Thanks this may prove helpful.  I am using 0.99.3 though, are the differences 
so profound that I should upgrade? (I would also have to build it myself since 
I've already written a plugin that I also use for another purpose).

I did notice upon further inspection that the traffic is "encapsulated" in 
other words after the initial UDP packet headers I have approximately 5 bytes 
of data and then it appears it may be IP and UDP header stuff again.  I am 
still trying to figure it out but being "encapsulated" makes sense since it is 
a VPN tunnel.  I thought it was PPP but now I am a not so sure.

I think I need a little further analysis before I can determine the appropriate 
approach, but thanks a lot for your input.  I'm sure it will come in handy.

Regards,
Bill

Douglas Pratley <[EMAIL PROTECTED]> wrote:     I'm looking at a similar thing 
at the moment with a view to  adding some UI features allowing a more arbitrary 
selection of protocol in  "decode as", but anything I do will be a few weeks  
away.
  
 If you're running 0.99.4 and you're happy to look at the  code to work out how 
the particular dissectors are working, and to write Lua  macros, then you might 
be able to do something by manipulating the dissector  tables using Lua.
  
 Look at 
 http://wiki.wireshark.org/Lua 
 http://wiki.wireshark.org/Lua/Dissector
  
 _If_ you can identify the protocol you want to direct  the packets to (PPP?), 
_and_ the one that you are directing from (UDP?) you  might be able to set UDP 
port <x> to dissect as  PPP.
  
 Failing that, if you can just add the PPP dissector to  the underlying 
protocol's heuristics table (if it has one), I think it will  appear in the 
"decode as" list.
  
 This is all a bit vague because I have just started  looking at this; it may 
or may not work, and I don't know if it's the sort of  hackery you're looking 
for.
 

  
---------------------------------
 From: [EMAIL PROTECTED]  [mailto:[EMAIL PROTECTED] On Behalf Of Bill  Fassler
Sent: 08 December 2006 22:58
To: Community support  list for Wireshark
Subject: [Wireshark-users] openvpn and packet  sniffing


 
I have tried both suggestions for me to view the RTP/SIP/SDP traffic  contained 
in the UDP packets travelling through an OpenVPN tunnel.  Neither  worked for 
this reason: The payload of the UDP packets do indeed contain such  traffic as 
RTP SIP etc as appropriate, but they are all preceeded by a tunneling  
protocol.  In my case it appears to be PPP.  I can not use "Decode as"  because 
in the transport options PPP is not listed.  This is unfortunate  because 
obviously there are dissectors or plugins in the Wireshark software that  will 
do the trick but I don't seem to have them available to dissect the  protocol 
when it is in the payload instead of the link layer.   I am  trying to confirm 
that the protocol is indeed PPP.  In the mean time is  there anyway to add more 
options to the decode as within the transport  layer?

Bill
  

---------------------------------
 Check out the  all-new Yahoo! Mail beta - Fire up a more powerful email and 
get things done  faster.
 
 
 This message should be regarded as confidential. If you have received this 
email in error please notify the sender and destroy it immediately.
 Statements of intent shall only become binding when confirmed in hard copy by 
an authorised signatory.  The contents of this email may relate to dealings 
with other companies within the Detica Group plc group of companies.
 
 Detica Limited is registered in England under No: 1337451.
 
 Registered offices: Surrey Research Park, Guildford, Surrey, GU2 7YP, England.
 
  _______________________________________________
Wireshark-users mailing list
[email protected]
http://www.wireshark.org/mailman/listinfo/wireshark-users


 
---------------------------------
Need a quick answer? Get one in minutes from people who know. Ask your question 
on Yahoo! Answers.
_______________________________________________
Wireshark-users mailing list
[email protected]
http://www.wireshark.org/mailman/listinfo/wireshark-users

Reply via email to