On Dec 15, 2010, at 1:46 PM, Christopher Maynard wrote:

> The problem I have with this is that 3503 is registered to MPLS Echo so that
> dissector shouldn't have to be changed to essentially become a heuristic one 
> to
> accommodate this port-stealing protocol.

The protocol itself might not be stealing that port; I suspect that the "port 
A" in "I have a dissector plugin that is registered with port A." is not port 
3503.

However, the OS on the other endpoint might have chosen port 3503 as the port 
number for its side of the conversation.  OSes *should* (and that might even be 
a SHOULD in some RFC - or even a MUST - but I don't know offhand what RFC that 
is) choose ports in the ephemeral range (49152 through 65535) if the 
application (or library) doesn't explicitly choose a port number, rather than 
ports in the well-known range (0 through 1023, often restricted to privileged 
users for silly "security" reasons) or the registered range (1024 through 
49151).  However, that doesn't guarantee that they *do*.  When looking for a 
port match, we try the lowest port number first, as that's more likely to be a 
"real" port - but there isn't any test you can use on port numbers that's 
*guaranteed* never to get the wrong answer.
___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <wireshark-dev@wireshark.org>
Archives:    http://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
             mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe

Reply via email to