ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 6122] New: Malformed Packet in decode for BGP-AD update

Date: Thu, 14 Jul 2011 08:55:39 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6122

           Summary: Malformed Packet in decode for BGP-AD update
           Product: Wireshark
           Version: 1.6.0
          Platform: x86
        OS/Version: Windows XP
            Status: NEW
          Severity: Major
          Priority: Low
         Component: Wireshark
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: ryan.hoffman@xxxxxxxxx


Build Information:
Version 1.6.0 (SVN Rev 37592 from /trunk-1.6)

Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (32-bit) with GTK+ 2.22.1, with GLib 2.26.1, with WinPcap (version
unknown), with libz 1.2.5, without POSIX capabilities, without libpcre, with
SMI
0.4.8, with c-ares 1.7.1, with Lua 5.1, without Python, with GnuTLS 2.10.3,
with
Gcrypt 1.4.6, with MIT Kerberos, with GeoIP, with PortAudio V19-devel (built
Jun
 7 2011), with AirPcap.

Running on Windows XP Service Pack 3, build 2600, with WinPcap version 4.1.2
(packet.dll version 4.1.0.2001), based on libpcap version 1.0 branch 1_0_rel0b
(20091008), GnuTLS 2.10.3, Gcrypt 1.4.6, without AirPcap.

Built using Microsoft Visual C++ 9.0 build 21022

Wireshark is Open Source Software released under the GNU General Public
License.

Check the man page and http://www.wireshark.org for more information.
--
I'm trying to decode BGP Update packets for a BGP-AD (autodiscovery) VPLS L2VPN
topology.  This extension to BGP is defined in RFC6074.

I'm getting 'Malformed Packet' errors.  Wireshark is able to decode up to the
point of the Subnetwork point of attachment, but does not further decode the
remaining fields of this update found on page 13 of the RFC (Length, Route
Distinguisher, PE_addr).

Please find a capture attached.

I believe the decode for the first NLRI should be:

00 0c                 Length: 12
00 00 fe 0e 00 00 07 f6              RD: 65038:2038
ac 19 8d 18            PE IP addr: 172.25.141.24

Thanks,
Ryan

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.