Wireshark-bugs: [Wireshark-bugs] [Bug 3534] New: IETF ForCES(Forwarding and Control Element Sepa
Date: Sun, 14 Jun 2009 23:02:50 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3534

           Summary: IETF ForCES(Forwarding and Control Element Separation)
                    dissector
           Product: Wireshark
           Version: SVN
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: High
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: fgjia@xxxxxxxxxxxxxxxxx



Fenggen Jia <fgjia@xxxxxxxxxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #3115|                            |review_for_checkin?
               Flag|                            |


Created an attachment (id=3115)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=3115)
The tarbar includes a patch for create the packet-forces.c and update
epan/dissectors/Makefile.common and a ForCES packets capture file using tshark

Build Information:
TShark 1.3.0 (SVN Rev 28720)

Copyright 1998-2009 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GLib 2.14.2, with libpcap 0.9.4, with libz 1.2.3, with POSIX
capabilities (Linux), without libpcre, without SMI, without c-ares, without
ADNS, without Lua, without Python, with GnuTLS 1.6.3, with Gcrypt 1.2.4, with
MIT Kerberos, without GeoIP.
NOTE: this build doesn't support the "matches" operator for Wireshark filter
syntax.

Running on Linux 2.6.23.1-42.fc8, with libpcap version 0.9.4, GnuTLS 1.6.3,
Gcrypt 1.2.4.

Built using gcc 4.1.2 20070925 (Red Hat 4.1.2-33).
--
This a ForCES protocol dissector that conforms to the newest protocol
draft:http://www.ietf.org/internet-drafts/draft-ietf-forces-protocol-22.txt,the
protocol has completed and now is waiting for its RFC number to be assigned.The
dissector has the following features:
1 Support for two types of TMLs:TCP+UDP and SCTP
2 TCP+UDP TML: the default port is TCP port 3000 and UDP port 3001.
3 SCTP TML: the default port is SCTP port 6700,6701 and 6702.
4 Users can change the default ForCES TML port setting in the preference menu.
5 Full dissecting of ForCES main header,all kinds of the ForCES messages types
and TLVs.
6 Multiple LFB selectors and recursive PATH DATA TLV are supported.

Using the attatched ForCES capture file,fuzz test has been done.


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.