Wireshark-bugs: [Wireshark-bugs] [Bug 11802] IP "next protocol" value of 80 needs to support enc
Date: Sat, 05 Dec 2015 09:22:22 +0000
Comment # 3
on bug 11802
from Guy Harris
(In reply to boaz.brickner from comment #2) > Thanks! > > I guess what's missing from my point of view is something in Wireshark that > indicates how it parses the 0xcc (the byte right after the IPv6 header and > before the IPv4 header). According to RFC 1070, with a Next Header value of 80, the byte right after the IPv6 header is parsed as the beginning of an OSI Network Layer packet, which means it's parsed as an "initial protocol identifier" to specify the *particular* OSI Network Layer protocol for that Network Layer packet. Wireshark on the master branch, at least, is parsing it as exactly that: Frame 1: 175 bytes on wire (1400 bits), 175 bytes captured (1400 bits) Encapsulation type: Ethernet (1) Arrival Time: Mar 26, 2082 17:21:46.-920941000 PST [Expert Info (Note/Sequence): Arrival Time: Fractional second -920941000 is invalid, the valid range is 0-1000000000] [Arrival Time: Fractional second -920941000 is invalid, the valid range is 0-1000000000] [Severity level: Note] [Group: Sequence] [Time shift for this packet: 0.000000000 seconds] Epoch Time: -753167190.920941000 seconds [Time delta from previous captured frame: 0.000000000 seconds] [Time delta from previous displayed frame: 0.000000000 seconds] [Time since reference or first frame: 0.000000000 seconds] Frame Number: 1 Frame Length: 175 bytes (1400 bits) Capture Length: 175 bytes (1400 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ipv6:ah:osi:ip] Ethernet II, Src: ae:b4:6d:20:a3:f9, Dst: d4:b8:d9:78:89:72 Destination: d4:b8:d9:78:89:72 Address: d4:b8:d9:78:89:72 .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default) .... ...0 .... .... .... .... = IG bit: Individual address (unicast) Source: ae:b4:6d:20:a3:f9 Address: ae:b4:6d:20:a3:f9 .... ..1. .... .... .... .... = LG bit: Locally administered address (this is NOT the factory default) .... ...0 .... .... .... .... = IG bit: Individual address (unicast) Type: IPv6 (0x86dd) Internet Protocol Version 6, Src: a099:40af:d129:a115:77ab:ca42:ef59:d77c, Dst: 712:cef7:bda3:ce48:e700:21cb:4b9a:5ad7 0110 .... = Version: 6 .... 1010 1111 .... .... .... .... .... = Traffic class: 0xaf (DSCP: Unknown, ECN: CE) .... 1010 11.. .... .... .... .... .... = Differentiated Services Codepoint: Unknown (43) .... .... ..11 .... .... .... .... .... = Explicit Congestion Notification: Congestion Experienced (3) .... .... .... 0011 1001 1110 0010 0100 = Flowlabel: 0x00039e24 Payload length: 121 Next header: Authentication Header (51) Hop limit: 41 Source: a099:40af:d129:a115:77ab:ca42:ef59:d77c Destination: 712:cef7:bda3:ce48:e700:21cb:4b9a:5ad7 [Source GeoIP: Unknown] [Destination GeoIP: Unknown] Authentication Header Next header: ISO Internet Protocol (0x50) Length: 0x30 AH SPI: 0x2bf88d54 AH Sequence: 826361051 AH ICV: 23ecf7b5b3f27b5b0dc851dde141fd8a5e00248b62831f16... >>>>> Network Layer Protocol Identifier: IP (0xcc) <<<<< Internet Protocol, bogus version (14) 1110 .... = Version: 14 [Expert Info (Error/Protocol): Bogus IP version] [Bogus IP version] [Severity level: Error] [Group: Protocol] as per the line I marked with ">>>>>" and "<<<<<". > From Wireshark, it seems to be ignored even though it's actually being > treated. Not in the master version of Wireshark, it's not; it's being treated as a Network Layer Protocol Identifier. A value of 0xcc means that what *follows* the 0xcc is an IP packet. > Maybe something like "ISO header" part, which says that the 0xcc is > categorized as expecting IPv4 header to follow Yes, that's exactly what's happening. 0xcc is a non-standard Network Layer Protocol Identifier that is, nevertheless, acknowledged by ISO 9577 as being "in widespread use" for "RFC 791", i.e. for IPv4.
You are receiving this mail because:
- You are watching all bug changes.
- Prev by Date: [Wireshark-bugs] [Bug 11802] IP "next protocol" value of 80 needs to support encapsulations other than RFC 1070
- Next by Date: [Wireshark-bugs] [Bug 10627] IPv6 Mobility Header Link-Layer Address Mobility Option is parsed incorrectly
- Previous by thread: [Wireshark-bugs] [Bug 11802] IP "next protocol" value of 80 needs to support encapsulations other than RFC 1070
- Next by thread: [Wireshark-bugs] [Bug 10627] IPv6 Mobility Header Link-Layer Address Mobility Option is parsed incorrectly
- Index(es):