wireshark/wiretap
Guy Harris 2b3891fa3b Pull some of the code to set the struct wtap_pkthdr into
parse_netscreen_hex_dump().

svn path=/trunk/; revision=49944
2013-06-15 09:05:04 +00:00
..
5views.c Pull the code to set the struct wtap_pkthdr into _5views_read_header(), 2013-05-16 21:19:53 +00:00
5views.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
AUTHORS Update Motonori Shindo's email address at the author's request. Fixes bug 5840. 2011-04-18 02:16:36 +00:00
CMakeLists.txt dumpabi: This would create the directories in the sourcedir instead 2013-04-24 12:57:56 +00:00
Makefile.am 1.9.3 → 1.11.0. 2013-04-22 17:59:38 +00:00
Makefile.common wiretap support for the CAM Inspector file format 2013-03-30 09:56:57 +00:00
Makefile.nmake Try to fix LNK4217 (locally defined symbol imported in function) and C4273 (inconsistent DLL linkage) warnings when compiling for Windows 2013-03-02 22:19:33 +00:00
README
README.airmagnet Based on patch from Denis Ovsienko via 2011-08-16 13:16:33 +00:00
README.developer From Hadriel Kaplan: Update wiretap/README.developer 2010-10-20 01:15:12 +00:00
aethra.c Move some packet-header handling code into aethra_read_rec_header(), so 2013-05-16 21:40:04 +00:00
aethra.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
ascend-int.h Hoist a bunch of common code between ascend_read() and 2013-05-16 21:04:41 +00:00
ascend.y Hoist a bunch of common code between ascend_read() and 2013-05-16 21:04:41 +00:00
ascend_scanner.l We always HAVE_CONFIG_H so don't bother checking whether we have it or not. 2012-09-20 01:48:30 +00:00
ascendtext.c Hoist a bunch of common code between ascend_read() and 2013-05-16 21:04:41 +00:00
ascendtext.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
atm.c We always HAVE_CONFIG_H so don't bother checking whether we have it or not. 2012-09-20 01:29:52 +00:00
atm.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
ber.c Do not call wtap_file_read_unknown_bytes() or 2012-12-27 12:19:25 +00:00
ber.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
btsnoop.c Pull code to fill in the wtap_pkthdr into a btsnoop_read_record_header() 2013-05-16 22:14:11 +00:00
btsnoop.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
buffer.c Revert "Fix MSVC build errors related to symbol visibility" 2013-02-28 22:17:06 +00:00
buffer.h Export libwiretap symbols using WS_DLL_PUBLIC define 2013-02-28 19:35:59 +00:00
camins.c Pull the code to set the wtap_pkthdr into a common routine, so it's done 2013-05-16 22:01:44 +00:00
camins.h wiretap support for the CAM Inspector file format 2013-03-30 09:56:57 +00:00
catapult_dct2000.c wth->priv is always set in the open routine; no need to check that it's 2013-05-16 18:30:24 +00:00
catapult_dct2000.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
commview.c Put back a fix that earlier checkins lost. 2013-06-03 06:36:55 +00:00
commview.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
cosine.c Fill in the presence flags in parse_cosine_rec_hdr(), so it's done at 2013-05-16 23:34:12 +00:00
cosine.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
csids.c Pull code to read and process the packet header, and to read and process 2013-05-16 23:42:10 +00:00
csids.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
daintree-sna.c Move the header-processing code into a common daintree_sna_scan_header() 2013-05-17 00:00:13 +00:00
daintree-sna.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
dbs-etherwatch.c Set *data_offset early in the read process, to emphasize that it's the 2013-05-17 00:15:58 +00:00
dbs-etherwatch.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
dct3trace.c Prevent "'len' may be used uninitialized in this function" error when compiling with gcc 4.3.2 2013-05-17 13:37:36 +00:00
dct3trace.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
erf.c From Anthony Coddington: 2013-06-04 04:00:59 +00:00
erf.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
eyesdn.c Errors take precedence over EOF; use file_error() after operations that 2012-12-27 22:59:39 +00:00
eyesdn.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
file_access.c From Weston Schmidt via https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8689: 2013-05-16 18:27:03 +00:00
file_wrappers.c file_skip() only needs to return a Boolean; if anybody cares what the 2013-06-03 23:07:42 +00:00
file_wrappers.h file_skip() only needs to return a Boolean; if anybody cares what the 2013-06-03 23:07:42 +00:00
hcidump.c Pull code to fill in a wtap_pkthdr into a hcidump_process_header() 2013-05-17 05:31:21 +00:00
hcidump.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
i4b_trace.h Fix wiretap headers to allow error-free ABI dumping. 2011-06-04 21:20:57 +00:00
i4btrace.c Pull the record header processing code into i4b_read_rec_header(), 2013-05-17 06:08:40 +00:00
i4btrace.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
ipfix.c IPFIX records have a time stamp (and, according to RFC 5101, it's UNIX 2013-05-17 07:45:36 +00:00
ipfix.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
iptrace.c Get rid of duplicate code. 2013-05-17 08:56:43 +00:00
iptrace.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
iseries.c Have iseries_parse_packet() fill in a struct wtap_pkthdr; that means it 2013-05-17 09:48:19 +00:00
iseries.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
k12.c Pull some functions that fill in a struct wtap_pkthdr into common code, 2013-05-17 10:13:12 +00:00
k12.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
k12text.l Don't pass globals as arguments to k12text_set_headers(), just use the 2013-05-17 23:53:44 +00:00
lanalyzer.c Put the code to read trace record headers into a common routine used by 2013-05-18 00:08:43 +00:00
lanalyzer.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
libpcap.c Fix "set but not used" compile warning turning error 2013-05-18 08:13:51 +00:00
libpcap.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
libwiretap.vcproj Export libwiretap symbols using WS_DLL_PUBLIC define 2013-02-28 19:35:59 +00:00
mime_file.c Fill in the struct wtap_pkthdr in the seek-read routine. 2013-05-18 03:02:04 +00:00
mime_file.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
mp2t.c Fill in the struct wtap_pkthdr in the seek-read routine. 2013-05-18 03:42:06 +00:00
mp2t.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
mpeg.c replace "unsigned" datatype with "guint". Some mpeg files needed "unsigned int" instead. 2013-01-04 05:22:43 +00:00
mpeg.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
netmon.c Initialize the frame_table_size field of the private data to 0 and the 2013-06-02 18:09:13 +00:00
netmon.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
netscaler.c From Ravi Kondamuru via https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8637 2013-05-11 18:43:53 +00:00
netscaler.h From Ravi Kondamuru via https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8637 2013-05-11 18:43:53 +00:00
netscreen.c Pull some of the code to set the struct wtap_pkthdr into 2013-06-15 09:05:04 +00:00
netscreen.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
nettl.c From Mark C. Brown via https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8777 : 2013-06-06 20:55:00 +00:00
nettl.h From Mark C. Brown via https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8777 : 2013-06-06 20:55:00 +00:00
network_instruments.c The check for network_size < 4 is necessary only for those packets where 2013-06-05 08:12:06 +00:00
network_instruments.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
netxray.c Set the entire struct wtap_pkthdr, not just the pseudo-header, in the 2013-06-06 00:10:36 +00:00
netxray.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
ngsniffer.c file_skip() only needs to return a Boolean; if anybody cares what the 2013-06-03 23:07:42 +00:00
ngsniffer.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
packetlogger.c Pull code to read process packet headers into a 2013-06-02 22:17:37 +00:00
packetlogger.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
pcap-common.c From Chris Bontje via https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8644 : 2013-05-30 20:51:18 +00:00
pcap-common.h In the pcapng seek-read routine, *don't* fill in wth->phdr; seek-read 2013-05-18 02:36:00 +00:00
pcap-encap.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
pcapng.c libwireshark's add_new_ipv4() and add_new_ipv6() now silently ignore 2013-06-09 06:44:47 +00:00
pcapng.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
peekclassic.c When reading sequentially, skip past any ignored data at the end of the 2013-06-03 00:26:16 +00:00
peekclassic.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
peektagged.c Initialize the whole hdr_info structure to please gcc 4.3.2 2013-06-03 07:48:59 +00:00
peektagged.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
pppdump.c Fill in at least some of the struct wtap_pkthdr in both the read and 2013-06-15 01:51:21 +00:00
pppdump.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
radcom.c Rename radcom_process_rec_header() to radcom_process_rec_header() and 2013-06-14 23:59:04 +00:00
radcom.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
snoop.c Pull the code for setting the struct wtap_pkthdr into a 2013-06-06 08:14:44 +00:00
snoop.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
tnef.c Pull the code to Fill in the wtap_pkthdr structure into a common 2013-06-02 23:23:47 +00:00
tnef.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
toshiba.c Errors take precedence over EOF; use file_error() after operations that 2012-12-27 22:59:39 +00:00
toshiba.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
visual.c Pull all the code that reads and processes the packet header into 2013-06-06 18:57:22 +00:00
visual.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
vms.c Fix spelling/typos found using a list of commonly misspelled words. 2013-02-26 04:42:26 +00:00
vms.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
vwr.c Fix an unintialized-value-used warning that Valgrind detected in the capture 2013-06-04 01:31:56 +00:00
vwr.h Export libwireshark symbols using WS_DLL_PUBLIC define 2013-03-01 23:53:11 +00:00
wtap-int.h From beroset: 2013-03-17 09:20:13 +00:00
wtap.c Allign the error messages. 2013-06-10 17:13:49 +00:00
wtap.h From Chris Bontje via https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8644 : 2013-05-30 20:51:18 +00:00

README

$Id$

Wiretap is a library that is being developed as a future replacement for
libpcap, the current standard Unix library for packet capturing. Libpcap
is great in that it is very platform independent and has a wonderful
BPF optimizing engine. But it has some shortcomings as well. These
shortcomings came to a head during the development of Wireshark
(http://www.wireshark.org/), a packet analyzer. As such, I began developing
wiretap so that:

1. The library can easily be amended with new packet filtering objects.
Libpcap is very TCP/IP-oriented. I want to filter on IPX objects, SNA objects,
etc. I also want any decent programmer to be able to add new filters to the
library.

2. The library can read file formats from many packet-capturing utilities.
Libpcap only reads Libpcap files.

3. The library can capture on more than one network interface at a time, and
save this trace in one file.

4. Network names can be resolved immediately after a trace and saved in the
trace file. That way, I can ship a trace of my firewall-protected network to a
colleague, and he'll see the proper hostnames for the IP addresses in the
packet capture, even though he doesn't have access to the DNS server behind my
LAN's firewall.

5. I want to look into the possibility of compressing packet data when saved
to a file, like Sniffer.

6. The packet-filter can be optimized for the host OS. Not all OSes have BPF;
SunOS has NIT and Solaris has DLPI, which both use the CMU/Stanford
packet-filter pseudomachine. RMON has another type of packet-filter syntax
which we could support.

Wiretap is very good at reading many file formats, as per #2
above. Wiretap has no filter capability at present; it currently doesn't
support packet capture, so it wouldn't be useful there, and filtering
when reading a capture file is done by Wireshark, using a more powerful
filtering mechanism than that provided by BPF.


File Formats
============

Libpcap
-------
The "libpcap" file format was determined by reading the "libpcap" code;
wiretap reads the "libpcap" file format with its own code, rather than
using the "libpcap" library's code to read it.

Sniffer (compressed and uncompressed)
-------
The uncompressed Sniffer format is documented in the Sniffer manual.
Unfortunately, Sniffer manuals tend to document only the format for
the Sniffer model they document. Token-Ring and ethernet seems to work
well, though.  If you have an ATM Sniffer file, both Guy and Gilbert
would be *very* interested in receiving a sample. (see 'AUTHORS' file
for our e-mail addresses).

LANalyzer
---------
The LANalyzer format is available from http://www.novell.com. Search
their knowledge base for "Trace File Format".

Network Monitor
---------------
Microsoft's Network Monitor file format is supported, at least under
Ethernet and token-ring. If you have capture files of other datalink
types, please send them to Guy.

"snoop"
-------
The Solaris 2.x "snoop" program's format is documented in RFC 1761.

"iptrace"
---------
This is the capture program that comes with AIX 3.x and 4.x.  AIX 3 uses
the iptrace 1.0 file format, while AIX4 uses iptrace 2.0.  iptrace has
an undocumented, yet very simple, file format.  The interesting thing
about iptrace is that it will record packets coming in from all network
interfaces; a single iptrace file can contain multiple datalink types.

Sniffer Basic (NetXRay)/Windows Sniffer Pro
-------------------------------------------
Network Associates' Sniffer Basic (formerly NetXRay from Cinco Networks)
file format is now supported, at least for Ethernet and token-ring. 
Network Associates' Windows Sniffer Pro appears to use a variant of that
format; it's supported to the same extent.

RADCOM WAN/LAN Analyzers
------------------------
Olivier Abad has added code to read Ethernet and LAPB captures from
RADCOM WAN/LAN Analyzers (see http://www.radcom-inc.com/).

Lucent/Ascend access products
-----------------------------
Gerald

HP-UX nettl
-----------
nettl is used on HP-UX to trace various streams based subsystems.  Wiretap
can read nettl files containing IP frames (NS_LS_IP subsystem) and LAPB
frames (SX25L2 subsystem). It has been tested with files generated on
HP-UX 9.04 and 10.20.
Use the following commands to generate a trace :
# IP capture. 0x30000000 means PDU in and PDU out :
nettl -tn 0x30000000 -e NS_LS_IP -f tracefile
# X25 capture. You must specify an interface :
nettl -tn 0x30000000 -e SX25l2 -d /dev/x25_0 -f tracefile
# stop capture. subsystem is NS_LS_IP or SX25L2 :
nettl -tf -e subsystem

One may be able to specify "-tn pduin pduout" rather than
"-tn 0x30000000"; the nettl man page for HP-UX 10.30 implies that it
should work.

There is also basic support for nettl files containing NS_LS_DRIVER, 
NS_LS_TCP, NS_LS_UDP, NS_LS_LOOPBACK, unknown type 0xb9, and NS_LS_ICMP.
However, NS_LS_ICMP will not be decoded since WTAP lacks a raw ICMP 
encapsulation type.


Toshiba ISDN Router
-------------------
An under-documented command that the router supports in a telnet session
is "snoop" (not related to the Solaris "snoop" command). If you give
it the "dump" option (either by letting "snoop" query you for its next
argument, or typing "snoop dump" on the command line), you'll get a hex
dump of all packets across the router (except of your own telnet session
-- good thinking Toshiba!). You can select a certain channel to sniff
(LAN, B1, B2, D), but the default is all channels.  You save this hex
dump to disk with 'script' or by 'telnet | tee'. Wiretap will read the
ASCII hex dump and convert it to binary data.

ISDN4BSD "i4btrace" utility
---------------------------
Bert Driehuis

Cisco Secure Intrustion Detection System iplogging facility
-----------------------------------------------------------
Mike Hall

pppd logs (pppdump-format files)
--------------------------------
Gilbert

VMS TCPTRACE
------------
Compaq VMS's TCPIPTRACE format is supported.  This is the capture program
that comes with TCP/IP or UCX as supplied by Compaq or Digital Equipment
Corporation.

Under UCX 4.x, it is invoked as TCPIPTRACE.  Under TCPIP 5.x, it is invoked
as TCPTRACE.

TCPTRACE produces an ascii text based format, that has changed slightly over
time.

DBS Etherwatch (text format)
----------------------------
Text output from DBS Etherwatch is supported.  DBS Etherwatch is available
from: http://www.users.bigpond.com/dbsneddon/software.htm.

Catapult DCT2000 (.out files)
-----------------------------
DCT2000 test systems produce ascii text-based .out files for ports
that have logging enabled. When being read, the data part of the message is
prefixed with a short header that provides some context (context+port,
direction, original timestamp, etc).

You can choose to suppress the reading of non-standard protocols
(i.e. messages between layers rather than the well-known link-level protocols
usually found on board ports).


Gilbert Ramirez <gram@alumni.rice.edu>
Guy Harris <guy@alum.mit.edu>