Wireshark-bugs: [Wireshark-bugs] [Bug 3033] many zero edonkey layers for tcp(port: 4582, 4662)
Michael Mann
changed
bug 3033
What |
Removed |
Added |
CC |
|
mmann78@netscape.net
|
Comment # 3
on bug 3033
from Michael Mann
(In reply to comment #2)
> Seems like eDonkey would be better suited as a heuristic dissector than
> blatantly steal ports from the registered protocols of kar2ouche, oms,
> noteit, contclientms and rfa. Also, eDonkey makes use of
> tcp_dissect_pdus(), so what's this "continuation data"? Shouldn't
> dissect_edonkey_tcp_pdu() get called only when all the data is present and
> reassembled by TCP? I'm not familiar enough with eDonkey to confidently go
> any further with it; just posing some questions for someone who might be.
In looking at the eDonkey/eMule documentation I can find, it appears that it
doesn't have a strong enough hueristic to really work, just a single "magic
byte". If it were a "magic guint32", than I would feel more comfortable with
the heuristic approach.
Looking at the IANA port list, I suspect kar2ouche to be the Kademlia2
extention of eDonkey. Based on what eDonkey is intended for, I wouldn't be
surprised if the other "Message Service" ports used it. However, I would be
perfectly happy with eDonkey just supporting a preference range of ports
(defaulting to 0)
It looks like the "continuation data" was in there from the beginning and
should have been removed when tcp_dissect_pdus() was added.
You are receiving this mail because:
- You are the assignee for the bug.
- You are watching all bug changes.