For the foolhardy, desperate or those who just like to live dangerously.
http://www.rns-stearn.demon.co.uk/
These are source code patches.
The patches add to:
libpcap
- recognition and capture of AX.25
tcpdump
- decoding AX.25
- extraction from BPQ
- decoding an ARP payload
- decoding a TCP/IP payload
- decoding NetROM
- recognition of Flexnet
- recognition of ROSE
wireshark
- dissection of AX.25
- extraction from BPQ
- extraction from AXIP (untested)
- dissection of ARP payload
- dissection of an TCP/IP payload
- dissection of NetROM
- recognition of Flexnet
- dissection of ROSE
- dissection of "No layer 3" payloads
APRS (by the book)
recognition of DX cluster
The dissection of APRS & DX in wireshark is controlled via your
preferences:
Edit->Preferences->Protocols->AX25 No L3
All others are treated as having no L3 protocol and printed in hex
and ascii.
The patch is against:
libpcap-0.9.5
tcpdump-3.9.5
wireshark-0.99.5
This is an alpha release.
My testing is limited to vanilla AX.25 over non-radio mkiss serial link
and a few donated capture files.
To build these patched versions:
1. Download libpcap, tcpdump & sources
2. Create a directory to work in (I use /usr/src/modified)
3. cd into that directory
4. Unpack the sources into this directory
5. Save and uncompress the patches into this directory
6. Apply each patch by running:
patch -p1 < <patch name>
7. cd into libpcap-0.9.5
8. Run:
./configure
9. Run:
make
10. cd into tcpdump-3.9.5
11. Run:
./configure
12. Run:
make
13. cd into wireshark-0.99.5
14. Run:
./autogen.sh
15. Run:
./configure
16. Run:
make
To use tcpdump cd into the tcpdump directory and run:
./tcpdump -eni <ax.25 interface name>
To capture with tcpdump:
./tcpdump -eni <ax.25 interface name> -w <capture filename>
To use cd into the wireshark directory and run:
./wireshark
To use either of the tools for "off-the-wire" capture you will need
to be logged in as root as both tools access network interfaces and
root priviledges are need for that.
You can view captures in either tool with needing root priviledges.
Currently there is no way to filter on AX.25 addresses.
In both tcpdump and wireshark I have used existing functions to
decode AX.25 control info, ARP, IP & X.25 packets. These appear
to give the correct answers but a more extended checking is needed.
I you compile and run it please tell me. Bug reports welcomed,
comments on what is and is not display welcomed. Please remember
that tcpdump and wireshark are protocol analysers, they are not a
replacement for "listen".
--
Regards
Richard
-
To unsubscribe from this list: send the line "unsubscribe linux-hams" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html