Wireshark-bugs: [Wireshark-bugs] [Bug 10841] New: Enhance TCAP session matching

Date: Fri, 09 Jan 2015 14:42:28 +0000
Bug ID 10841
Summary Enhance TCAP session matching
Product Wireshark
Version Git
Hardware x86
OS Mac OS X 10.9
Status UNCONFIRMED
Severity Major
Priority Low
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Created attachment 13379 [details]
tcap-confirm-forwardsm.erf

Build Information:
TShark (Wireshark) 1.99.2 (v1.99.2rc0-536-g5d610b5 from master)

Copyright 1998-2015 Gerald Combs <[email protected]> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with libpcap, without POSIX capabilities, with libz 1.2.5,
with GLib 2.42.1, with SMI 0.4.8, with c-ares 1.10.0, without Lua, with GnuTLS
3.3.11, with Gcrypt 1.6.2, with MIT Kerberos, without GeoIP.

Running on Mac OS X 10.10.1, build 14B25 (Darwin 14.0.0), with locale
C/en_US.UTF-8/en_US.UTF-8/en_US.UTF-8/en_US.UTF-8/en_US.UTF-8, with libpcap
version 1.5.3 - Apple version 47, with libz 1.2.5, with GnuTLS 3.3.11, with
Gcrypt 1.6.2.
Intel(R) Core(TM) i7-4650U CPU @ 1.70GHz (with SSE4.2)

Built using clang 4.2.1 Compatible Apple LLVM 6.0 (clang-600.0.54).


--
TCAP session matching doesn't cope with TCAP dialogue confirmation.
See ITU-T Q.771 (06/97) clause 3.1.2.2.2.2 "Confirmation of the dialogue" for
more details.

This is because the current implementation uses the destination address for
TCAP BEGIN matching (tcaphash_begin_info_key_t.dpc_hash), and origin address
for TCAP END matching (tcaphash_end_info_key_t.opc_hash).

When TCAP sessions (transactions) aren't correctly matched, then higher level
dissectors can mistakenly decode packets part-way through the session because
of assumptions about protocol versions (etc).

There are other Wireshark bugs in TCAP (and higher layer) that may be fixed by
addressing this.


I'll attach a sanitised ERF test containing an mo-forwardSM SMS over 4 packets.
The preference  erf.hdlc_type:SS7 MTP2   must be set to process the ERF as
erf:mtp2:mtp3:sccp:tcap ...
In order to exercise the session matching, the following options were used with
tshark:
   -o 'erf.hdlc_type:SS7 MTP2' -o sccp.set_addresses:TRUE -o tcap.srt:TRUE -o
tcap.persistentsrt:TRUE

The existing behaviour doesn't correctly decode the IMSI in packet 3 because
the Application Context isn't known at that point (it's in the dialogue setup
in packets 1 & 2 as "shortMsgMO-RelayContext-v3").
The packets past the first don't display a TCAP [Session ID:] either.


You are receiving this mail because:
  • You are watching all bug changes.