Wireshark-bugs: [Wireshark-bugs] [Bug 2695] New: New WiMAX OFDMA PHY SAP dissector

Date: Mon, 7 Jul 2008 23:10:16 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2695

           Summary: New WiMAX OFDMA PHY SAP dissector
           Product: Wireshark
           Version: SVN
          Platform: PC
        OS/Version: Linux
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: stephen.d.croll@xxxxxxxxx



Stephen Croll <stephen.d.croll@xxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #1980|                            |review_for_checkin?
               Flag|                            |


Created an attachment (id=1980)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=1980)
Patch for new WiMAX OFDMA PHY SAP dissector

Build Information:
Version 1.0.99 (SVN Rev 25674)

Copyright 1998-2008 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GTK+ 2.10.14, with GLib 2.12.13, with libpcap 0.9.7, with libz
1.2.3, with POSIX capabilities (Linux), with libpcre 7.3, without SMI, without
ADNS, without Lua, with GnuTLS 1.6.3, with Gcrypt 1.2.4, with MIT Kerberos,
without PortAudio, without AirPcap.

Running on Linux 2.6.23.17-88.fc7, with libpcap version 0.9.7.

Built using gcc 4.1.2 20070925 (Red Hat 4.1.2-27).

--
This is a new dissector for the protocol described in "OFDMA PHY SAP Interface
Specification for 802.16 Broadband Wireless Access Base Stations", Intel,
Revision 2.31, June 15, 2007.

Link: http://www.intel.com/netcomms/technologies/wimax/PHY_SAP_API.pdf

I am currently unable to provide sample capture files, but I will attach a
Python script that generates semi-random WIMAXMACPHY-structured packets that
semantically are gibberish, but can be used for fuzz testing. Specifically, I
have used this script to generate traffic, used Wireshark to capture it, and
then subsequently used the traces for fuzz testing.

The specification describes encapsulation over Ethernet, but the dissector is
currently coded to expect UDP encapsulation.  At the time I originally wrote
this, I chose the then unassigned port 1139.  According to
http://www.iana.org/assignments/port-numbers, it is now taken.

Any suggestions for choosing a port?  Should I make it configurable?  If so,
what should the default value be?  I could code it to expect Ethernet
encapsulation, but I'm not sure how I can adapt my script to test it.

Finally, I would like to note that this development was commissioned by Mobile
Metrics - http://mobilemetrics.net/.


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.