Wireshark-bugs: [Wireshark-bugs] [Bug 1880] New: should provide an option to print tunnel encaps
Date: Sun, 30 Sep 2007 19:03:36 +0000 (GMT)
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1880 Summary: should provide an option to print tunnel encapsulation Product: Wireshark Version: 0.99.6 Platform: PC OS/Version: Linux Status: NEW Severity: Major Priority: Low Component: TShark AssignedTo: wireshark-bugs@xxxxxxxxxxxxx ReportedBy: fpeters@xxxxxxxxxx Build Information: -- Forwarded from http://bugs.debian.org/244279 ---- Anand Kumria: when comparing the output of tcpdump: wildfire@sutekh:~/ip6/tb$ sudo tcpdump -c 10 -i eth0 proto ipv6 tcpdump: listening on eth0 04:24:37.295085 sutekh.progsoc.uts.edu.au > CPE-144-136-88-232.nsw.bigpond.net.au: sutekh-bemused-37.ip6.progsoc.uts.edu.au > bemused-37-sutekh.ip6.progsoc.uts.edu.au: icmp6: echo request (DF) 04:24:49.868910 sutekh.progsoc.uts.edu.au > gw-ipv6.trumpet.com.au: tunc1.tunnels.ip6.trumpet.net.3200 > tunc0.tunnels.ip6.trumpet.net.bgp: P 863833055:863833074(19) ack 4271389598 win 63900: BGP (DF) 04:24:50.215215 gw-ipv6.trumpet.com.au > sutekh.progsoc.uts.edu.au: tunc0.tunnels.ip6.trumpet.net.bgp > tunc1.tunnels.ip6.trumpet.net.3200: . ack 19 win 15674 [class 0x60] 04:24:56.746461 sutekh.progsoc.uts.edu.au > ipv6.broadway.aarnet.net.au: 3ffe:8001:c:ffff::60.bgp > 3ffe:8001:c:ffff::61.1934: P 1480493576:1480493595(19) ack 3142910271 win 5632 <nop,nop,[|tcp]> (DF) 04:24:56.748935 ipv6.broadway.aarnet.net.au > sutekh.progsoc.uts.edu.au: 3ffe:8001:c:ffff::61.1934 > 3ffe:8001:c:ffff::60.bgp: . ack 19 win 6432 <nop,nop,[|tcp]> [hlim 1] (DF) 04:24:56.806880 ipv6.broadway.aarnet.net.au > sutekh.progsoc.uts.edu.au: 3ffe:8001:c:ffff::61.1934 > 3ffe:8001:c:ffff::60.bgp: P 1:20(19) ack 19 win 6432 <nop,nop,[|tcp]> [hlim 1] (DF) 04:24:56.807077 sutekh.progsoc.uts.edu.au > ipv6.broadway.aarnet.net.au: 3ffe:8001:c:ffff::60.bgp > 3ffe:8001:c:ffff::61.1934: . ack 20 win 5632 <nop,nop,[|tcp]> (DF) 04:24:57.093743 gw-ipv6.trumpet.com.au > sutekh.progsoc.uts.edu.au: 2001:738:2001:4032:200:f8ff:fe09:a82f.32769 > orgo.progsoc.uts.edu.au.domain: 15993 [1au][|domain] 04:24:57.096810 sutekh.progsoc.uts.edu.au > gw-ipv6.trumpet.com.au: orgo.progsoc.uts.edu.au.domain > 2001:738:2001:4032:200:f8ff:fe09:a82f.32769: 15993*[|domain] (DF) 04:24:57.662455 gw-ipv6.trumpet.com.au > sutekh.progsoc.uts.edu.au: 2001:738:2001:4030:2c0:dff:fe00:4153 > sutekh.progsoc.uts.edu.au: icmp6: echo request 53 packets received by filter 0 packets dropped by kernel versus that of tethereal: wildfire@sutekh:~/ip6/tb$ sudo tethereal -c 10 -i eth0 proto ipv6 Capturing on eth0 0.000000 3ffe:8001:c:6:250:baff:fe61:782a -> 2001:960:9:1:0:1:53:1 DNS Standard query TXT 10.10.166.82.ipwhois.rfc-ignorant.org 0.108929 3ffe:8001:c:6:250:baff:fe61:782a -> 2001:6c8:6:1::3 DNS Standard query TXT 10.10.166.82.list.dsbl.org 0.505647 2001:960:9:1:0:1:53:1 -> 3ffe:8001:c:6:250:baff:fe61:782a DNS Standard query response, No such name 0.575610 2001:6c8:6:1::3 -> 3ffe:8001:c:6:250:baff:fe61:782a DNS Standard query response TXT 9.044702 3ffe:8001:c:ffff::71 -> 3ffe:8001:c:ffff::72 ICMPv6 Echo request 18.618390 3ffe:8000:ffff:100c::101 -> 3ffe:8000:ffff:100c::100 BGP KEEPALIVE Message 18.965306 3ffe:8000:ffff:100c::100 -> 3ffe:8000:ffff:100c::101 TCP bgp > 3200 [ACK] Seq=0 Ack=19 Win=15655 Len=0 23.480156 3ffe:8001:c:6:250:baff:fe61:782a -> 2001:960:9:1:0:1:53:1 DNS Standard query TXT 30.133.101.150.ipwhois.rfc-ignorant.org 23.498084 3ffe:8001:c:6:250:baff:fe61:782a -> 2001:960:9:1:0:1:53:1 DNS Standard query TXT 181.214.16.203.ipwhois.rfc-ignorant.org 23.665995 3ffe:8001:c:6:250:baff:fe61:782a -> 2001:6c8:6:1::3 DNS Standard query TXT 30.133.101.150.list.dsbl.org tcpdump has one thing over tethereal: it prints out the IPv4 IP encapsulation (I've using tunnel for my IPv6 connections). It'd be great if tethereal had the same option. I can imagine this being useful for GRE/IPv4 in IPv6 tunnel/IPv6 in IPv6 tunnels, etc. -- Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
- Follow-Ups:
- [Wireshark-bugs] [Bug 1880] should provide an option to print tunnel encapsulation
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 1880] should provide an option to print tunnel encapsulation
- Prev by Date: [Wireshark-bugs] [Bug 1879] New: -V should support layer selection
- Next by Date: [Wireshark-bugs] [Bug 1880] should provide an option to print tunnel encapsulation
- Previous by thread: [Wireshark-bugs] [Bug 1879] -V should support layer selection
- Next by thread: [Wireshark-bugs] [Bug 1880] should provide an option to print tunnel encapsulation
- Index(es):