Skip to main content

Decrypt SDES SRTP from pcap

If you have a pcap file with encrypted RTP (SDES SRTP) and have access to the SIP signalling to see the keys, these instructions will help you decrypt the RTP payload and save it as raw audio. Optionally, depending on the codec, you can then import the raw audio in Wireshark and save it as an audio file.

Steps

Build ‘srtp-decrypt’

These are the steps:

  1. Build ‘srtp-decrypt’

  2. Get crypto key for each direction

  3. Use the decrypt.sh bash script to decrypt into raw audio

  4. Import the raw audio into Wireshark as hex dump

  5. Generate the wav file

  6. Generate the wav file as two separate channels, one per direction


Follow instructions here:

https://github.com/gteissier/srtp-decrypt


Assume the binary will be produced in a path like ‘/root/code/srtp-decrypt/srtp-decrypt’


Get crypto key for each direction

Access the SIP involved and take note of the ‘crypto’ line from the SDP for each direction.

e.g.:


v=0

...

m=audio 16398 RTP/SAVP 96 8 97

c=IN IP4 xxxxx

...

a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:K7oAZZ5Fm9fePS5/t1ac00000000000000000000

...


The crypto key for the RTP stream produced by this party is K7oAZZ5Fm9fePS5/t1ac00000000000000000000


Use a bash script to decrypt into raw audio

Use this simple bash script to perform the actual decryption:


#!/bin/bash

set -x


SRTP_DECRYPT_BIN=/root/code/srtp-decrypt/srtp-decrypt

HEADER_SIZE=48


CRYPTO_KEY=5eKSVpIOePOgjjfep21R3b000000000000000000

RTP_PCAP=outbound.pcap

RAW_DATA=outbound.raw


${SRTP_DECRYPT_BIN} -d ${HEADER_SIZE} -k ${CRYPTO_KEY} < ${RTP_PCAP} > ${RAW_DATA}


Where:

CRYPTO_KEY needs the value of the crypto key seen earlier.

RTP_PCAP has the pcap with the RTP stream that you want to decrypt.

RAW_DATA is the output file where to put the decrypted raw audio.


HEADER_SIZE may vary, depending on the presence of the SLL header in the capture.

Import the raw audio into Wireshark as hex dump


In Wireshark:

  • File → Import from Hex Dump

  • Select the file with the raw audio

  • Offsets: Hexadecimal

  • Timestamp format: %M:%S.%f

  • Encapsulation type: Ethernet

  • UDP: source port 10000, destination port 20000

  • Import


Then go to:

  • Telephony → RTP → RTP Streams

  • Play

  • Select stream

  • Export as Synchronised audio file


If for example you have two RTP streams, one per direction for the same call, you can generate the wav file with two separate channels, one per direction.


Once you have the raw audio for both directions, you can use Audacity (https://www.audacityteam.org/) to import the audio.


  • Open the first file.

  • File → Import Audio for the second file.

  • Select the first audio, right click, “Set as Stereo file”

  • Save




Popular posts from this blog

Troubleshooting TURN

  WebRTC applications use the ICE negotiation to discovery the best way to communicate with a remote party. I t dynamically finds a pair of candidates (IP address, port and transport, also known as “transport address”) suitable for exchanging media and data. The most important aspect of this is “dynamically”: a local and a remote transport address are found based on the network conditions at the time of establishing a session. For example, a WebRTC client that normally uses a server reflexive transport address to communicate with an SFU. when running inside the home office, may use a relay transport address over TCP when running inside an office network which limits remote UDP targets. The same configuration (defined as “iceServers” when creating an RTCPeerConnection will work in both cases, producing different outcomes.

Extracting RTP streams from network captures

I needed an efficient way to programmatically extract RTP streams from a network capture. In addition I wanted to: save each stream into a separate pcap file. extract SRTP-negotiated keys if present and available in the trace, associating them to the related RTP (or SRTP if the negotiation succeeded) stream. Some caveats: In normal conditions the negotiation of SRTP sessions happens via a secure transport, typically SIP over TLS, so the exchanged crypto information may not be available from a simple network capture. There are ways to extract RTP streams using Wireshark or tcpdump; it’s not necessary to do it programmatically. All this said I wrote a small tool ( https://github.com/giavac/pcap_tool ) that parses a network capture and tries to interpret each packet as either RTP/SRTP or SIP, and does two main things: save each detected RTP/SRTP stream into a dedicated pcap file, which name contains the related SSRC. print a summary of the crypto information exchanged, if available. With ...

Testing SIP platforms and pjsip

There are various levels of testing, from unit to component, from integration to end-to-end, not to mention performance testing and fuzzing. When developing or maintaining Real Time Communications (RTC or VoIP) systems,  all these levels (with the exclusion maybe of unit testing) are made easier by applications explicitly designed for this, like sipp . sipp has a deep focus on performance testing, or using a simpler term, load testing. Some of its features allow to fine tune properties like call rate, call duration, simulate packet loss, ramp up traffic, etc. In practical terms though once you have the flexibility to generate SIP signalling to negotiate sessions and RTP streams, you can use sipp for functional testing too. sipp can act as an entity generating a call, or receiving a call, which makes it suitable to surround the system under test and simulate its interactions with the real world. What sipp does can be generalised: we want to be able to simulate the real world tha...