Wireshark-bugs: [Wireshark-bugs] [Bug 5434] Diameter dump is parsed incorrectly
Date: Thu, 25 Nov 2010 12:39:47 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5434 --- Comment #8 from Anders Broman <anders.broman@xxxxxxxxxxxx> 2010-11-25 12:39:44 PST --- Hi, If you select frame 31 using wireshark 1.4.1 and open up the AVP:s as in the example below then file->Print in the print bos select "print to file" "selected packet" and "as dioplayed" then attach the printout from the resulting file here, we might be able to figure out where it goes wrong. This printout is with the "reverse comented out stuff". I will not have the time to look at this until earliest next week. Regards Anders No. Time Source Destination Protocol Info 31 45.063083 10.83.252.236 10.78.52.10 DIAMETER cmd=Credit-ControlRequest(272) flags=RP-- appl=Diameter Credit Control Application(4) h2h=4bf01c4b e2e=ea801e53[Malformed Packet] Frame 31: 640 bytes on wire (5120 bits), 640 bytes captured (5120 bits) Linux cooked capture Internet Protocol, Src: 10.83.252.236 (10.83.252.236), Dst: 10.78.52.10 (10.78.52.10) Transmission Control Protocol, Src Port: hhb-handheld (4148), Dst Port: diameter (3868), Seq: 177, Ack: 185, Len: 572 Diameter Protocol Version: 0x01 Length: 572 Flags: 0xc0 Command Code: 272 Credit-Control ApplicationId: 4 Hop-by-Hop Identifier: 0x4bf01c4b End-to-End Identifier: 0xea801e53 [Answer In: 34] AVP: Session-Id(263) l=28 f=-M- val=05261347430003EA0011 AVP: Origin-Host(264) l=21 f=-M- val=10.83.252.232 AVP: Origin-Realm(296) l=32 f=-M- val=rnd_testz.ptcp.megafonnw AVP: Destination-Realm(283) l=31 f=-M- val=rnd_testz.ptcp.megfonnw AVP: Auth-Application-Id(258) l=12 f=-M- val=Diameter Credit Control (4) AVP: Service-Context-Id(461) l=27 f=-M- val=rndptpt.volume.ptcp AVP: Destination-Host(293) l=15 f=--- val=ford-9C AVP: CC-Request-Type(416) l=12 f=-M- val=INITIAL_REQUEST (1) AVP: CC-Request-Number(415) l=12 f=-M- val=0 AVP: Origin-State-Id(278) l=12 f=--- val=1274805105 AVP: Event-Timestamp(55) l=12 f=-M- val=May 26, 2010 14:52:09,000000 UTC AVP: Subscription-Id(443) l=40 f=-M- AVP: Subscription-Id(443) l=44 f=-M- AVP: Multiple-Services-Indicator(455) l=12 f=-M- val=MULTIPLE_SERVICES_SUPPORTED (1) AVP: Multiple-Services-Credit-Control(456) l=44 f=-M- AVP: User-Equipment-Info(458) l=44 f=--- AVP: Service-Information(873) l=132 f=VM- vnd=TGPP AVP Code: 873 Service-Information AVP Flags: 0xc0 AVP Length: 132 AVP Vendor Id: 3GPP (10415) Service-Information: 0000036ac0000078000028af0000000280000016000028af... AVP: PS-Information(874) l=120 f=VM- vnd=TGPP AVP Code: 874 PS-Information AVP Flags: 0xc0 AVP Length: 120 AVP Vendor Id: 3GPP (10415) PS-Information: 0000000280000016000028af313533353132383034310000... AVP: Public-Identity(Obsolete CN#25)(2) l=22 f=V-- vnd=TGPP val=1535128041 AVP: SGSN-Address(1228) l=18 f=VM- vnd=TGPP val=83.149.60.227 (83.149.60.227) AVP: GGSN-Address(847) l=18 f=VM- vnd=TGPP val=83.149.60.248 (83.149.60.248) AVP: Called-Station-Id(30) l=18 f=-M- val=rndptpt.nw AVP: Primary-Charging-Collection-Function-Name(Obsolete CN#25)(22) l=22 f=V-- vnd=TGPP val=\026\n AVP Code: 22 Primary-Charging-Collection-Function-Name(Obsolete CN#25) AVP Flags: 0x80 AVP Length: 22 AVP Vendor Id: 3GPP (10415) Primary-Charging-Collection-Function-Name(Obsolete CN#25): \026\n Mobile Country Code (MCC): Unknown (1000) Mobile Network Code (MNC): Unknown (250) Location Area Code: 61472 Service Area Code: 61472 [Malformed Packet: GTPv2] -- Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug.
- References:
- [Wireshark-bugs] [Bug 5434] New: Diameter dump is parsed incorrectly
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 5434] New: Diameter dump is parsed incorrectly
- Prev by Date: [Wireshark-bugs] [Bug 5435] Support for dissecting SLL type 0x17 frames (raw IrLAP with Linux Cooked encapsulation)
- Next by Date: [Wireshark-bugs] [Bug 5436] New: gsm_a_rr: System Information Type 4 / CBCH mobile allocation dissected incorrectly
- Previous by thread: [Wireshark-bugs] [Bug 5434] Diameter dump is parsed incorrectly
- Next by thread: [Wireshark-bugs] [Bug 5434] Diameter dump is parsed incorrectly
- Index(es):