https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3534
Summary: IETF ForCES(Forwarding and Control Element Separation)
dissector
Product: Wireshark
Version: SVN
Platform: All
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: High
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: fgjia@xxxxxxxxxxxxxxxxx
Fenggen Jia <fgjia@xxxxxxxxxxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #3115| |review_for_checkin?
Flag| |
Created an attachment (id=3115)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=3115)
The tarbar includes a patch for create the packet-forces.c and update
epan/dissectors/Makefile.common and a ForCES packets capture file using tshark
Build Information:
TShark 1.3.0 (SVN Rev 28720)
Copyright 1998-2009 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GLib 2.14.2, with libpcap 0.9.4, with libz 1.2.3, with POSIX
capabilities (Linux), without libpcre, without SMI, without c-ares, without
ADNS, without Lua, without Python, with GnuTLS 1.6.3, with Gcrypt 1.2.4, with
MIT Kerberos, without GeoIP.
NOTE: this build doesn't support the "matches" operator for Wireshark filter
syntax.
Running on Linux 2.6.23.1-42.fc8, with libpcap version 0.9.4, GnuTLS 1.6.3,
Gcrypt 1.2.4.
Built using gcc 4.1.2 20070925 (Red Hat 4.1.2-33).
--
This a ForCES protocol dissector that conforms to the newest protocol
draft:http://www.ietf.org/internet-drafts/draft-ietf-forces-protocol-22.txt,the
protocol has completed and now is waiting for its RFC number to be assigned.The
dissector has the following features:
1 Support for two types of TMLs:TCP+UDP and SCTP
2 TCP+UDP TML: the default port is TCP port 3000 and UDP port 3001.
3 SCTP TML: the default port is SCTP port 6700,6701 and 6702.
4 Users can change the default ForCES TML port setting in the preference menu.
5 Full dissecting of ForCES main header,all kinds of the ForCES messages types
and TLVs.
6 Multiple LFB selectors and recursive PATH DATA TLV are supported.
Using the attatched ForCES capture file,fuzz test has been done.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.