ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 9127] New: RSVP Properties object decode (Juniper propriet

Date: Tue, 10 Sep 2013 12:00:27 +0000
Bug ID 9127
Summary RSVP Properties object decode (Juniper proprietary)
Classification Unclassified
Product Wireshark
Version SVN
Hardware All
OS All
Status UNCONFIRMED
Severity Normal
Priority Low
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Created attachment 11532 [details]
sample (Unknown object=Properties Primary path)

Build Information:
Version 1.11.0+svn51917 (SVN Rev Unknown from unknown)

Copyright 1998-2013 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (32-bit) with GTK+ 3.4.2, with Cairo 1.10.2, with Pango 1.30.0, with
GLib 2.32.3, with libpcap, with libz 1.2.3.4, with POSIX capabilities (Linux),
without libnl, with SMI 0.4.8, with c-ares 1.7.5, with Lua 5.1, without Python,
with GnuTLS 2.12.14, with Gcrypt 1.5.0, with MIT Kerberos, with GeoIP, with
PortAudio V19-devel (built Dec 10 2011 11:43:21), with AirPcap.

Running on Linux 3.9.4-030904-generic, with locale en_IE.UTF-8, with libpcap
version 1.1.1, with libz 1.2.3.4, GnuTLS 2.12.14, Gcrypt 1.5.0, without
AirPcap.

Built using gcc 4.6.3.

Wireshark is Open Source Software released under the GNU General Public
License.

Check the man page and http://www.wireshark.org for more information.
--
RSVP Properties object is not decoded by wireshark.

Information from Juniper tracefile about this packet:
Sep 10 15:34:11.050602 RSVP recv Path 192.168.1.1->192.168.1.5 Len=216
lt-1/2/0.32
Sep 10 15:34:11.050610   Session7 Len 16 192.168.1.5(port/tunnel ID 9563 Ext-ID
192.168.1.1) Proto 0
Sep 10 15:34:11.050616   Hop      Len 12 65.115.1.5/0x80000002
Sep 10 15:34:11.050621   Time     Len  8 30000 ms
Sep 10 15:34:11.050628   SrcRoute Len 20  65.115.1.6 S 192.168.1.3 L
Sep 10 15:34:11.050633   LabelRequest Len  8 EtherType 0x800
!!!!!Sep 10 15:34:11.050639   Properties Len 12 Primary path
Sep 10 15:34:11.050645   SessionAttribute Len 16 Prio (7,0) flag 0x0 "R1-to-R5"
Sep 10 15:34:11.050651   Sender7  Len 12 192.168.1.1(port/lsp ID  4)
Sep 10 15:34:11.050658   Tspec    Len 36 rate 0bps size 0bps peak Infbps m 20 M
1500
Sep 10 15:34:11.050778   ADspec   Len 48 MTU 1500
Sep 10 15:34:11.050786   RecRoute Len 20  65.115.1.5 65.115.1.1

This link may be useful
https://www.juniper.net/techpubs/en_US/junos12.1/information-products/topic-collections/nog-mpls-logs/topic-20284.html


You are receiving this mail because:
  • You are watching all bug changes.