Bug ID |
9127
|
Summary |
RSVP Properties object decode (Juniper proprietary)
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
SVN
|
Hardware |
All
|
OS |
All
|
Status |
UNCONFIRMED
|
Severity |
Normal
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Created attachment 11532 [details]
sample (Unknown object=Properties Primary path)
Build Information:
Version 1.11.0+svn51917 (SVN Rev Unknown from unknown)
Copyright 1998-2013 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GTK+ 3.4.2, with Cairo 1.10.2, with Pango 1.30.0, with
GLib 2.32.3, with libpcap, with libz 1.2.3.4, with POSIX capabilities (Linux),
without libnl, with SMI 0.4.8, with c-ares 1.7.5, with Lua 5.1, without Python,
with GnuTLS 2.12.14, with Gcrypt 1.5.0, with MIT Kerberos, with GeoIP, with
PortAudio V19-devel (built Dec 10 2011 11:43:21), with AirPcap.
Running on Linux 3.9.4-030904-generic, with locale en_IE.UTF-8, with libpcap
version 1.1.1, with libz 1.2.3.4, GnuTLS 2.12.14, Gcrypt 1.5.0, without
AirPcap.
Built using gcc 4.6.3.
Wireshark is Open Source Software released under the GNU General Public
License.
Check the man page and http://www.wireshark.org for more information.
--
RSVP Properties object is not decoded by wireshark.
Information from Juniper tracefile about this packet:
Sep 10 15:34:11.050602 RSVP recv Path 192.168.1.1->192.168.1.5 Len=216
lt-1/2/0.32
Sep 10 15:34:11.050610 Session7 Len 16 192.168.1.5(port/tunnel ID 9563 Ext-ID
192.168.1.1) Proto 0
Sep 10 15:34:11.050616 Hop Len 12 65.115.1.5/0x80000002
Sep 10 15:34:11.050621 Time Len 8 30000 ms
Sep 10 15:34:11.050628 SrcRoute Len 20 65.115.1.6 S 192.168.1.3 L
Sep 10 15:34:11.050633 LabelRequest Len 8 EtherType 0x800
!!!!!Sep 10 15:34:11.050639 Properties Len 12 Primary path
Sep 10 15:34:11.050645 SessionAttribute Len 16 Prio (7,0) flag 0x0 "R1-to-R5"
Sep 10 15:34:11.050651 Sender7 Len 12 192.168.1.1(port/lsp ID 4)
Sep 10 15:34:11.050658 Tspec Len 36 rate 0bps size 0bps peak Infbps m 20 M
1500
Sep 10 15:34:11.050778 ADspec Len 48 MTU 1500
Sep 10 15:34:11.050786 RecRoute Len 20 65.115.1.5 65.115.1.1
This link may be useful
https://www.juniper.net/techpubs/en_US/junos12.1/information-products/topic-collections/nog-mpls-logs/topic-20284.html
You are receiving this mail because:
- You are watching all bug changes.