Commit Graph

40257 Commits

Author SHA1 Message Date
Richard Sharpe 38d54660f2 ieee80211-radiotap: Add support for radiotap TLVs.
From Johannes Berg with changes by Richard Sharpe to make it easier for
people to add support for RADIOTAP Header TLVs in the future.

Change-Id: I66d69cbe16740abce1e75ca1e789a2034283306b
Reviewed-on: https://code.wireshark.org/review/36057
Reviewed-by: Richard Sharpe <realrichardsharpe@gmail.com>
Petri-Dish: Richard Sharpe <realrichardsharpe@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Johannes Berg <johannes@sipsolutions.net>
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-02-08 19:41:47 +00:00
Sébastien RAILLARD 4c87407a3c Fix ZEP dissector for displaying the LQI value
Bug: 16369
Change-Id: I0efd99f651b2d09cc3ef71bee4009e72bd43d457
Reviewed-on: https://code.wireshark.org/review/36054
Petri-Dish: Dario Lombardo <lomato@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-02-08 11:12:02 +00:00
Uli Heilmeier 23749592e3 TDS7: Update Feature IDs for FeatureExtAck Token
Updating Feature IDs as defined at
https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-tds/2eb82f8e-11f0-46dc-b42d-27302fa4701a

Change-Id: I5fce096afde1c50bd82a7763e78497a93b2250e9
Reviewed-on: https://code.wireshark.org/review/36053
Reviewed-by: Craig Jackson <cejackson51@gmail.com>
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-02-08 09:40:20 +00:00
Andre Luyer 3e2a837cc0 TLS: update cipher suite list
Update cipher suites with the latest additions to the IANA list:
http://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml

Change-Id: I27d855e4626fae027cb08114d034e0cec67ccda5
Reviewed-on: https://code.wireshark.org/review/36052
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-02-08 09:40:06 +00:00
Orgad Shaneh f307dcc1d4 TPNCP: Show IPv6 correctly
Change-Id: I6c4ee9190f4cfc6d073857999b2bc6859cad591b
Reviewed-on: https://code.wireshark.org/review/36044
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-02-08 09:39:48 +00:00
Aurelien Aptel 02199970d7 SMB2: store file names longer than 256 bytes
File names can be longer than 256 bytes and still be sane. Fixes
filenames being reported as "[unknown]".

Change-Id: I3425d3106cf6ef63e298c2e73a063a207a4d4aea
Reviewed-on: https://code.wireshark.org/review/36045
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-02-08 09:39:26 +00:00
Tomasz Moń ce4e7bdf4b FTDI MPSSE: Initial MPSSE commands dissection
MPSSE response data and chip specific command parameters are not
dissected yet.

Ping-Bug: 11743
Change-Id: If783ef4580d0f8862419a249191f24521e316271
Reviewed-on: https://code.wireshark.org/review/35961
Petri-Dish: Tomasz Moń <desowin@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-02-08 07:25:17 +00:00
Cal Turney 19b3376a24 LDAP bogus malformed errors: decoding encrypted data
In captures of LDAP Privacy (encrypted) data, the dissector
threw Malformed errors because had it attempted to decode
encrypted payloads. See attached example capture
"PRIVACY-payload-(encrypted-data).pcap" at
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16358

Bug: 16358
Change-Id: Ic6d74d464157b145896090316ba73af025af7312
Reviewed-on: https://code.wireshark.org/review/36038
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-02-07 06:28:48 +00:00
Adrien Aubry 80e1c54ff4 CANopen: Add SDO Block Upload/Download decoding
Previous code did not properly decode protocol (Object dictionnary is not always sent). All changes comply with CANopen DS301 freely available on the web.

Change-Id: Ibaae09af0f1a5300a323a9c94077d1fb7dadd560
Reviewed-on: https://code.wireshark.org/review/35558
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-02-07 04:39:05 +00:00
Martin Mathieson 26be041184 Add dissector for OBSAI UDPCP protocol
Change-Id: I6ca615207ca3a8f52f9886b2da74dcc6d5777987
Reviewed-on: https://code.wireshark.org/review/36036
Petri-Dish: Martin Mathieson <martin.r.mathieson@googlemail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-02-06 07:24:17 +00:00
Martin Mathieson 31effe3690 PDCP-LTE: Show name alone with Cipher number in more places
Change-Id: Ib6290b55b82b3d61b6612809f652299479157d82
Reviewed-on: https://code.wireshark.org/review/36035
Petri-Dish: Martin Mathieson <martin.r.mathieson@googlemail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Martin Mathieson <martin.r.mathieson@googlemail.com>
2020-02-05 10:58:48 +00:00
Roman-Koshelev 2580053638 TFTP: Rewritten object (file) export algorithm
Significantly increased readability of the code, speed of work
and reduced size of the consumed memory.
 - The number of memory allocations has been reduced from N to a few
 - Removed double (redundant) data copying

Change-Id: I05aed194932ed3305eefb6e2e0f847e57851c41c
Reviewed-on: https://code.wireshark.org/review/36026
Reviewed-by: Martin Mathieson <martin.r.mathieson@googlemail.com>
2020-02-05 10:24:36 +00:00
Richard Sharpe abe50bf237 eee802.11: Fix bug in previous SAE Anti-clogging support.
The code was not properly corrected and a confirm result would show
a malformed packet because two bytes were not accounted for.

Change-Id: Ibc2f14ec46b0d63401d8d3b3768b032ed9b12e56
Reviewed-on: https://code.wireshark.org/review/36028
Reviewed-by: Richard Sharpe <realrichardsharpe@gmail.com>
Petri-Dish: Richard Sharpe <realrichardsharpe@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-02-05 04:33:56 +00:00
Uli Heilmeier f5f435305b CFDP: Fix off-by-one offset
Reference: https://public.ccsds.org/Pubs/727x0b4.pdf (page 5-1).

Bug: 16361
Change-Id: I4544dc1c968c4c42dad82e11b00459cdbc85045f
Reviewed-on: https://code.wireshark.org/review/36021
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-02-04 04:15:32 +00:00
Richard Sharpe fcc90461fb ieee80211: More correctly handle EOSP vs bit-4 in QoS frames.
After feedback from the WFA and checking tables 9-3 and 9-6 in
IEEE802.11-2016 and testing this is more correct.

Change-Id: I26e65046610d887b2bcdac6caa8b4665eb2f6e20
Reviewed-on: https://code.wireshark.org/review/36018
Petri-Dish: Richard Sharpe <realrichardsharpe@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Richard Sharpe <realrichardsharpe@gmail.com>
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-02-03 19:53:52 +00:00
Richard Sharpe d5d8a3419e ieee80211: Add support for an SAE anti-clogging token handleing.
With SAE there is a need to handle the anti-clogging token.

Tested with test cases from WFA.

Change-Id: I5bad92677481bc45b7bd10b526aa6a44c200ce17
Reviewed-on: https://code.wireshark.org/review/36019
Reviewed-by: Richard Sharpe <realrichardsharpe@gmail.com>
Petri-Dish: Richard Sharpe <realrichardsharpe@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-02-03 19:53:29 +00:00
Roman Koshelev 37e74c9ceb TFTP: Transferred files may now be reassembled and dissected.
This allows higher-layer file or protocol dissectors to dissect the file
contents. Note that there are currently no dissectors that do this in-tree,
but an example of how to do this is at:
     https://github.com/Roman-Koshelev/Arinc-615a-Wireshark-Dissector.

Bug: 16069
Change-Id: I88236175128efd0f6d474218dd117f5b0ca1fae9
Reviewed-on: https://code.wireshark.org/review/35553
Petri-Dish: Martin Mathieson <martin.r.mathieson@googlemail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Martin Mathieson <martin.r.mathieson@googlemail.com>
2020-02-03 14:42:13 +00:00
Martin Mathieson d597655d25 RLC-NR: make dissector handle volatile to avoid compiler error (gcc 4.8.5)
Change-Id: Ib5f1a1125ee0f4a9e5eb78cb5c51041a34f691b4
Reviewed-on: https://code.wireshark.org/review/36017
Petri-Dish: Martin Mathieson <martin.r.mathieson@googlemail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Martin Mathieson <martin.r.mathieson@googlemail.com>
2020-02-03 14:27:39 +00:00
Darien Spencer e4094aeac6 NBAP: Actually set max mac-d pdu size flag
This completes the commit at: 2bd79c8208

Change-Id: I439ba64a248a66094c575a2629a5344c716f0f5c
Reviewed-on: https://code.wireshark.org/review/36015
Petri-Dish: Pascal Quantin <pascal@wireshark.org>
Tested-by: Petri Dish Buildbot
Reviewed-by: Pascal Quantin <pascal@wireshark.org>
2020-02-03 13:21:34 +00:00
Dr. Lars Völker 8c9efa5f1b ISAKMP: Critical flag should not be in proposals and transforms
IKEv2 added the critical flag to all payloads except payloads and
transforms. The dissection code just checked that it was looking at
IKEv1 but missed a check for proposals and transforms.

Bug: 16364
Change-Id: Ia9297af039fddf2da81f9712fdf7ac165fb2d86d
Signed-off-by: Dr. Lars Völker <lars.voelker@technica-engineering.de>
Reviewed-on: https://code.wireshark.org/review/36009
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-02-03 07:27:45 +00:00
Jason Cohen 7bbda13a72 f5ethtrailer: Whitespace / formatting changes only.
The formatting, tab/space indents, brace location, alignments,
binpacking etc... were wildly inconsistant in this file.  It
made it hard to update without introducing unintentded changes
and difficult to read.

I've cleaned up most of the whitespace inconsistancy.  I can't say this
is absolutelty complete, but should be the majority.  Some deviation
may occur in the intrest of readability, and I expect future changes to
favor readabilty as well.

As I'm starting a process to clean-up this dissector and improve on
remnants left over from its coversion to a built-in from a plug-in, I'm
starting with a whitespace-only commit that funcional changes can base
from.

Change-Id: I2eb0aca8860c2e91daf103b760461b928873a92b
Reviewed-on: https://code.wireshark.org/review/36003
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-02-02 09:21:54 +00:00
Pascal Quantin 90ffb0cdf8 RLC NR: call NR RRC dissector for TM payload
Now that the NR RRC dissector has all its logical channel dissectors
available, its time to call them.

Change-Id: I5f00552af49ef84d187da0c8a4f5850c7e7831fb
Reviewed-on: https://code.wireshark.org/review/36004
Petri-Dish: Pascal Quantin <pascal@wireshark.org>
Tested-by: Petri Dish Buildbot
Reviewed-by: Pascal Quantin <pascal@wireshark.org>
2020-02-02 08:44:17 +00:00
Peter Wu a2368cd124 QUIC: ignore invalid short header packet to fix decryption
The unencrypted padding after the client Initial Packet was interpreted
as a short header packet. At that point, the TLS dissector has not
encountered the Server Hello yet and was not able to provide decryption
secrets. The QUIC dissector wrongly assumed that decryption would never
be possible from that point on.

Add a comment to clarify why decryption was skipped, and avoid treating
the zero padding as Short Header (SH) packets to fix decryption.

Alternatively, the short header dissector could try to validate the DCID
in SH packets, but that might result in failure to dissect legitimate SH
packets when the handshake packets are missing.

Ping-Bug: 13881
Change-Id: Id20eb23c976226cb3ef78ac91f25a291f94dc805
Reviewed-on: https://code.wireshark.org/review/36000
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-02-02 07:28:21 +00:00
Pascal Quantin 4ef8ace610 PDCP NR: call NR RRC dissector for signalling payload
Now that the NR RRC dissector has all its logical channel dissectors
available, its time to call them.

Change-Id: Id59da5af1bca3654f3c5fca5c81ce664454d4f1e
Reviewed-on: https://code.wireshark.org/review/35999
Petri-Dish: Pascal Quantin <pascal@wireshark.org>
Tested-by: Petri Dish Buildbot
Reviewed-by: Pascal Quantin <pascal@wireshark.org>
2020-02-01 09:58:57 +00:00
Peter Wu 9e894cfbd8 QUIC: recognize Connection ID between 1 and 3 bytes
Since draft 22 the CID length ranges from 1 - 20 instead of 4 * 18.
Firefox 74.0a1 happened to send a SCID of 3 bytes which resulted in
failure to find the connection for short header packets.

Ping-Bug: 13881
Change-Id: Iacff6ea215fd27861d196bc831991be7e4450419
Reviewed-on: https://code.wireshark.org/review/35993
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-01-31 17:42:19 +00:00
Harald Welte 439621c4e5 gsm_abis_om2000: Name some more information elements
Change-Id: Ia7dc5d7da01fdbf98dd1a781f79b72a3895b0dd5
Reviewed-on: https://code.wireshark.org/review/35992
Petri-Dish: Pascal Quantin <pascal@wireshark.org>
Tested-by: Petri Dish Buildbot
Reviewed-by: Pascal Quantin <pascal@wireshark.org>
2020-01-31 15:34:03 +00:00
Stig Bjørlykke 468e6eb023 btle: Add Version 5.2 to ll_version_number_vals
Add control opcode values from 5.2 spec.

Change-Id: I64e91c09fc9fd2f28fa046efce349deb96de1678
Reviewed-on: https://code.wireshark.org/review/35991
Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org>
Tested-by: Petri Dish Buildbot
Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org>
2020-01-31 12:10:50 +00:00
Harald Welte 977fea0b9e gsm_abis_om2000: Name the 0x9e, 0x9f and 0xa0 information elements
Change-Id: I596a5cfa3a57b2396fb931910866fb4378494079
Reviewed-on: https://code.wireshark.org/review/35982
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Pascal Quantin <pascal@wireshark.org>
2020-01-31 09:15:33 +00:00
Harald Welte 716771255e gsm_abis_om2000: Dissect some more Information Elements
We don't yet know what they mean, but we can dissect their TLV
structure from protocol traces.

Change-Id: Ib532e52b686cfd56502de807a60873a9570e5372
Reviewed-on: https://code.wireshark.org/review/35981
Reviewed-by: Pascal Quantin <pascal@wireshark.org>
2020-01-31 09:15:27 +00:00
Harald Welte 3aee5c5054 gsm_abis_om2000: Real decoding of MCTR related Information Elements
So far, DEI 0xa8 .. 0xab has not been named nor interpreted. Now we
understand this part better (thanks to Sylvain Munaut), let's add
our knowledge to the wireshark dissector wit this patch.

Change-Id: If6d0927edc9dc9d038355466e2659b1206b81f1b
Reviewed-on: https://code.wireshark.org/review/35980
Reviewed-by: Pascal Quantin <pascal@wireshark.org>
2020-01-31 09:15:21 +00:00
Peter Wu 281edac5c0 TLS: do not dissect OCSP when disabled
The go test suite for crypto/tls produces a status_request extension
with "dummy ocsp" as extension data. That triggers a Malformed Packet
exception and breaks dissection of the following data.

Fix this by skipping OCSP dissection when disabled.

Change-Id: I9deb4385862503656e6ff316b36c2b55e6903279
Reviewed-on: https://code.wireshark.org/review/35989
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-01-31 08:52:47 +00:00
Roman Koshelev d3c704ce63 TFTP: Redesign conversation creation algorithm
In the old version, 1 conversation was used for all TFTP exchanges.
(provided that they had the same ip addresses and ports)

Change-Id: Ie19f8a36d1605fdfc66db3cc94a3206a31cd6515
Reviewed-on: https://code.wireshark.org/review/35476
Reviewed-by: Martin Mathieson <martin.r.mathieson@googlemail.com>
Petri-Dish: Martin Mathieson <martin.r.mathieson@googlemail.com>
Tested-by: Petri Dish Buildbot
2020-01-31 05:13:33 +00:00
Allan Møller Madsen 1592679ed8 Bluetooth HCI: Add support for Bluetooth v5.2
Dissection of all new HCI commands and events added in
the newly released Bluetooth specification version 5.2.
Bluetooth Device Dialog updated to also show ISO buffer
size and amount.

Change-Id: I3a459760cbe5f6c4f985621cee40dbbe5e473d39
Signed-off-by: Allan Møller Madsen <almomadk@gmail.com>
Reviewed-on: https://code.wireshark.org/review/35957
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-01-31 05:13:15 +00:00
Pascal Quantin 76ed59b756 Regenerate some ASN.1 dissectors after gd44c5e45cb
Change-Id: I1bfbc60d9b5c208b144f82948f3a6524aefd3c3b
Reviewed-on: https://code.wireshark.org/review/35990
Reviewed-by: Pascal Quantin <pascal@wireshark.org>
2020-01-30 21:29:47 +00:00
Alexis La Goutte 96ba92ea8d LLDP: Add ONOS Ether Type (0x8942)
Bug: 16227
Change-Id: I78b21823d7d639c51d897ce78dfeaeb0e78dae96
Reviewed-on: https://code.wireshark.org/review/35972
Reviewed-by: Jaap Keuter <jaap.keuter@xs4all.nl>
Petri-Dish: Jaap Keuter <jaap.keuter@xs4all.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-01-30 08:25:51 +00:00
Peter Wu aaad273ec1 pkcs1: recognize explicit curve parameters
Add support for explicit curve parameters according to RFC 3279. This
allows an exploitation attempt of CVE-2020-0601 to be detected through
the pkcs1.specifiedCurve_element filter name. Be aware though that the
certificate is encrypted in TLS 1.3, so a negative match does not imply
that no exploitation has happened.

While these definitions are technically not part of PKCS #1, the
PKIXAlgs module is part of the pkcs1 dissector for historical reasons.
It probably makes sense splitting it into a separate pkixalgs dissector,
but that would result in field name changes. Defer that for now.

Bug: 16340
Change-Id: Ia9d47a8337d6246f52983460580310b12e5709cf
Reviewed-on: https://code.wireshark.org/review/35986
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-01-30 05:52:02 +00:00
Peter Wu e0ca87cfb1 tls: update list of known CT logs to 2019-12-23
The old URL was gone and the JSON scheme has changed, so update the
generator accordingly.

Change-Id: I52ae27c7fc7dc0100e8abaa7b95b1769a7413bc6
Reviewed-on: https://code.wireshark.org/review/35983
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-01-29 15:50:19 +00:00
Alexis La Goutte 09dbf2c979 LLDP: Add ONOS TLV (Chassis, Port and TTL)
Based from https://github.com/opennetworkinglab/onos/blob/master/utils/misc/src/main/java/org/onlab/packet/LLDP.java

Bug: 16227
Change-Id: If35b7b9d6088caf7809f84b1569d7259421bc717
Reviewed-on: https://code.wireshark.org/review/35971
Reviewed-by: Jaap Keuter <jaap.keuter@xs4all.nl>
Petri-Dish: Jaap Keuter <jaap.keuter@xs4all.nl>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-01-29 14:17:39 +00:00
Peter Wu d24fbbc5a0 QUIC: add verification of Retry Integrity Tag (draft -25)
This could help diagnosing early implementation errors using
https://github.com/marten-seemann/quic-interop-runner

Tested with capture files based on sample provided by Marten Seemann:
1. Valid Retry packet should not add the "quic.bad_retry" field.
2. Mutated, invalid tag: "Retry Integrity Tag verification failure"
3. A missing Initial: "Cannot verify Retry Packet due to unknown ODCID"

As side-effect, the connection tracking code can now distinguish between
a connection where the server sent an empty SCID and a connection where
the server did not send an Initial.

Bug: 13881
Change-Id: I972acd680b1becc9fb7b9e002b400886a06bc828
Reviewed-on: https://code.wireshark.org/review/35978
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-01-29 06:05:00 +00:00
Kenneth Soerensen bbb1a794c5 ieee802154: Do not require correct FCS for ACK tracking
There is a good chance that the required information is still
valid even with a wrong FCS.

Change-Id: I244b2b4a857b7cefd1f4ef22eb151d5ac3ee4133
Reviewed-on: https://code.wireshark.org/review/35953
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-01-28 15:52:38 +00:00
Andre Luyer 139e4288d3 dhcp: DHCP option 77 User Class Option 'Microsoft bug'
The Microsoft 'variation' of RFC 3004 causes a '[Malformed Packet]' when the
"User Class Length" (dhcp.option.user_class.length) exceeds the total length
of the DHCP option 77 User Class Option (dhcp.option.length) because it is a
character and not a length field.
This stops the dissection of the rest of the DHCP packet, including the Vendor
class identifier when containing "MSFT 5.0" indicates the Microsoft variation.
A simple fix is to treat dhcp.option.user_class.length >= dhcp.option.length
as a non-conformant (text) option.
https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dhcpe/fe8a2dd4-1e8c-4546-bacd-4ae10de02058

Bug: 16349
Change-Id: Ia7b90302efd0b84eb508db35a3b246142bf66510
Reviewed-on: https://code.wireshark.org/review/35962
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-01-28 14:55:16 +00:00
Volodymyr Veskera b7802d76a8 Netflow: updated Niagara Networks decodes for RADIUS IPFIX IEs.
Change-Id: Id6176d8113d49fac2fcaef742537e456c8b5e302
Reviewed-on: https://code.wireshark.org/review/35977
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-01-28 14:54:14 +00:00
Anders Broman 0d4e81e7c7 EVS: Handle A.2.1.3 Special case for 56 bit payload size
The resulting ambiguity between EVS Primary 2.8 kbps and EVS AMR-WB IO
SID frames is resolved through the
most significant bit (MSB) of the first byte of the payload. By
definition, the first data bit d(0) of the EVS Primary 2.8
kbps is always set to 0. Therefore, if the MSB of the first
byte of the payload is set to 0 (see Figure A.2), then the
payload is an EVS Primary 2.8 kbps frame in Compact format. Otherwise it
is an EVS AMR-WB IO SID frame in
Header-Full format with one CMR byte.

Change-Id: I16733698e49ea3651f775b774b59569cfa1c89a1
Reviewed-on: https://code.wireshark.org/review/35976
Petri-Dish: Anders Broman <a.broman58@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-01-28 12:51:41 +00:00
Alexis La Goutte ddc03b8c87 QUIC: Need to remove Retry Integry Tag to Retry Token Length
Issue found by Marten Seemann (on QUIC Slack)

Change-Id: I4b50bae48373758253f21b371025d87d901c0a1d
Ping-Bug: 13881
Reviewed-on: https://code.wireshark.org/review/35973
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-01-28 10:33:21 +00:00
Alexis La Goutte a24231bc90 amqp: fix wrong bitmask (v2)
Bug: 16338
Change-Id: I745087b7816b8d2f710ec719eea0de63dd46d384
Reviewed-on: https://code.wireshark.org/review/35906
Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
Tested-by: Petri Dish Buildbot
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-01-28 07:16:31 +00:00
Peter Wu 6e6831fbd3 QUIC: update Retry Packet and comments, rename idle_timeout (draft -25)
Final changes for draft -25:
* Update Retry Packet dissection.
* Rename idle_timeout to max_idle_timeout and remove the
  TransportParameterId enum that was removed in the spec. Originally the
  spec changed it into a varint, but this was reverted to uint16 before
  the draft was released. To keep the description short, the original
  TLS-style formatting was maintained instead of using ASCII art.

Change-Id: Id72df59de128ab5028727abbbb01c585ec284809
Bug: 13881
Reviewed-on: https://code.wireshark.org/review/35963
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-01-28 04:03:28 +00:00
Harald Welte a042c11567 gsm_abis_om2000: Add some more observed message types + IEIs
OM2000 is not only used for the venerable RBS2000 family, but also
for the more modern RBS6000 family, specifically the DUG 20 GSM
baseband unit.

In RBS6000, there are some protocol extensions which are not yet fully
understood. However, we are understanding some bits around the MCTR
(multi carrier transceiver?), a new MO that appears to be present for
every physical RUS (Radio Unit) attached to the DUG 20.

Let's add what the Osmocom developers have learned so far.

Change-Id: I8027160611a9c33f86945aaa61d9aa1178c3e87c
Reviewed-on: https://code.wireshark.org/review/35960
Reviewed-by: Pascal Quantin <pascal@wireshark.org>
Petri-Dish: Pascal Quantin <pascal@wireshark.org>
Tested-by: Petri Dish Buildbot
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
2020-01-27 21:33:57 +00:00
Jakub Adam c7281ca42c mp4: dissect Chunk Offset Box (stco)
Change-Id: I138ff276e7b095f42325bc10e730f624b4bbd1ef
Reviewed-on: https://code.wireshark.org/review/35939
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-01-27 18:46:04 +00:00
Jakub Adam 8228b0bc0f mp4: dissect Sample To Chunk Box (stsc)
Change-Id: I14c349f1a9811355f6f41c4518bc6161d2d6cca0
Reviewed-on: https://code.wireshark.org/review/35938
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-01-27 18:45:30 +00:00
Jakub Adam 3351effd06 mp4: improve Sample Size Box (stsz) dissection
* Describe what sample size == 0 means.
* Show an index next to each table entry.
* Table indices start from 1 according to the specification.

Change-Id: I106188051e6618c3b85fa4945facfe4fedd1987b
Reviewed-on: https://code.wireshark.org/review/35937
Reviewed-by: Anders Broman <a.broman58@gmail.com>
2020-01-27 18:45:00 +00:00