Hi!
Well, the IP checking can be included as well. Till know I didn't do it
because I thought that possibility that two different RTP streams would
have the same SSRC values is rather small. But there will remain some
exceptions even with IP checking, that can still cause problems: if you
act as a router or do the middle in the man attack and you receive and
resend the packets on the same interface. In this case for each packet
received you will send another one with same SSRC, IP and port values.
In this case you still get the wrong sequence number error. The solution
here would be to add the MAC checking. But even with this one there are
some exceptions possible. In such cases the user can react with the
display filter.
Maybe it is smart to include the IP checking so I will add it.
I'll try to do it together with modifications that Tomas proposed and
would check if the RTP frame has extra padding bits, extension field or
CSRC field and to extract the RTP data even in this case. I hope
tomorrow will this fix be ready.
Regards, Miha
Martin Regner wrote:
Hi,
I got some strange result when using RTP Analysis on one capture file with several different RTP streams
between different ip-addresses. The RTP Analysis complained about wrong sequence numbers.
When I looked closer I noticed that when there are more than one RTP streams using the same SSRC value then the RTP Analysis will handle all RTP packets with that SSRC value as belonging to the same RTP stream.
I think that there should be a check not just for SSRC value but also source address, destination address, source
port number and destination port number to identify what packets are belonging to the same stream.
I have enclosed a sample that I prepared with text2pcap to illustrate the current behaviour.
No. Bytes Time Source S_port Destination D_port Protocol Info
1 94 0.000000 10.10.10.10 20480 10.10.10.11 16384 RTP Payload type=ITU-T G.729, SSRC=2864447487, Seq=637, Time=278800, Mark
2 94 0.000000 10.10.10.12 20736 10.10.10.13 16640 RTP Payload type=ITU-T G.729, SSRC=2864447487, Seq=1022, Time=278800, Mark
3 94 0.000000 10.10.10.10 20480 10.10.10.11 16384 RTP Payload type=ITU-T G.729, SSRC=2864447487, Seq=638, Time=278800, Mark
4 94 0.000000 10.10.10.13 16640 10.10.10.12 20736 RTP Payload type=ITU-T G.729, SSRC=2864434397, Seq=2047, Time=278800, Mark
5 94 0.000000 10.10.10.10 20480 10.10.10.11 16384 RTP Payload type=ITU-T G.729, SSRC=2864447487, Seq=639, Time=278800, Mark
6 94 0.000000 10.10.10.10 20480 10.10.10.11 16384 RTP Payload type=ITU-T G.729, SSRC=2864447487, Seq=640, Time=278800, Mark
7 94 0.000000 10.10.10.12 20736 10.10.10.13 16640 RTP Payload type=ITU-T G.729, SSRC=2864447487, Seq=1024, Time=278800, Mark
When I mark packet 1 and use RTP analysis then I will get packet 1, 2, 3, 5, 6 and 7 in forward direction and none i backward
direction, but actually these packets are belonging to two different streams 10.10.10.10:20480-->10.10.10.11:16384
(packet 1, 3, 5 and 6) respectively 10.10.10.12:20736-->10.10.10.13:16640 (packet 2 and 7).
When I mark packet 2 and use RTP analysis then I wil get packet 1, 2, 3, 5, 6 and 7 in forward direction and packet 4 in backward direction.
When I mark packet 3 and use RTP analysis then I will get packet 4 in forward direction and 1, 2, 3, 5, 6 and 7 in backward direction.
I also noticed that the first packet does not have "Marker = SET" in RTP Analysis even if marker bit really is set in that packet.