Wireshark-bugs: [Wireshark-bugs] [Bug 10956] New: Packets on OpenBSD loopback decoded as raw not

Date: Fri, 13 Feb 2015 22:38:11 +0000
Bug ID 10956
Summary Packets on OpenBSD loopback decoded as raw not null
Product Wireshark
Version 1.12.3
Hardware x86-64
OS OpenBSD
Status UNCONFIRMED
Severity Normal
Priority Low
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Created attachment 13443 [details]
pcap, openbsd loopback, icmp echo-req/reply to 127.0.0.1 followed by icmp6 to
::1

Build Information:
TShark 1.12.3 (v1.12.3-0-gbb3e9a0 from master-1.12)

Copyright 1998-2015 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GLib 2.42.1, with libpcap, with libz 1.2.3, without
POSIX
capabilities, with SMI 0.4.8, with c-ares 1.10.0, with Lua 5.2, without Python,
with GnuTLS 3.2.21, with Gcrypt 1.6.2, without Kerberos, with GeoIP.

Running on OpenBSD 5.7, without locale, with OpenBSD libpcap, with libz 1.2.3.
       Intel(R) Core(TM) i7-2640M CPU @ 2.80GHz

Built using gcc 4.2.1 20070719 .
--
Packets from an OpenBSD loopback interface (DLT_LOOP) get handled as raw
packets, so only display a basic hexdump. I've tried to dig around to work out
how the dissector is chosen but I'm not familiar with the wireshark code and
haven't tracked it down yet.

Test pcap file attached.

$ tshark -r lo.pcap -V
Frame 1: 88 bytes on wire (704 bits), 88 bytes captured (704 bits)
    Encapsulation type: Raw IP (7)
    Arrival Time: Feb 13, 2015 22:23:32.195414000 GMT
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1423866212.195414000 seconds
    [Time delta from previous captured frame: 0.000000000 seconds]
    [Time delta from previous displayed frame: 0.000000000 seconds]
    [Time since reference or first frame: 0.000000000 seconds]
    Frame Number: 1
    Frame Length: 88 bytes (704 bits)
    Capture Length: 88 bytes (704 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: raw:data]
Raw packet data
    No link information available
Data (88 bytes)

0000  00 00 00 02 45 00 00 54 f6 22 00 00 ff 01 c7 83   ....E..T."......
0010  7f 00 00 01 7f 00 00 01 08 00 c9 6c 7a 0d 00 00   ...........lz...
0020  54 de 79 64 00 02 fb 3d 08 09 0a 0b 0c 0d 0e 0f   T.yd...=........
0030  10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f   ................
0040  20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f    !"#$%&'()*+,-./
0050  30 31 32 33 34 35 36 37                           01234567
    Data: 0000000245000054f6220000ff01c7837f0000017f000001...
    [Length: 88]

Frame 2: 88 bytes on wire (704 bits), 88 bytes captured (704 bits)
    Encapsulation type: Raw IP (7)
    Arrival Time: Feb 13, 2015 22:23:32.195428000 GMT
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1423866212.195428000 seconds
    [Time delta from previous captured frame: 0.000014000 seconds]
    [Time delta from previous displayed frame: 0.000014000 seconds]
    [Time since reference or first frame: 0.000014000 seconds]
    Frame Number: 2
    Frame Length: 88 bytes (704 bits)
    Capture Length: 88 bytes (704 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: raw:data]
Raw packet data
    No link information available
Data (88 bytes)

0000  00 00 00 02 45 00 00 54 76 5b 00 00 ff 01 47 4b   ....E..Tv[....GK
0010  7f 00 00 01 7f 00 00 01 00 00 d1 6c 7a 0d 00 00   ...........lz...
0020  54 de 79 64 00 02 fb 3d 08 09 0a 0b 0c 0d 0e 0f   T.yd...=........
0030  10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f   ................
0040  20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f    !"#$%&'()*+,-./
0050  30 31 32 33 34 35 36 37                           01234567
    Data: 0000000245000054765b0000ff01474b7f0000017f000001...
    [Length: 88]

Frame 3: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
    Encapsulation type: Raw IP (7)
    Arrival Time: Feb 13, 2015 22:23:37.732884000 GMT
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1423866217.732884000 seconds
    [Time delta from previous captured frame: 5.537456000 seconds]
    [Time delta from previous displayed frame: 5.537456000 seconds]
    [Time since reference or first frame: 5.537470000 seconds]
    Frame Number: 3
    Frame Length: 60 bytes (480 bits)
    Capture Length: 60 bytes (480 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: raw:data]
Raw packet data
    No link information available
Data (60 bytes)

0000  00 00 00 18 60 00 00 00 00 10 3a 40 00 00 00 00   ....`.....:@....
0010  00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00   ................
0020  00 00 00 00 00 00 00 00 00 00 00 01 80 00 67 fa   ..............g.
0030  1a ad 00 00 54 de 79 69 00 0b 2e b9               ....T.yi....
    Data: 000000186000000000103a40000000000000000000000000...
    [Length: 60]

Frame 4: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
    Encapsulation type: Raw IP (7)
    Arrival Time: Feb 13, 2015 22:23:37.732901000 GMT
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1423866217.732901000 seconds
    [Time delta from previous captured frame: 0.000017000 seconds]
    [Time delta from previous displayed frame: 0.000017000 seconds]
    [Time since reference or first frame: 5.537487000 seconds]
    Frame Number: 4
    Frame Length: 60 bytes (480 bits)
    Capture Length: 60 bytes (480 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: raw:data]
Raw packet data
    No link information available
Data (60 bytes)

0000  00 00 00 18 60 00 00 00 00 10 3a 40 00 00 00 00   ....`.....:@....
0010  00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00   ................
0020  00 00 00 00 00 00 00 00 00 00 00 01 81 00 66 fa   ..............f.
0030  1a ad 00 00 54 de 79 69 00 0b 2e b9               ....T.yi....
    Data: 000000186000000000103a40000000000000000000000000...
    [Length: 60]

# tcpdump -vvnr lo.pcap -X
tcpdump: WARNING: snaplen raised from 116 to 1500
22:23:32.195414 127.0.0.1 > 127.0.0.1: icmp: echo request (id:7a0d seq:0) [icmp
cksum ok] (ttl 255, id 63010, len 84)
  0000: 4500 0054 f622 0000 ff01 c783 7f00 0001  E..T."..........
  0010: 7f00 0001 0800 c96c 7a0d 0000 54de 7964  .......lz...T.yd
  0020: 0002 fb3d 0809 0a0b 0c0d 0e0f 1011 1213  ...=............
  0030: 1415 1617 1819 1a1b 1c1d 1e1f 2021 2223  ............ !"#
  0040: 2425 2627 2829 2a2b 2c2d 2e2f 3031 3233  $%&'()*+,-./0123
  0050: 3435 3637                                4567

22:23:32.195428 127.0.0.1 > 127.0.0.1: icmp: echo reply (id:7a0d seq:0) [icmp
cksum ok] (ttl 255, id 30299, len 84)
  0000: 4500 0054 765b 0000 ff01 474b 7f00 0001  E..Tv[....GK....
  0010: 7f00 0001 0000 d16c 7a0d 0000 54de 7964  .......lz...T.yd
  0020: 0002 fb3d 0809 0a0b 0c0d 0e0f 1011 1213  ...=............
  0030: 1415 1617 1819 1a1b 1c1d 1e1f 2021 2223  ............ !"#
  0040: 2425 2627 2829 2a2b 2c2d 2e2f 3031 3233  $%&'()*+,-./0123
  0050: 3435 3637                                4567

22:23:37.732884 ::1 > ::1: icmp6: echo request (id:1aad seq:0) [icmp6 cksum ok]
(len 16, hlim 64)
  0000: 6000 0000 0010 3a40 0000 0000 0000 0000  `.....:@........
  0010: 0000 0000 0000 0001 0000 0000 0000 0000  ................
  0020: 0000 0000 0000 0001 8000 67fa 1aad 0000  ..........g.....
  0030: 54de 7969 000b 2eb9                      T.yi....

22:23:37.732901 ::1 > ::1: icmp6: echo reply (id:1aad seq:0) [icmp6 cksum ok]
(len 16, hlim 64)
  0000: 6000 0000 0010 3a40 0000 0000 0000 0000  `.....:@........
  0010: 0000 0000 0000 0001 0000 0000 0000 0000  ................
  0020: 0000 0000 0000 0001 8100 66fa 1aad 0000  ..........f.....
  0030: 54de 7969 000b 2eb9                      T.yi....


You are receiving this mail because:
  • You are watching all bug changes.