Wireshark-bugs: [Wireshark-bugs] [Bug 7487] New: BPDU dissector enhancement to recognize Cisco's

Date: Mon, 16 Jul 2012 15:10:19 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7487

           Summary: BPDU dissector enhancement to recognize Cisco's
                    VLAN-bridge BPDUs
           Product: Wireshark
           Version: unspecified
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Wireshark
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: peter.paluch@xxxxxxxxxxxx


Created attachment 8783
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=8783
Patch against packet-bpdu.c to recognize VLAN-bridge STP

Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
Greetings,

When software or fallback bridging is configured on Cisco devices, one of the
STP variants that can be selected to run in the particular bridge-group is what
Cisco calls VLAN-bridge. This STP variant uses SNAP encapsulation with the
following data:

- Destination MAC: 01:00:0c:cd:cd:ce
- SNAP OUI: 0x00000c
- SNAP PID: 0x010c

Information about this VLAN-bridge protocol are sadly quite rare but some info
about the idea behind it and some technical details are described here:

http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a00800a7af6.shtml#rec_use

BPDUs carried inside these VLAN-bridge frames are 802.1D STP-compliant BPDUs
without any modifications that can be dissected and analyzed by the existing
BPDU dissector. However, Wireshark currently does not recognize the SNAP PID
0x010c and does not pass these BPDUs to the existing BPDU dissector.

The attached patch adds the SNAP PID 0x010c among the list of PIDs passed to
the BPDU dissector.

I would like to ask you to kindly review this (basically one-line-long) patch
and consider it for including into Wireshark codebase.

Thank you!

Best regards,
Peter

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.