Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

why is Wireshark plugin locked to port 13000 #1

Open
gmabey opened this issue Feb 15, 2022 · 3 comments
Open

why is Wireshark plugin locked to port 13000 #1

gmabey opened this issue Feb 15, 2022 · 3 comments
Assignees
Labels
enhancement New feature or request question Further information is requested

Comments

@gmabey
Copy link

gmabey commented Feb 15, 2022

Hello,

I'm pretty new to Wireshark dissectors, but I thought that a dissector could match packets on their content, not just the port number that they are headed to.

So, I'm very surprised to find this line:

dissector_add_uint("udp.port", 13000, vrtgen_handle);

which seems to only match packets headed to port 13000. Isn't there a better way to do this?

Thank you for publishing this utility :-)

@shmahon shmahon closed this as completed Feb 16, 2022
@shmahon
Copy link

shmahon commented Feb 16, 2022

Oops. Sorry. Was about to post a URL reference and fat fingered the close. I’ll ask one of the developers to respond in the morning. Reopening the question.

@shmahon shmahon reopened this Feb 16, 2022
@gmabey
Copy link
Author

gmabey commented Feb 16, 2022

Here's a refinement of this request/suggestion. I've found that is is possible to modify this particular parameter for the stock VITA49 dissector. I guess what I really want is to be able to set it without recompiling the .so ..
screen16
screen17
.

@shmahon shmahon added enhancement New feature or request question Further information is requested labels Feb 16, 2022
@jalbright-geon
Copy link
Collaborator

We don't mind adding the preferences API call to a future release of the dissector and that seems like an easy lift to modify the API call. We also like the idea of turning the plugin into a heuristic dissector, but again that would be a future enhancement. However, the plugin does not currently prevent you from listening to traffic on a different port. You can use this to decode incoming packets using a specific dissector - https://www.wireshark.org/docs/wsug_html_chunked/ChCustProtocolDissectionSection.html#:~:text=Decode%20As%20is%20accessed%20by,Decode%20As%E2%80%9D%20dialog%20box%E2%80%9D.&text=In%20this%20dialog%20you%20are,edit%20buttons%20on%20the%20left. Hope this helps and allows you to not have to continue recompiling the plugin.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request question Further information is requested
Projects
None yet
Development

No branches or pull requests

3 participants