I think the length is correct. I forgot to tell, I disabled the LLC  
dissector. Before I did, it attempted to decode the first 4 bytes, but  
failed to to anything meaningfull: DSAP unknown, SSAP unknown.

I am going out of town today, will answer in full when I am back on  
monday next week. Thank you for the help!


wbr, Aleksander Veksler


Siterer Guy Harris <[EMAIL PROTECTED]>:

>
> On Sep 6, 2007, at 3:23 PM, Aleksander Veksler wrote:
>
>> Anyone have tips on how you loose a few bytes? I get 12 bytes
>> between the Ethernet header and IP header.
>
> That's the "length field" version of the Ethernet header, not the
> "type field" version, so those 12 bytes appear to be...
>
>> This means that wireshark does not recognize the IP header as, and I
>> can't use any of the wireshark's advanced features.
>>
>> Anyone know how to get rid of those bytes, or perhaps what they are?
>
> ...4 bytes of mysterious crap followed by an 802.2 header for SNAP
> followed by a SNAP header:
>
>       95 e5 5c 00 - 4 bytes of crap
>       aa - destination SAP of an 802.2 header
>       aa - source SAP of an 802.2 header; both of them being 0xaa means
> it's a SNAP frame
>       03 - control field of an 802.2 header, indicating it's a UI frame
>       00 00 00 - OUI field of a SNAP header, indicating that this is
> encapsulated Ethernet
>       08 00 - protocol ID field of a SNAP header, which is an Ethertype for
> encapsulated Ethernet; that's the Ethertype for IPv4
>
> 802.11 packets use 802.2, so that's probably the 802.2 header plus
> 802.2 payload (SNAP header and packet data) that the raw frame had.
>
>> * My card is Intel Pro/Wireless 3945ABG
>
> So is this on some flavor of Windows?  The title bar looks Windowsish,
> but some UN*X+11 window managers have Windowish title bars.  However,
> I'd expect UN*X 802.11 drivers to be better-behaved than this.
>
>> * The wireless switch is D-Link DIR-635
>
> That probably doesn't matter.
>
>> * The problem only happens in promiscuous mode, and only to the
>> packets not directed to my computer
>
> For Windows (at least prior to NT 6.0^H^H^H^H^H^HVista), the OS
> networking stack has no understanding of 802.11, so the adapter and
> driver turn received packets (or, at least, the ones with a SNAP
> header) into fake Ethernet packets (with the "type field" version of
> the Ethernet header, so they're not limited to 1500 bytes or less of
> payload) and supply that to NDIS, so that's what WinPcap and thus
> Wireshark sees.
>
> I suspect that the Intel adapter and its driver do that only for
> packets intended for the host, not for packets that would have been
> discarded if you hadn't been in promiscuous mode.  It appears to do
> other crap for promiscuously-received packets.
>
> We'd probably have to throw in a heuristic hack to try to recognize
> those packets.  I'm not sure why the 802.2 LLC dissector didn't do any
> dissection of that packet; if you could send us a capture file
> containing one of those packets (if you still have the capture
> containing that frame, just save that frame into a capture file), we
> could try to find some way of detecting those frames and dissecting
> the payload as 802.2 starting after the 4 bytes of crap.
> _______________________________________________
> Wireshark-users mailing list
> Wireshark-users@wireshark.org
> http://www.wireshark.org/mailman/listinfo/wireshark-users
>



_______________________________________________
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users

Reply via email to