Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Ethereal-dev: Re: [Ethereal-dev] RTP analysis. Same SSRC for several streams causes problems

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

From: Miha Jemec <m.jemec@xxxxxxxxxxx>
Date: Tue, 11 Mar 2003 08:08:05 +0100
Hi!

Well, the IP checking can be included as well. Till know I didn't do it because I thought that possibility that two different RTP streams would have the same SSRC values is rather small. But there will remain some exceptions even with IP checking, that can still cause problems: if you act as a router or do the middle in the man attack and you receive and resend the packets on the same interface. In this case for each packet received you will send another one with same SSRC, IP and port values. In this case you still get the wrong sequence number error. The solution here would be to add the MAC checking. But even with this one there are some exceptions possible. In such cases the user can react with the display filter.

Maybe it is smart to include the IP checking so I will add it.

I'll try to do it together with modifications that Tomas proposed and would check if the RTP frame has extra padding bits, extension field or CSRC field and to extract the RTP data even in this case. I hope tomorrow will this fix be ready.

Regards, Miha

Martin Regner wrote:

Hi,

I got some strange result when using RTP Analysis on one capture file with several different RTP streams
between different ip-addresses. The RTP Analysis complained about wrong sequence numbers.
When I looked closer I noticed that when there are more than one RTP streams using the same SSRC value then the RTP Analysis will handle all RTP packets with that SSRC value as belonging to the same RTP stream. I think that there should be a check not just for SSRC value but also source address, destination address, source
port number and destination port number to identify what packets are belonging to the same stream.

I have enclosed a sample that I prepared with text2pcap to illustrate the current behaviour.

   No. Bytes  Time        Source                S_port Destination           D_port Protocol Info
     1 94     0.000000    10.10.10.10           20480  10.10.10.11           16384  RTP      Payload type=ITU-T G.729, SSRC=2864447487, Seq=637, Time=278800, Mark
     2 94     0.000000    10.10.10.12           20736  10.10.10.13           16640  RTP      Payload type=ITU-T G.729, SSRC=2864447487, Seq=1022, Time=278800, Mark
     3 94     0.000000    10.10.10.10           20480  10.10.10.11           16384  RTP      Payload type=ITU-T G.729, SSRC=2864447487, Seq=638, Time=278800, Mark
     4 94     0.000000    10.10.10.13           16640  10.10.10.12           20736  RTP      Payload type=ITU-T G.729, SSRC=2864434397, Seq=2047, Time=278800, Mark
     5 94     0.000000    10.10.10.10           20480  10.10.10.11           16384  RTP      Payload type=ITU-T G.729, SSRC=2864447487, Seq=639, Time=278800, Mark
     6 94     0.000000    10.10.10.10           20480  10.10.10.11           16384  RTP      Payload type=ITU-T G.729, SSRC=2864447487, Seq=640, Time=278800, Mark
     7 94     0.000000    10.10.10.12           20736  10.10.10.13           16640  RTP      Payload type=ITU-T G.729, SSRC=2864447487, Seq=1024, Time=278800, Mark

When I mark packet 1 and use RTP analysis then I will get packet 1, 2, 3, 5, 6 and 7 in forward direction and none i backward
direction, but actually these packets are belonging to two different streams 10.10.10.10:20480-->10.10.10.11:16384 (packet 1, 3, 5 and 6) respectively 10.10.10.12:20736-->10.10.10.13:16640 (packet 2 and 7).

When I mark packet 2 and use RTP analysis then I wil get packet 1, 2, 3, 5, 6 and 7 in forward direction and packet 4 in backward direction.
When I mark packet 3 and use RTP analysis then I will get packet 4 in forward direction and 1, 2, 3, 5, 6 and 7 in backward direction.

I also noticed that the first packet does not have "Marker = SET" in RTP Analysis even if marker bit really is set in that packet.