ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 6650] New: PDCP-LTE ROHC IR packet Dynamic IPv4 chain IP-I

Date: Wed, 7 Dec 2011 00:52:42 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6650

           Summary: PDCP-LTE ROHC IR packet Dynamic IPv4 chain IP-ID
           Product: Wireshark
           Version: 1.6.2
          Platform: x86-64
        OS/Version: Windows Vista
            Status: NEW
          Severity: Normal
          Priority: Low
         Component: Wireshark
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: per.liedberg@xxxxxxxxxxxx


Build Information:
Version 1.6.2 (SVN Rev 38931 from /trunk-1.6)

Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (32-bit) with GTK+ 2.22.1, with GLib 2.26.1, with WinPcap (version
unknown), with libz 1.2.5, without POSIX capabilities, without libpcre, with
SMI
0.4.8, with c-ares 1.7.1, with Lua 5.1, without Python, with GnuTLS 2.10.3,
with
Gcrypt 1.4.6, with MIT Kerberos, with GeoIP, with PortAudio V19-devel (built
Sep
 7 2011), with AirPcap.

Running on 32-bit Windows Vista Service Pack 2, build 6002, with WinPcap
version
4.1.2 (packet.dll version 4.1.0.2001), based on libpcap version 1.0 branch
1_0_rel0b (20091008), GnuTLS 2.10.3, Gcrypt 1.4.6, without AirPcap.

Built using Microsoft Visual C++ 9.0 build 21022

--
Problem:
IP-ID in Dynamic IPv4 chain in packet IR with dyn flag parsed as one octet
rather than two octets.

Packet details
PDCP-LTE|ROHC(ROHC RTP)
Profile 0x0001 IP/UDP/RTP
Packet type IR with dynamic chain (0xFD)

   Dynamic IPv4 chain (ToS=0, TTL=255, ID=240, RND=0, NBO=0)
      ToS: 0x00
      TTL: 0xff   
      IP-ID: 0xf0  // ******Should be 0xff01*******
      0... .... = Don't Fragment: 0x00
      .0.. .... = Random IP-ID field: 0x00
      ..0. .... = Network byte Order Ip-ID field: 0x00

Full packet analyzed:
0000   5a 5a 5a 5a 5a 5a da da da da da da 81 00 00 1d  ZZZZZZ..........
0010   08 00 45 00 00 a9 00 00 00 00 a3 11 ac da 5a 5a  ..E...........ZZ
0020   5a 5a da da da da c0 02 c0 02 00 95 00 00 70 64  ZZ............pd
0030   63 70 2d 6c 74 65 00 02 01 02 0c 03 01 04 01 05  cp-lte..........
0040   01 06 00 04 07 01 08 00 09 01 0a 00 0b 00 0c 00  ................
0050   01 01 80 02 e1 fd 01 3f 40 11 5a 5a 5a 5a da da  [email protected]..
                                            IPID
                                               |
0060   da da c0 00 c0 00 00 00 00 00 00 ff f0 01 00 00  ................
0070   00 90 03 00 02 00 00 00 20 01 10 ba 01 02 03 04  ........ .......
0080   05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14  ................
0090   15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24  ........... !"#$
00a0   25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34  %&'()*+,-./01234
00b0   35 36 37 38 39 3a 3b 3c 3d 3e 3f                 56789:;<=>?


RFC3095 page 99:

Dynamic part:

      Type of Service, Time to Live, Identification, DF, RND, NBO,
      extension header list.

   +---+---+---+---+---+---+---+---+
   |        Type of Service        |
   +---+---+---+---+---+---+---+---+
   |         Time to Live          |
   +---+---+---+---+---+---+---+---+
   /        Identification         /   2 octets
   +---+---+---+---+---+---+---+---+
   | DF|RND|NBO|         0         |
   +---+---+---+---+---+---+---+---+
   / Generic extension header list /  variable length
   +---+---+---+---+---+---+---+---+

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.