On Tue, May 22, 2012 at 11:21:29PM -0700, Nicholas Bastin wrote:
> On Tue, May 22, 2012 at 2:50 AM, Prabina Pattnaik
> <[email protected]> wrote:
> > We agree that implementation of 'at least 64 bytes' is as per spec (to 
> > allow data above 64 bytes depends on vendor specific switch
> > implementation).
> > But in current implementation, when the code (mentioned below) limits the 
> > size of data to 64 bytes (if data field of the error packet
> > is more than 64 bytes), a malformed OFPFMFC_BAD_COMMAND error packets gets 
> > generated (visible on wireshark with openflow
> > plugin).
> 
> The wireshark plugin is (questionably) broken.  Or wireshark is
> broken, you pick which you prefer.. :-)  The issue is that the
> OpenFlow dissector (arguably properly…certainly I would argue that)
> passes encap'd packet-ins *back* into wireshark for further
> dissection.  However, there's no way to tell wireshark "please ignore
> the fact that this packet may be truncated" - something it is capable
> of doing for outer-layer packets, so you end up with giant red
> nonsense that the packet is malformed, and not that you may have a
> truncated packet.  Either way, the OVS interpretation may not be what
> you want, but it's not broken.

I thought that OVS itself did a better job of printing these truncated
OpenFlow messages, but when I tested it I found that I was wrong, so I
sent out a patch to improve the situation:
        http://openvswitch.org/pipermail/dev/2012-May/017462.html
_______________________________________________
discuss mailing list
[email protected]
http://openvswitch.org/mailman/listinfo/discuss

Reply via email to