Dectmon » History » Version 1
laforge, 01/02/2022 05:01 PM
1 | 1 | laforge | h1. Dectmon |
---|---|---|---|
2 | |||
3 | @dectmon@ is a DECT protocol decoder. It can decode DECT MAC, DLC and NWK layer messages and display them in a human readable format. |
||
4 | |||
5 | == Build instructions == |
||
6 | |||
7 | <pre> |
||
8 | # sh autogen.sh |
||
9 | # sh configure |
||
10 | # make |
||
11 | </pre> |
||
12 | |||
13 | == Usage == |
||
14 | |||
15 | Configure the cluster in PP monitor mode: |
||
16 | |||
17 | <pre> |
||
18 | # dect-cluster-add --name cluster0 --emc 0x12f5 --fpn 0x0be9f --mode PP |
||
19 | # dect-cell-add --name cell0 --cluster cluster0 --flags monitor |
||
20 | # dect-transceiver-bind --transceiver trx0 --cell cell0 |
||
21 | </pre> |
||
22 | |||
23 | Then start the @dectmon@ application. By default only NWK layer messages are displayed, use @--dump-mac/-m=yes@ to dump MAC layer messages and |
||
24 | @--dump-dlc/-d=yes@ to dump DLC layer messages. To specify the PIN to use for calculating user authentication keys, use @--auth-pin/-p=PIN@. |
||
25 | |||
26 | h2. Deciphering |
||
27 | |||
28 | If dectmon is able to track the initial pairing of a phone, it calculates the resulting user authentication key, which is used to derive cipher keys |
||
29 | during authentication. dectmon calculates the cipher key and uses it to decipher encrypted connections. The user authentication key is permanently |
||
30 | stored in @$HOME/dectmon.keys@ and read from that file when a phone is first seen after a restart. |