Wireshark-bugs: [Wireshark-bugs] [Bug 8473] New: Fixes for ISO/IEC 14443-A UID dissection/handli
Bug ID |
8473
|
Summary |
Fixes for ISO/IEC 14443-A UID dissection/handling in PN532 InListPassiveTarget Response packets
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
SVN
|
Hardware |
All
|
OS |
All
|
Status |
UNCONFIRMED
|
Severity |
Enhancement
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
bugzilla-admin@wireshark.org
|
Reporter |
tyson.key@gmail.com
|
Created attachment 10265 [details]
A trace file containing InListPassiveTarget Response packets from a PN532-based
reader, against a number of different tokens
Build Information:
Version 1.9.1-SVN-48239 (SVN Rev Unknown from unknown)
Copyright 1998-2013 Gerald Combs <gerald@wireshark.org> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GTK+ 2.24.13, with Cairo 1.12.2, with Pango 1.30.1, with
GLib 2.34.1, with libpcap, with libz 1.2.7, without POSIX capabilities, with
libnl 1, without SMI, without c-ares, without ADNS, without Lua, without
Python,
without GnuTLS, with Gcrypt 1.5.0, without Kerberos, without GeoIP, without
PortAudio, without AirPcap.
Running on Linux 3.5.0-25-generic, with locale en_GB.UTF-8, with libpcap
version
1.3.0, with libz 1.2.7, Gcrypt 1.5.0.
Built using gcc 4.7.2.
Wireshark is Open Source Software released under the GNU General Public
License.
Check the man page and http://www.wireshark.org for more information.
--
I have just finished slightly refactoring part of the PN532 dissector's with
InListPassiveTarget Response handler, to resolve some issues where ISO 14443-A
UIDs of various lengths in the aforementioned packet types are incorrectly
dissected.
The patch that I'm about to attach also introduces basic support for
identifying, and dissecting InListPassiveTarget Responses from cards/tokens
with variable-length Answer To Select (ATS) payloads, such as contactless EMV
payment smartcards.
I've successfully tested this code with a VISA PayWave card, two MasterCard
PayPass cards, some MiFare UltraLight tokens, and a MiFare Classic card; and I
believe that these changes shouldn't introduce any regressions in dissection of
responses from FeliCa, or ISO 14443-B cards.
You are receiving this mail because:
- You are watching all bug changes.