MIKEY is a key management scheme used with SIP/SDP and H.323/H.235.
MIKEY was made an RFC in August 2004, and was updated with two new modes in September 2006 and November 2006.
XXX - Add example decoded traffic for this protocol here (as plain text or Wireshark screenshot).
The MIKEY dissector is partially functional. There are currently no support for CHASH and ERR payloads, and no support for authentication and decryption.
MIKEY UDP port: UDP port to expect MIKEY traffic on (default 2269).
MIKEY TCP port: TCP port to expect MIKEY traffic on (default 2269).
Capture file containing two MIKEY messages: Pre-shared and PSK ver msg. Pre-shared key is "secret".
A complete list of MIKEY display filter fields can be found in the display filter reference
Show only the MIKEY based traffic:
You cannot directly filter MIKEY protocols while capturing.
RFC 3830 MIKEY: Multimedia Internet KEYing.
RFC 4650 HMAC-Authenticated Diffie-Hellman
for Multimedia Internet KEYing (MIKEY)
Imported from https://wiki.wireshark.org/MIKEY on 2020-08-11 23:16:44 UTC