Hi, I was pretty glad to see wireshark & friends make it into solaris. I guess 
I'm just one of those guys who likes to inspect packets for no good reason. So 
I started playing with wireshark, tshark and tcpdump. 

I am on a simple network:
basically, my laptop (.101) and router (.1). network connectivity etc, 
everything works.

When I run snoop, and look at the mac addresses, I see the following:
$ pfexec snoop -d iwk0 -c3 -x0,12
Using device iwk0 (promiscuous mode)
192.168.1.101 -> 72.5.123.5   HTTP C port=44255 
           0: 0023 69ae 0b1a 001d e019 e925              .#i.......�%
  72.5.123.5 -> 192.168.1.101 HTTP R port=44255 
           0: 001d e019 e925 0023 69ae 0b1a              .....%.#i...
192.168.1.101 -> 72.5.123.5   HTTP C port=44255 
           0: 0023 69ae 0b1a 001d e019 e925              .#i........%
3 packets captured

source and destinations mac-addresses match with what I expect. My laptop's mac 
is there as well as my router's.

When I run tshark:
$ pfexec tshark -c3 -s 12
Capturing on iwk0
  0.000000 e0:19:e9:25:00:23 -> 48:02:3a:01:00:1d Ethernet [Packet size limited 
during capture]
  0.658593 69:ae:0b:1c:00:1d -> 08:41:00:00:00:23 Ethernet [Packet size limited 
during capture]
  0.660002 e0:19:e9:25:00:23 -> 08:02:2c:00:00:1d Ethernet [Packet size limited 
during capture]
3 packets captured

Same with tcpdump:
$ pfexec tcpdump -c3 -s 16
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on iwk0, link-type EN10MB (Ethernet), capture size 16 bytes
14:44:10.610185 69:ae:0b:1c:00:1d (oui Unknown) > 08:41:00:00:00:23 (oui 
Unknown), ethertype Unknown (0xe019), length 193: 
        0x0000:  e925                                     .%
14:44:10.788448 e0:19:e9:25:00:23 (oui Unknown) > 08:02:2c:00:00:1d (oui 
Unknown), ethertype Unknown (0x69ae), length 377: 
        0x0000:  0b1c                                     ..
14:44:10.900056 69:ae:0b:1c:00:1d (oui Unknown) > 08:41:00:00:00:23 (oui 
Unknown), ethertype Unknown (0xe019), length 92: 
        0x0000:  e925                                     .%
3 packets captured
3 packets received by filter
0 packets dropped by kernel

You may notice the odd (and different) choices in truncating the packets: The 
behaviour is not affected by this. Fully captured packets show a similar 
defect. 
The source and destination mac addresses are nowhere near what I expect them to 
be, nor is tshark/wireshark able to decode it properly (it marks them all as 
"Ethernet II" packets, and fails to acknowledge that it contain say an http 
packet).

I observe similar garbled output when using wireshark on iwk0.

This leads me to believe that libpcap (afaik the common denominator between 
tshark/wireshark and tcpdump) is not working correctly in this setup, whereas 
snoop is. It looks like libpcap at least drops a few bytes of the mac address 
and produces some more corrupted output further on.

At the moment I'm running the following:

$ uname -a
SunOS laptop 5.11 snv_131 i86pc i386 i86pc Solaris

with:
$ pkg list | egrep 'wireshark|tcpdump|pcap'
SUNWlibpcap                                   1.0.0-0.131     installed  -----
SUNWtcpdump                                   4.0.0-0.131     installed  -----
SUNWwireshark                                 1.2.5-0.131     installed  -----

all from
$ pkg publisher
PUBLISHER                             TYPE     STATUS   URI
opensolaris.org          (preferred)  origin   online   
http://pkg.opensolaris.org/dev/


Anyone else see this?
-- 
This message posted from opensolaris.org
_______________________________________________
networking-discuss mailing list
[email protected]

Reply via email to