Wireshark-bugs: [Wireshark-bugs] [Bug 8616] New: Update Skinny Dissection Code (CM7.1 + / SPCP M
Date: Tue, 30 Apr 2013 11:14:16 +0000
Bug ID 8616
Summary Update Skinny Dissection Code (CM7.1 + / SPCP Message)
Classification Unclassified
Product Wireshark
Version SVN
Hardware All
OS All
Status UNCONFIRMED
Severity Enhancement
Priority Low
Component Dissection engine (libwireshark)
Assignee bugzilla-admin@wireshark.org
Reporter dkgroot@talon.nl

Created attachment 10692 [details]
skinny_protocol_update.diff against git revision
108a75a603e0682ead3eed90e1054a36fbaea8ad

Build Information:
Important: Switched of returning 'FALSE' in dissect_skinny (line 3260) to make
this patch work. This is not correct, but i could not find the solution to make
this work correctly. 

BTW: I am a member of the chan-sccp-b development team, the other members have
been informed of this patch being send to you guys.

How can we improve the cooperation between our teams in dissecting the SCCP
protocol in the future. Maybe using a single protocol specification format like
other projects (DCE-RPC / Samba / NFS), from which the dissection code can be
generated automatically for example.
--
Patch against git revision: 108a75a603e0682ead3eed90e1054a36fbaea8ad
(svn revision: 49095)

Added support for newer SCCP & SPCP Protocol Messages (Used by Linksys SPA and
Cisco 89XX models).
New header_version : CM7_MSG_TYPE_D

Replaced / Added new messages (Several of these message have been identified
but their use has not become clear (yet), they have been added as Unknown
Messages)
Incoming:
0x0044 : Unknown Message 0x0044
0x0049 : Accessory Status Message
0x004A : Unknown Message 0x004A
0x004C : MwiNotificationMessage
0x8000 : SPCPRegisterTokenRequest

Outgoing:
0x0140 : VideoDisplayCommandMessage
0x0141 : Unknown Message 0x0141
0x0143 : DynDisplayNotifyMessage
0x0144 : DynDisplayPriNotifyMessage
0x0145 : DynDisplayPromptStatusMessage
0x0146 : DynFeatureStatMessage
0x0147 : DynLineStatMessage
0x0148 : DynServiceURLStatMessage
0x0149 : DynSpeedDialStatMessage
0x014A : DynCallInfoMessage
0x0153 : CallListStateUpdate
0x0154 : StartMediaTransmissionAck
0x0155 : StartMultiMediaTransmissionAck
0x0156 : CallHistoryInfoMessage
0x0159 : ExtensionDeviceCaps
0x015A : XMLAlarmMessage
0x015E : Unknown_Message_0x015E
0x8100 : SPCPRegisterTokenAck
0x8101 : SPCPRegisterTokenReject

Added several device_types for the different Cisco/Nokia/Linksys Phone Types.

Important: Switched of returning 'FALSE' in dissect_skinny (line 3260) to make
this patch work. This is not correct, but i could not find the solution to make
this work correctly. 

I am a member of the chan-sccp-b development team, the other members have been
informed of this patch being send to you guys.

How can we improve the cooperation between our teams in dissecting the SCCP
protocol in the future. Maybe using a single protocol specification format like
other projects (DCE-RPC / Samba / NFS), from which the dissection code can be
generated automatically for example.

Regards,

Diederik de Groot


You are receiving this mail because:
  • You are watching all bug changes.