Q: While capturing a multicast video feed on port 9000, I noticed Wireshark was identifying the content of the UDP packets as PCLI (Packet Cable Lawful Intercept) containing another IP datagram.Has anyone seen this issue before?Disabling the PCLI dissector fixes this. A: The PCLI dissector is registered to decode anything on UDP Port 9000. There are no heuristics in the dissector to check if the packet is indeed PCLI, nor does it seem to be an IANA allocated port.Disabling the dissector is the correct approach if your traffic isn't PCLI. Q: What is PCLI traffic and how to identify a traffic is PCLI traffic? Someone can help me? Thanks a lot. asked 14 Jun '14, 03:16 a278497234 edited 14 Jun '14, 03:17 |
One Answer:
Yes, and you have found the solution yourself. See also the following similar question:
Regarding your other question:
That's a method to allow authorities (governments, police, 'agencies') to intercept (eavesdrop) internet traffic of users, sent over cable connections.
How can you identify PCLI traffic? Well, by reading and understanding the specs or by reading the Wireshark PCLI dissector code. By looking at the dissector code, it looks like PCLI encapsulates plain IP packets in the UDP payload, without any further protocol. So, the best way to 'identify' PCLI traffic would be to actually use the PCLI dissector. If it finds a valid IP structure in the PCLI payload, chances are pretty good that it is PCLI. However, that's nothing you should be worried about. In your case it was just a coincidence with traffic on port UDP 9000 (the only sign for Wireshark to interpret that traffic as PCLI). If you were the target of a surveillance, you would never see PCLI traffic, as that would reveal that surveillance ;-)) So, if you are afraid of 'lawful' surveillance, you can
Regards answered 15 Jun '14, 07:49 Kurt Knochner ♦ edited 15 Jun '14, 07:51 |