Less of a question, more of an "FYI". I've been netbooting Apple clients using BSDP, Apple's "Netboot 2.0" extension to DHCP. To do this, I've written a quick-and-dirty Lua plugin to wireshark to dissect this protocol, which can be found at http://www.ch.cam.ac.uk/computing/boot-service-discovery-protocol-daemon (It's neither elegant nor particularly well-tested, but it appears to do the job for me under wireshark 2.0.2 - comments / criticism / patches welcome. If someone more skilled than I cares to take this further, I for one would welcome wireshark being able to dissect this protocol 'out of the box'!) Yours, Frank asked 11 May '16, 01:05 rl201 |
One Answer:
Hi Uli, Enhancement request created as https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12427 ; files.gz attached. Happy to help further if that would be useful. Thanks, Frank answered 11 May '16, 02:23 rl201 (I converted your comment to an Answer just to give this non-question an answer. I also Accepted the answer so this "question" doesn't show up as unanswered.) (11 May '16, 06:21) JeffMorriss ♦ |
Hi Frank,
sounds interesting. Would you mind open an enhancement bug (https://bugs.wireshark.org/bugzilla/) and attach a sample pcap and the lua script to it. So that somebody can pick it up and write a build-in dissector.
Cheers Uli