Wireshark-bugs: [Wireshark-bugs] [Bug 10860] ZigBee ZCL cluster dissector incorrectly tied to Pr
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10860
--- Comment #11 from Arasch Honarbacht <honarbacht@xxxxxxxxx> ---
(In reply to julien STAUB from comment #8)
> Hello,
> I'm new in Wireshark development.
> I don't know much about ZigBee but I know the Green Power feature very well.
> I wanted to developp the dissection of ZGP but the ZigBee Alliance is not
> willing to distribute ZGP specification. So I developped this feature localy.
>
> What I can say is that there is no such thing as "profileID" in ZGP. And
> that we are using the clusters given in ZCL (07-5123-04). Understand that
> GreenPower is quite different of ZigBee.
>
> Arash could you provide a preciser description of the problem ? Or a smaller
> PCAP file ?
> I guess with the encrypted payloads we can't do much. And is it possible
> that just the cluster you are using is no dissected (because not
> implemented) ?
>
> Note that as for ZGP, the ZigBee3 specification is non accessible to non
> members of the Alliance.
Just a note for everyone having trouble to view the unencrypted traffic: Make
sure you have added the "ZigBeeAlliance09" default trust center link-key to the
list of link keys for the ZigBee NWK protocol dissector (edit, preferences,
ZigBee NWK, Pre-configured keys, Edit..., add the 128-bit AES key
5A:69:67:42:65:65:41:6C:6C:69:61:6E:63:65:30:39). More detailed instructions
can be found in this document:
http://www.ubisys.de/downloads/ubisys-ieee802154-wireshark-manual.pdf
The .pcap contains all transport key messages, so you should be able to view
all messages unencrypted afterwards.
--
You are receiving this mail because:
You are watching all bug changes.