Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Malformed packets with RIOT sniffer #10

Open
kbonset opened this issue May 26, 2016 · 1 comment
Open

Malformed packets with RIOT sniffer #10

kbonset opened this issue May 26, 2016 · 1 comment

Comments

@kbonset
Copy link

kbonset commented May 26, 2016

I collected packets on an Atmel samr21-xpro via RIOT firmware and sniffer [1]. I was able to see packets in Wireshark with openwsn-dissetors, from an OpenMote running openwsn-fw. However, the packets are listed as malformed. See the attached zipped pcap riot-sniffer.zip.

In Wireshark, the problem looks like the absence of the 802.15.4 FCS bytes in RIOT's capture. However, the capture file uses the format LINKTYPE_IEEE802_15_4_NOFCS (230). Also, the packets are dissected without the malformed tag in stock Wireshark.

Perhaps the problem is the fix [2] for issue #7, which changes dissect_ieee802154_nofcs() to use tvb_captured_length() rather than tvb_reported_length().

[1] https://github.com/RIOT-OS/RIOT/tree/master/dist/tools/sniffer
[2] 7f9b9b5

@twatteyne
Copy link
Member

@kbonset, thanks for pointing this out!
@jmmunoz86, I let you answer?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants
@twatteyne @kbonset and others