ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-dev: Re: [Wireshark-dev] hf_http_response_code in packet-http.c

From: "Sultan, Hassan" <sultah@xxxxxxxxxx>
Date: Thu, 13 Jul 2017 18:47:45 +0000

> -----Original Message-----
> From: Pascal Quantin [mailto:pascal.quantin@xxxxxxxxx]
> Sent: Thursday, July 13, 2017 11:26 AM
> To: Sultan, Hassan <sultah@xxxxxxxxxx>
> Cc: Developer support list for Wireshark <wireshark-dev@xxxxxxxxxxxxx>
> Subject: RE: [Wireshark-dev] hf_http_response_code in packet-http.c
> 
> 
> 
> Le 13 juil. 2017 19:54, "Sultan, Hassan" <sultah@xxxxxxxxxx
> <mailto:sultah@xxxxxxxxxx> > a écrit :
> 
> 
> 
> 
> 	> -----Original Message-----
> 	> From: Pascal Quantin [mailto:pascal.quantin@xxxxxxxxx
> <mailto:pascal.quantin@xxxxxxxxx> ]
> 	> Sent: Thursday, July 13, 2017 10:39 AM
> 	> To: Developer support list for Wireshark <wireshark-
> dev@xxxxxxxxxxxxx <mailto:wireshark-dev@xxxxxxxxxxxxx> >
> 
> 	> Cc: Sultan, Hassan <sultah@xxxxxxxxxx
> <mailto:sultah@xxxxxxxxxx> >
> 	> Subject: Re: [Wireshark-dev] hf_http_response_code in packet-http.c
> 	>
> 
> 	> Hi Hassan,
> 	>
> 	>
> 	> 2017-07-13 19:25 GMT+02:00 Sultan, Hassan via Wireshark-dev
> <wireshark-
> 
> 	> dev@xxxxxxxxxxxxx <mailto:dev@xxxxxxxxxxxxx>  <mailto:wireshark-
> dev@xxxxxxxxxxxxx <mailto:wireshark-dev@xxxxxxxxxxxxx> > >:
> 
> 	>
> 	>
> 	>
> 	>
> 	>       > -----Original Message-----
> 	>       > From: Wireshark-dev [mailto:wireshark-dev-
> bounces@xxxxxxxxxxxxx <mailto:wireshark-dev-bounces@xxxxxxxxxxxxx>
> 	> <mailto:wireshark-dev-bounces@xxxxxxxxxxxxx <mailto:wireshark-
> dev-bounces@xxxxxxxxxxxxx> > ] On Behalf
> 	>       > Of Erik de Jong
> 	>       > Sent: Wednesday, July 12, 2017 10:12 PM
> 	>       > To: Developer support list for Wireshark <wireshark-
> 
> 	> dev@xxxxxxxxxxxxx <mailto:dev@xxxxxxxxxxxxx>  <mailto:wireshark-
> dev@xxxxxxxxxxxxx <mailto:wireshark-dev@xxxxxxxxxxxxx> > >
> 	>       > Subject: Re: [Wireshark-dev] hf_http_response_code in packet-
> http.c
> 	>       >
> 	>       >
> 	>       >
> 	>       > On Thu, Jul 13, 2017 at 1:12 AM, Sultan, Hassan via Wireshark-
> dev
> 	> <wireshark-
> 
> 	>       > dev@xxxxxxxxxxxxx <mailto:dev@xxxxxxxxxxxxx>
> <mailto:dev@xxxxxxxxxxxxx <mailto:dev@xxxxxxxxxxxxx> >  <mailto:wireshark-
> <mailto:wireshark->
> 
> 	> dev@xxxxxxxxxxxxx <mailto:dev@xxxxxxxxxxxxx>  <mailto:wireshark-
> dev@xxxxxxxxxxxxx <mailto:wireshark-dev@xxxxxxxxxxxxx> > > > wrote:
> 	>       >
> 	>       >
> 	>       >       Hi,
> 	>       >
> 	>       >
> 	>       >
> 	>       >       I am starting to learn the Wireshark code base, and one thing
> 	> puzzles
> 	>       > me…
> 	>       >
> 	>       >
> 	>       >
> 	>       >       Why is hf_http_response_code defined as a FT_UINT16 with
> 	> BASE_DEC
> 	>       > rather than an FT_STRING ?
> 	>       >
> 	>       >
> 	>       >
> 	>       >       It’s a text field… not an integer.
> 	>       >
> 	>       >
> 	>       > Presenting it as a number allows for filtering like:
> 	>       > http.response.code > 200
> 	>       >
> 	>       > Which would not be possible when presented as a string.
> 	>
> 	>       Thanks for the info, but in that case would it not be more
> appropriate to
> 	> have the normal field as an FT_STRING and add a generated field as
> FT_UINT16
> 	> ? My understanding of generated fields is that this is their purpose :
> represent
> 	> data that doesn't exactly correspond to the packet data.
> 	>       We could still keep the field named as is today (hence ensuring all
> 	> existing filters still work), but simply make it a generated field, and add
> an
> 	> FT_STRING to represent the actual data as it is in the packet.
> 	>
> 	>       Thoughts ?
> 	>
> 	>
> 	>
> 	>
> 	> Does having the field as it is designed today generating you any issue?
> For fields
> 	> having numerical values only, it makes much more sense to have the
> digits
> 	> directly instead of the string and that's already what we are doing in
> numerous
> 	> places. And personally I do not see any valid reason to change that.
> Your
> 	> suggestion implies that many fields would start to be duplicated
> without any
> 	> added value.
> 
> 
> 	My reason is that anyone wanting to build automation based on
> Wireshark's parsing will not be able to rely on Wireshark's reporting of field type
> & format to interpret the packet data.
> 	The automation would walk through parsed fields and be told that the
> http response code is a 3-bytes UINT16 with value say 200, so bytes 00 00 c8,
> which is wrong. Right now the way these fields are setup works for human
> interpretation, by people looking at the rendered value on a screen, but it is far
> from ideal for automation.
> 
> 
> Thanks fact that HTTP is text based does not change the fact that the code is
> supposed to be a number. So I'm not sure to get your point.
> Moreover tons of people use tshark for automation and I do not remember
> someone complaining about the current output. So maybe I simply did not
> understand your use case.
> 
> 
> 	One could argue it's the main purpose of Wireshark, but I think it
> needlessly prevent a whole class of use-cases from being achieved with
> Wireshark's technology.
> 
> 
> 
> Could you elaborate? What use case do you have in mind exactly?

Imagine automation that attempts to perform modification on packets using the parsed information provided by Wireshark, or somehow goes and directly reads fields in the packet data based on what Wireshark's parsed information says (type/offset/length/...). Wireshark reporting the field as FT_UINT16 instead of say a UTF-8 FT_STRING throws off the automation as it would either attempt to write an FT_UINT16 at the offset of the field, writing the wrong format, or be confused by seeing a 3 bytes FT_UINT16 and give up.

How about having an #ifdef for such things so that Wireshark's use-case today does not have to suffer the addition of generated fields, and such automation cases could still get full fidelity parsing by building Wireshark's engine with the specific #define ? Today they have to build directly against Wireshark's code anyway so that shouldn't be a problem.