| Bug ID | 10841 | 
        
          | Summary | Enhance TCAP session matching | 
        
          | Product | Wireshark | 
        
          | Version | Git | 
        
          | Hardware | x86 | 
        
          | OS | Mac OS X 10.9 | 
        
          | Status | UNCONFIRMED | 
        
          | Severity | Major | 
        
          | Priority | Low | 
        
          | Component | Dissection engine (libwireshark) | 
        
          | Assignee | bugzilla-admin@wireshark.org | 
        
          | Reporter | lukem-wireshark@mewburn.net | 
      
        
        Created attachment 13379 [details]
tcap-confirm-forwardsm.erf
Build Information:
TShark (Wireshark) 1.99.2 (v1.99.2rc0-536-g5d610b5 from master)
Copyright 1998-2015 Gerald Combs <gerald@wireshark.org> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with libpcap, without POSIX capabilities, with libz 1.2.5,
with GLib 2.42.1, with SMI 0.4.8, with c-ares 1.10.0, without Lua, with GnuTLS
3.3.11, with Gcrypt 1.6.2, with MIT Kerberos, without GeoIP.
Running on Mac OS X 10.10.1, build 14B25 (Darwin 14.0.0), with locale
C/en_US.UTF-8/en_US.UTF-8/en_US.UTF-8/en_US.UTF-8/en_US.UTF-8, with libpcap
version 1.5.3 - Apple version 47, with libz 1.2.5, with GnuTLS 3.3.11, with
Gcrypt 1.6.2.
Intel(R) Core(TM) i7-4650U CPU @ 1.70GHz (with SSE4.2)
Built using clang 4.2.1 Compatible Apple LLVM 6.0 (clang-600.0.54).
--
TCAP session matching doesn't cope with TCAP dialogue confirmation.
See ITU-T Q.771 (06/97) clause 3.1.2.2.2.2 "Confirmation of the dialogue" for
more details.
This is because the current implementation uses the destination address for
TCAP BEGIN matching (tcaphash_begin_info_key_t.dpc_hash), and origin address
for TCAP END matching (tcaphash_end_info_key_t.opc_hash).
When TCAP sessions (transactions) aren't correctly matched, then higher level
dissectors can mistakenly decode packets part-way through the session because
of assumptions about protocol versions (etc).
There are other Wireshark bugs in TCAP (and higher layer) that may be fixed by
addressing this.
I'll attach a sanitised ERF test containing an mo-forwardSM SMS over 4 packets.
The preference  erf.hdlc_type:SS7 MTP2   must be set to process the ERF as
erf:mtp2:mtp3:sccp:tcap ...
In order to exercise the session matching, the following options were used with
tshark:
   -o 'erf.hdlc_type:SS7 MTP2' -o sccp.set_addresses:TRUE -o tcap.srt:TRUE -o
tcap.persistentsrt:TRUE
The existing behaviour doesn't correctly decode the IMSI in packet 3 because
the Application Context isn't known at that point (it's in the dialogue setup
in packets 1 & 2 as "shortMsgMO-RelayContext-v3").
The packets past the first don't display a TCAP [Session ID:] either.
         
      
      
      You are receiving this mail because:
      
      
          - You are watching all bug changes.