Wireshark-bugs: [Wireshark-bugs] [Bug 5434] Diameter dump is parsed incorrectly

Date: Thu, 25 Nov 2010 12:39:47 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5434

--- Comment #8 from Anders Broman <anders.broman@xxxxxxxxxxxx> 2010-11-25 12:39:44 PST ---
Hi,
If you select frame 31 using wireshark 1.4.1 and open up the AVP:s as in the
example below then file->Print in the print bos select "print to file"
"selected packet" and "as dioplayed" then attach the printout from the
resulting file here, we might be able to figure out where it goes wrong.
This printout is with the "reverse comented out stuff".
I will not have the time to look at this until earliest next week.
Regards
Anders
No.     Time        Source                Destination           Protocol Info
     31 45.063083   10.83.252.236         10.78.52.10           DIAMETER
cmd=Credit-ControlRequest(272) flags=RP-- appl=Diameter Credit Control
Application(4) h2h=4bf01c4b e2e=ea801e53[Malformed Packet]

Frame 31: 640 bytes on wire (5120 bits), 640 bytes captured (5120 bits)
Linux cooked capture
Internet Protocol, Src: 10.83.252.236 (10.83.252.236), Dst: 10.78.52.10
(10.78.52.10)
Transmission Control Protocol, Src Port: hhb-handheld (4148), Dst Port:
diameter (3868), Seq: 177, Ack: 185, Len: 572
Diameter Protocol
    Version: 0x01
    Length: 572
    Flags: 0xc0
    Command Code: 272 Credit-Control
    ApplicationId: 4
    Hop-by-Hop Identifier: 0x4bf01c4b
    End-to-End Identifier: 0xea801e53
    [Answer In: 34]
    AVP: Session-Id(263) l=28 f=-M- val=05261347430003EA0011
    AVP: Origin-Host(264) l=21 f=-M- val=10.83.252.232
    AVP: Origin-Realm(296) l=32 f=-M- val=rnd_testz.ptcp.megafonnw
    AVP: Destination-Realm(283) l=31 f=-M- val=rnd_testz.ptcp.megfonnw
    AVP: Auth-Application-Id(258) l=12 f=-M- val=Diameter Credit Control (4)
    AVP: Service-Context-Id(461) l=27 f=-M- val=rndptpt.volume.ptcp
    AVP: Destination-Host(293) l=15 f=--- val=ford-9C
    AVP: CC-Request-Type(416) l=12 f=-M- val=INITIAL_REQUEST (1)
    AVP: CC-Request-Number(415) l=12 f=-M- val=0
    AVP: Origin-State-Id(278) l=12 f=--- val=1274805105
    AVP: Event-Timestamp(55) l=12 f=-M- val=May 26, 2010 14:52:09,000000 UTC
    AVP: Subscription-Id(443) l=40 f=-M-
    AVP: Subscription-Id(443) l=44 f=-M-
    AVP: Multiple-Services-Indicator(455) l=12 f=-M-
val=MULTIPLE_SERVICES_SUPPORTED (1)
    AVP: Multiple-Services-Credit-Control(456) l=44 f=-M-
    AVP: User-Equipment-Info(458) l=44 f=---
    AVP: Service-Information(873) l=132 f=VM- vnd=TGPP
        AVP Code: 873 Service-Information
        AVP Flags: 0xc0
        AVP Length: 132
        AVP Vendor Id: 3GPP (10415)
        Service-Information:
0000036ac0000078000028af0000000280000016000028af...
            AVP: PS-Information(874) l=120 f=VM- vnd=TGPP
                AVP Code: 874 PS-Information
                AVP Flags: 0xc0
                AVP Length: 120
                AVP Vendor Id: 3GPP (10415)
                PS-Information:
0000000280000016000028af313533353132383034310000...
                    AVP: Public-Identity(Obsolete CN#25)(2) l=22 f=V-- vnd=TGPP
val=1535128041
                    AVP: SGSN-Address(1228) l=18 f=VM- vnd=TGPP
val=83.149.60.227 (83.149.60.227)
                    AVP: GGSN-Address(847) l=18 f=VM- vnd=TGPP
val=83.149.60.248 (83.149.60.248)
                    AVP: Called-Station-Id(30) l=18 f=-M- val=rndptpt.nw
                    AVP: Primary-Charging-Collection-Function-Name(Obsolete
CN#25)(22) l=22 f=V-- vnd=TGPP val=\026\n
                        AVP Code: 22
Primary-Charging-Collection-Function-Name(Obsolete CN#25)
                        AVP Flags: 0x80
                        AVP Length: 22
                        AVP Vendor Id: 3GPP (10415)
                        Primary-Charging-Collection-Function-Name(Obsolete
CN#25): \026\n
                        Mobile Country Code (MCC): Unknown (1000)
                        Mobile Network Code (MNC): Unknown (250)
                        Location Area Code: 61472
                        Service Area Code: 61472
[Malformed Packet: GTPv2]

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.