Project

General

Profile

Wireshark » History » Version 4

osmith, 09/07/2018 02:31 PM
link to GSMTAP screenshot

1 1 osmith
h1. Wireshark
2
3
"wireshark":http://www.wireshark.org/ is a popular Free Software / Open Source protocol analyzer. Among many other protocols, it includes dissectors for the GSM Layer 2 (TS 04.06 / LAPDm) and 3 (TS 04.8 04.08 / RR,MM,CC).
4
5 2 osmith
There also is a [[baseband:GSMTAP]] protocol dissector in recent wireshark versions, which allows real-time capture and decode of GSM protocol messages encapsulated in a GSMTAP (pseudo-header, which is in turn encapsulated in UDP and IP).
6 1 osmith
7
h2. Building from source
8
9
In order to be able to dissect all protocols relevant for Osmocom, you will need to install the *git version* of wireshark (as of writing, the latest stable is 2.6 and it does not yet have "support for GSUP":https://osmocom.org/issues/1949 for example). See #2537 for an effort to ship Debian binary packages with Osmocom patches applied.
10
11
h3. Dependencies
12
13
| Distribution | Necessary packages |
14
| Fedora 28 | @development-tools cmake c-ares-devel glib2-devel libcap-devel libpcap-devel lua libmaxminddb-devel qt5-qtmultimedia-devel qt5-qttools-devel qt5-qtsvg-devel gnutls-devel libssh-devel libgcrypt-devel flex byacc|
15
16
17
h3. Building and installing
18
19
<pre>
20
$ git clone --depth=1 "https://code.wireshark.org/review/wireshark.git"
21
$ cd wireshark
22
$ mkdir -p build
23
$ cd build
24
$ cmake .. -DCMAKE_BUILD_TYPE=Release -DCMAKE_INSTALL_PREFIX=/usr/local
25
$ make
26
$ sudo make install
27
$ sudo ldconfig
28
</pre>
29
30 3 osmith
h3. Workaround for "ICMP port unreachable" messages
31
32
The [[baseband:OsmocomBB]] [[baseband:layer23]] program sends [[baseband:GSMTAP]] packets to the localhost (127.0.0.1) address of the loopback interface (lo).  Please note that the wireshark program is doing passive capture, i.e. if nothing is listening on the GSMTAP UDP port (4729), then you will see ICMP port unreachable messages in addition to the GSMTAP messages.  There are two suggested solutions to this:
33
* Change the IP address to a multicast group like 224.0.0.1 (instead of 127.0.0.1)
34
* Run some program that simply opens the UDP port and discards its content, e.g. using @nc -u -l -p 4729 > /dev/null@
35 1 osmith
36
h3. See also
37
38
* [[op25:WireSharkPage|Out-of-tree P25 wireshark plugin]]
39 4 osmith
* "Screenshot with GSMTAP capture":https://osmocom.org/attachments/download/2190/gsmtap-wireshark.png
40 1 osmith
* "Package build recipe from AUR":https://aur.archlinux.org/cgit/aur.git/tree/PKGBUILD?h=wireshark-git
Add picture from clipboard (Maximum size: 48.8 MB)