Small tool on Python for automated diagnosing AES-crypto in telemt!
- Run
telemtwithME_DIAG=2 - Put your log w/
telemt::transport::middle_proxymessages in aesdiag.log (or another filename) - Download aesdiag.py
wget https://raw.githubusercontent.com/telemt/aesdiag/refs/heads/main/aesdiag.py- Run aesdiag.py and provide log
python3 aesdiag.py < aesdiag.log- Analyze results:
============================================================
STATISTICS SUMMARY
============================================================
Total tests processed : 10
Key length OK (32) : 10/10
IV length OK (16) : 10/10
Ciphertext 16-byte aligned : 10/10
Decryption starts with hs_plain : 10/10
After PKCS#7 removal matches : 0/10
Extra bytes after hs_plain are 0 : 0/10
Extra bytes are noop frames : 10/10
PKCS#7 re-encryption OK : 0/10
Zero padding re-encryption OK : 0/10
Noop padding re-encryption OK : 10/10
============================================================
HEURISTIC CONCLUSION
============================================================
✓ All tests: first bytes of decrypted data match hs_plain → keys and IV are correct.
✓ All tests consistent with padding scheme: noop padding.
✓ All tests: extra bytes after hs_plain are noop frames → strongly indicates noop padding.
✅ OVERALL: All tests consistent. The encryption parameters and padding are correct.