wireshark/wiretap
Gilbert Ramirez 558e714449 Add a module to wiretap to be able to read trace files from Toshiba's
line of ISDN routers. Much like the ascend reader, this module reads an
ASCII hex dump of trace data.

Rearranged the order in which wiretap tries trace files, to keep the
ASCII-readers (ascend and toshiba) at the end, and put the binary-readers
(everything else) at the front of the list. If a telnet session of
and ascend trace or toshiba trace were captured near the beginning of
another trace, wiretap might think the trace was ascend or toshiba if it
tried that module first.

Fixed the way wtap_seek_read() selects functions to call. It was using
the encap type instead of the file type. We got lucky because
WTAP_ENCAP_ASCEND == WTAP_FILE_ASCEND

svn path=/trunk/; revision=952
1999-10-31 17:46:11 +00:00
..
.cvsignore avoid mistakingly commit dynamically generated files, like "Makefile". 1999-10-15 04:40:28 +00:00
AUTHORS Add a module to wiretap to be able to read trace files from Toshiba's 1999-10-31 17:46:11 +00:00
COPYING I added the LANalzyer file format to wiretap. I cleaned up some code in the 1998-11-12 06:01:27 +00:00
ChangeLog Created a new protocol tree implementation and a new display filter 1999-07-07 22:52:57 +00:00
INSTALL A lengthy patch to add the wiretap library. Wiretap is not used by default 1998-11-12 00:06:47 +00:00
Makefile Added support for Lucent/Ascend packet traces. The MAX and Pipeline router 1999-09-11 04:50:44 +00:00
Makefile.am Add a module to wiretap to be able to read trace files from Toshiba's 1999-10-31 17:46:11 +00:00
Makefile.nmake Changes to compile in win32. 1999-08-18 22:49:48 +00:00
NEWS A lengthy patch to add the wiretap library. Wiretap is not used by default 1998-11-12 00:06:47 +00:00
README Add a module to wiretap to be able to read trace files from Toshiba's 1999-10-31 17:46:11 +00:00
acconfig.h Give it a copyright notice and RCS ID. 1999-10-06 03:38:37 +00:00
acinclude.m4 This commit contains support for reading capture files compressed using 1999-09-22 01:26:50 +00:00
ascend-grammar.y Include <time.h> to get "struct tm" declared. 1999-10-27 17:07:08 +00:00
ascend-int.h The #defines to turn "yy{lex,error}" into names specific to the 1999-10-10 18:16:43 +00:00
ascend-scanner.l Add an "ascend-int.h" file, to declare routines used by more than one of 1999-10-08 07:41:33 +00:00
ascend.c Change ASCEND_MAX_SEEK from 1000000 to 100000, so as not to excessively slow 1999-10-28 01:42:43 +00:00
ascend.h Move some definitions of stuff not used outside the Lucent/Ascend 1999-10-08 07:45:31 +00:00
buffer.c Changed #include "glib.h" to #include <glib.h>, for stylistic reasons. 1999-08-24 17:36:24 +00:00
buffer.h Some old CPP or tools that take C code in input do 1999-09-12 14:34:36 +00:00
config.h.win32 Added support for compiling on win32 with Visual C and 'nmake'. It compiles, 1999-07-13 02:53:26 +00:00
configure.in implement ipprotostr() in ipproto.c, which basically does ipprotobynumber() 1999-10-14 03:50:51 +00:00
file.c Add a module to wiretap to be able to read trace files from Toshiba's 1999-10-31 17:46:11 +00:00
file.h Add a module to wiretap to be able to read trace files from Toshiba's 1999-10-31 17:46:11 +00:00
iptrace.c Whitespace cleanup. 1999-10-06 03:30:21 +00:00
iptrace.h Have the per-capture-file-type open routines "wtap_open_offline()" calls 1999-08-19 05:31:38 +00:00
lanalyzer.c Better handle errors from zlib: 1999-10-05 07:06:08 +00:00
lanalyzer.h Have the per-capture-file-type open routines "wtap_open_offline()" calls 1999-08-19 05:31:38 +00:00
libpcap.c Better handle errors from zlib: 1999-10-05 07:06:08 +00:00
libpcap.h Have the per-capture-file-type open routines "wtap_open_offline()" calls 1999-08-19 05:31:38 +00:00
netmon.c Better handle errors from zlib: 1999-10-05 07:06:08 +00:00
netmon.h Have the per-capture-file-type open routines "wtap_open_offline()" calls 1999-08-19 05:31:38 +00:00
nettl.c Olivier Abad's patches to add: 1999-10-18 01:51:34 +00:00
nettl.h Olivier Abad's patches to add: 1999-10-18 01:51:34 +00:00
netxray.c Better handle errors from zlib: 1999-10-05 07:06:08 +00:00
netxray.h Have the per-capture-file-type open routines "wtap_open_offline()" calls 1999-08-19 05:31:38 +00:00
ngsniffer.c Better handle errors from zlib: 1999-10-05 07:06:08 +00:00
ngsniffer.h Have the per-capture-file-type open routines "wtap_open_offline()" calls 1999-08-19 05:52:55 +00:00
radcom.c Better handle errors from zlib: 1999-10-05 07:06:08 +00:00
radcom.h Give it an RCS ID. 1999-09-23 05:26:18 +00:00
snoop.c Better handle errors from zlib: 1999-10-05 07:06:08 +00:00
snoop.h Have the per-capture-file-type open routines "wtap_open_offline()" calls 1999-08-19 05:31:38 +00:00
toshiba.c Add a module to wiretap to be able to read trace files from Toshiba's 1999-10-31 17:46:11 +00:00
toshiba.h Add a module to wiretap to be able to read trace files from Toshiba's 1999-10-31 17:46:11 +00:00
wtap.c Add a module to wiretap to be able to read trace files from Toshiba's 1999-10-31 17:46:11 +00:00
wtap.h Add a module to wiretap to be able to read trace files from Toshiba's 1999-10-31 17:46:11 +00:00

README

$Id: README,v 1.17 1999/10/31 17:46:05 gram Exp $

Wiretap is a library that is being developed as a future replacement for
libpcap, the current standard Unix library for packet capturing. Libpcap is
great in that it is very platform independent and has a wonderful BPF
optimizing engine. But it has some shortcomings as well. These shortcomings
came to a head during the development of Ethereal (http://ethereal.zing.org),
a packet analyzer. As such, I began developing wiretap so that:

1. The library can easily be amended with new packet filtering objects.
Libpcap is very TCP/IP-oriented. I want to filter on IPX objects, SNA objects,
etc. I also want any decent programmer to be able to add new filters to the
library.

2. The library can read file formats from many packet-capturing utilities.
Libpcap only reads Libpcap files.

3. The library can capture on more than one network interface at a time, and
save this trace in one file.

4. Network names can be resolved immediately after a trace and saved in the
trace file. That way, I can ship a trace of my firewall-protected network to a
colleague, and he'll see the proper hostnames for the IP addresses in the
packet capture, even though he doesn't have access to the DNS server behind my
LAN's firewall.

5. I want to look into the possibility of compressing packet data when saved
to a file, like Sniffer.

6. The packet-filter can be optimized for the host OS. Not all OSes have BPF;
SunOS has NIT and Solaris has DLPI, which both use the CMU/Stanford
packet-filter pseudomachine. RMON has another type of packet-filter syntax
which we could support.

Wiretap is very good at reading many file formats, as per #2
above. Wiretap has no filter capability at present; it currently doesn't
support packet capture, so it wouldn't be useful there, and filtering
when reading a capture file is done by Ethereal, using a more powerful
filtering mechanism than that provided by BPF.


File Formats
============

Libpcap
-------
The "libpcap" file format was determined by reading the "libpcap" code;
wiretap reads the "libpcap" file format with its own code, rather than
using the "libpcap" library's code to read it.

Sniffer (uncompressed)
-------
The Sniffer format is documented in the Sniffer manual.  Unfortunately,
Sniffer manuals tend to document only the format for the Sniffer model
they document. Token-Ring and ethernet seems to work well, though.
If you have an ATM Sniffer file, both Guy and Gilbert would be *very*
interested in receiving a sample. (see 'AUTHORS' file for our e-mail
addresses).

LANalyzer
---------
The LANalyzer format is available from http://www.novell.com. Search their
knowledge base for "Trace File Format". 

Network Monitor
---------------
Microsoft's Network Monitor file format is supported, at least under Ethernet
and token-ring. If you have capture files of other datalink types, please send
them to Guy.

"snoop"
-------
The Solaris 2.x "snoop" program's format is documented in RFC 1761.

"iptrace"
---------
This is the capture program that comes with AIX 3.x and 4.x.  Right now
wiretap only supports iptrace 2.0 (AIX4) because I don't have access to
an AIX3 machine.  iptrace has an undocumented, yet very simple, file
format.  The interesting thing about iptrace is that it will record
packets coming in from all network interfaces; a single iptrace file can
contain multiple datalink types.  I have tested iptrace on ethernet and
token-ring; if you can provide an iptrace file with any other datalink
type, I would appreciate a copy.  (with the output from 'ipreport' too,
if possible).

Sniffer Basic (NetXRay)/Windows Sniffer Pro
-------------------------------------------
Network Associates' Sniffer Basic (formerly NetXRay from Cinco Networks)
file format is now supported, at least for Ethernet and token-ring. 
Network Associates' Windows Sniffer Pro appears to use a variant of that
format; it's supported to the same extent.

RADCOM WAN/LAN Analyzers
------------------------
Olivier Abad has added code to read Ethernet and LAPB captures from
RADCOM WAN/LAN Analyzers (see http://www.radcom-inc.com/).

Lucent/Ascend access products
-----------------------------
Gerald

HP-UX nettl
-----------
Olivier

Toshiba ISDN Router
-------------------
An under-documented command that the router supports in a telnet session is "snoop".
If you give it the "dump" option, you'll get a hex dump of all packets across the
router (except of your own telnet session -- good thinking Toshiba!). You can
select a certain channel to sniff (LAN, B1, B2, D), but the default is all channels.
You save this hex dump to disk with 'script' or by 'telnet | tee'. Wiretap will
read the ASCII hex dump and convert it to binary data.

Gilbert Ramirez <gram@xiexie.org>
Guy Harris <guy@netapp.com>