asked 26 Jun '12, 12:44 someitguy2012 |
4 Answers:
Maybe it's just the Cisco RLM dissector getting a "false positive"; almost all the packets appear not to be LAPD-over-UDP, even if the dissector is treating them as such, given all the errors in the dissection. To quote a comment in that dissector:
The heuristic dissector's check is pretty weak - it just checks whether what would be the control field if the packet were LAPD-over-UDP looks "good enough", which could just mean that the first byte of the payload doesn't happen to have both bits set. That extremely weak check isn't done for arbitrary UDP traffic, but it is done where the source and destination port numbers are the same and are between 3001 and 3015. Unfortunately, there's no way to disable that dissector. Perhaps we should add a way to disable it and should also attempt to strengthen the heuristic. answered 26 Jun '12, 14:56 Guy Harris ♦♦ |
Could be some kind of VoIP solution. See here: http://wiki.wireshark.org/Q.931 Can you identify the device that used IP 192.168.0.254? Based on that information you might get an idea what generates Q.931 traffic (like a PBX with IP interface). Regards answered 26 Jun '12, 12:51 Kurt Knochner ♦ |
Q.931 is typically one layer below H.225 (H.323 VoIP signalling), unless you have some TDM traffic captured from a specialist TDM (ISDN) analyser, such as MtyEye. The .255 address will be the broadcast address assuming the mask is 255.255.255.0 and .254 may well be the default gateway (hence Cisco MAC). However, I cannot see why Q.931 traffic would be targetting the broadcast address. What is the subnet mask? answered 26 Jun '12, 14:32 KeithFrench |
Are you running Wireshark V1.8.0, if so, could it be worth checking the ISDN preference to ensure it is set to LAPD. There were some changes made by Guy in this area? answered 27 Jun '12, 06:16 KeithFrench That's probably not it - that preference for "ISDN" in the sense of a direct capture from an ISDN line, but what he's seeing is being dissected as LAPD over UDP when it is, I suspect, not LAPD over UDP, so either the purported LAPD frames are reported by the LAPD dissector as bad (that's what the "I, N(R)=X, N(S)=X [Malformed packet]" probably are) or they manage to get through the LAPD dissector but they get reported by the Q.931 dissector as bad (the others). (27 Jun '12, 09:53) Guy Harris ♦♦ |
Thanks for your info Kurt. I am trying to track the source device down. The 192.168.0.254 and 192.168.0.255 IPs don't make any sense, wondering if they are spoofed somehow. Is that a possibility?
Address spoofing. Well.... possible, but I don't believe that. Why do you think those addresses don't make any sense? Don't you know them, or what is the reason?
BTW: The MAC addresses are both Cisco. Maybe one of them is a Cisco Call Manager? At least it supports Q.931 signaling. However, as I'm not a Cisco guru, I'm just guessing!