https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7483
Summary: Enhancements to the HP ERM protocol dissector
Product: Wireshark
Version: SVN
Platform: x86
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: Low
Component: Dissection engine (libwireshark)
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: z.velinov@xxxxxxxx
Build Information:
wireshark 1.9.0 (SVN Rev 43744 from /trunk)
Copyright 1998-2012 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GTK+ 2.24.10, with Cairo 1.10.2, with Pango 1.29.4, with
GLib 2.30.3, with libpcap, with libz 1.2.5.1, with POSIX capabilities (Linux),
with libnl 1, without SMI, without c-ares, without ADNS, with Lua 5.1, without
Python, with GnuTLS 2.12.18, with Gcrypt 1.5.0, without Kerberos, with GeoIP,
without PortAudio, without AirPcap.
Running on Linux 3.2.12-gentoo, with locale C, with libpcap version 1.1.1, with
libz 1.2.5.1, GnuTLS 2.12.18, Gcrypt 1.5.0.
Built using gcc 4.5.3.
--
Hello,
I have done some reverse engineering of the HP ERM protocol. I had injected
some 802.1Q frames on a network that contained a HP ProCurve 5406zl switch,
then I examined the resulting encapsulated traffic. It was quite easy to spot
the VLAN identifier and the priority field because part of the header closely
resembled the 802.1Q header. There were just some minor differences in the
priority numbering between 802.1Q and HP ERM.
I have attached the patch that implements all of the changes to this bug
report.
Best Regards,
Zdravko Velinov.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.