[ovs-discuss] Wireshark Dissector for Nicira Extensions
Vasu Dasari
vdasari at gmail.com
Fri Jan 31 19:46:34 UTC 2014
Ben,
I tried as per your suggestion, this is what I got:
vdasari at mininet:~$ ovs-ofctl parse-pcap of.pcap
tcp,metadata=0,in_port=0,vlan_tci=0x0000,dl_src=08:00:27:90:d5:77,dl_dst=08:00:27:b9:12:86,nw_src=192.168.56.53,nw_dst=192.168.56.51,nw_tos=192,nw_ecn=0,nw_ttl=64,tp_src=6633,tp_dst=58836,tcp_flags=0x018
I was hoping to see TCP data content details, like OF, and vendor specific
information, etc. Do I need to give any more flags to get the detailed
"vendor specific" information.
The packet details from the tshark is as follows:
vdasari at mininet:~/Developer/wireshark$ tshark -r ~/of.pcap -V
.
.
OpenFlow 1.0
.000 0001 = Version: 1.0 (0x01)
Type: OFPT_VENDOR (4)
Length: 20
Transaction ID: 4
Message data not dissected yet
Thanks,
-Vasu
On Fri, Jan 31, 2014 at 12:55 PM, Ben Pfaff <blp at nicira.com> wrote:
> On Fri, Jan 31, 2014 at 12:30:11PM -0500, Vasu Dasari wrote:
> > I am trying to see packets between controller and OVS on wireshark. I am
> > using wireshark version: 1.11.2 from the git repository on wireshark.org
> .
> > The dissector is pretty good allowing me to decode openflow standard
> > messages. But, when trying to decode OF messages of type "OFPT_VENDOR",
> > wireshark gives up dissecting the vendor portion.
> >
> > Can some point me to wireshark patch file (if any) to dissect nicira
> vendor
> > field further. If there is none, I can work on this.
>
> I don't know of any, but you can use "ovs-ofctl ofp-parse-pcap" in the
> latest version of OVS to get equivalent output.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://openvswitch.org/pipermail/ovs-discuss/attachments/20140131/3506bcb3/attachment.html>
More information about the discuss
mailing list