Wireshark mailing list archives
Re: Identification of Fragmented UDP Packets
From: Guy Harris <guy () alum mit edu>
Date: Thu, 21 Jan 2010 11:40:30 -0800
On Jan 21, 2010, at 11:08 AM, Eddie wrote:
LAN IP headers: 45
Version/IHL - version 4, 20 bytes.
00
Type of Service
05 14
Total length - 1300 bytes (1280 bytes of IP payload)
05 d7
Identification - 0x05d7
20 00
Flags and Fragment Offset: More Fragments, fragment offset = 0
80
Time to Live
11
Protocol - 17=UDP
f3 f9
Header Checksum
c0 a8 00 1e
Source Address
0010 ab a1 af a0
Destination Address
0000 45
Version/IHL
00
Type of Service
03 c0
Total length - 960 bytes (940 bytes of IP payload)
05 d7
Identification - 0x05d7, same as the previous fragment (which is as it should be)
00 a0
Flags and Fragment Offset: fragment offset=160=160*8 bytes=1280 bytes (which is as it should be, as that's the length of the previous fragment's payload)
80
Time to Live
11
Protocol - 17=UDP
14 ae
Header Checksum
c0 a8 00 1e
Source Address - same as the previous fragment (which is as it should be)
0010 ab a1 af a0
Destination Address - same as the previous fragment (which is as it should be)
WAN IP headers 45
Version/IHL
00
Type of Service
05 dc
Total length - 1500 bytes (1480 bytes of IP payload)
36 98
Identification - 0x3698
20 00
Flags and Fragment Offset: More Fragments, fragment offset = 0
7f
Time to Live
11
Protocol - 17=UDP
a7 46
Header Checksum
62 94 7a 5c
Source Address
ab a1 af a0
Destination Address
45
Version/IHL
00
Type of Service
02 f8
Total length - 760 bytes (740 bytes of IP payload)
36 98
Identification - 0x3698, same as the previous fragment (which is as it should be)
00 b9
Flags and Fragment Offset: fragment offset = 185=185*8 bytes=1480 bytes (which is as it should be, as that's the length of the previous fragment's payload)
7f
Time to Live
11
Protocol - 17=UDP
c9 71
Header Checksum
62 94 7a 5c
Source Address - same as the previous fragment (which is as it should be)
ab a1 af a0
Destination Address - same as the previous fragment (which is as it should be) There isn't anything obvious that should cause Wireshark not to attempt reassembly, but I didn't check the IP header checksum - is Wireshark reporting IP checksum errors on any of the WAN packets? Can you save just the two offending fragments from the WAN capture to a file? If so, when you read the file in, does it reassemble the fragments? If not, could you send us that capture, along with the version information from Wireshark?
Is there a way to grab the interpreted version of these.
Not with copy/paste, unfortunately. You could use File->Export to export the dissected version of the packets as text. ___________________________________________________________________________ Sent via: Wireshark-users mailing list <wireshark-users () wireshark org> Archives: http://www.wireshark.org/lists/wireshark-users Unsubscribe: https://wireshark.org/mailman/options/wireshark-users mailto:wireshark-users-request () wireshark org?subject=unsubscribe
Current thread:
- Identification of Fragmented UDP Packets Eddie (Jan 21)
- Re: Identification of Fragmented UDP Packets Guy Harris (Jan 21)
- Re: Identification of Fragmented UDP Packets Eddie (Jan 21)
- Re: Identification of Fragmented UDP Packets Guy Harris (Jan 21)
- Re: Identification of Fragmented UDP Packets Eddie (Jan 21)
- Re: Identification of Fragmented UDP Packets Guy Harris (Jan 21)
- Re: Identification of Fragmented UDP Packets Eddie (Jan 21)
- Re: Identification of Fragmented UDP Packets Guy Harris (Jan 21)
- Re: Identification of Fragmented UDP Packets Eddie (Jan 21)
- Re: Identification of Fragmented UDP Packets Guy Harris (Jan 21)
- Re: Identification of Fragmented UDP Packets Eddie (Jan 21)
- Re: Identification of Fragmented UDP Packets Guy Harris (Jan 21)
