the media plane and we don't have access to the DTLS key since it gets generated at startup we are unable to do any capturing.
Two possible options that would be nice would be:
a) The ability to specify a DTLS cert/key that would be used.
b) Have an option to make rtpengine print the DTLS cert/key at startup.
Thanks,
Jarrod
The text was updated successfully, but these errors were encountered: