Wireshark improvements

From Linux NFS

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
[http://www.wireshark.org/ Wireshark] (previously known as Ethereal) is
[http://www.wireshark.org/ Wireshark] (previously known as Ethereal) is
invaluable for understanding what's happening on the wire between a client and
invaluable for understanding what's happening on the wire between a client and
-
server.  Some todo's:
+
server, but it could be better.  Some examples:
* General maintenance, bug-fixing: e.g. last I checked it was mis-parsing NFSv4 setattr ops.
* General maintenance, bug-fixing: e.g. last I checked it was mis-parsing NFSv4 setattr ops.
* At least if it sees the setclientid call (which includes the address, port, and protocol to use for callbacks), wireshark should be able to properly display operations on the callback channel.  Currently it doesn't.
* At least if it sees the setclientid call (which includes the address, port, and protocol to use for callbacks), wireshark should be able to properly display operations on the callback channel.  Currently it doesn't.
 +
* Update to 4.1.  I believe Garth Goodson may have done some work at least on the pNFS parts.
* (probably hard) Given knowledge of the appropriate keys, decrypt and dissect privacy-encoded calls and replies.
* (probably hard) Given knowledge of the appropriate keys, decrypt and dissect privacy-encoded calls and replies.

Revision as of 19:34, 9 October 2006

Wireshark (previously known as Ethereal) is invaluable for understanding what's happening on the wire between a client and server, but it could be better. Some examples:

  • General maintenance, bug-fixing: e.g. last I checked it was mis-parsing NFSv4 setattr ops.
  • At least if it sees the setclientid call (which includes the address, port, and protocol to use for callbacks), wireshark should be able to properly display operations on the callback channel. Currently it doesn't.
  • Update to 4.1. I believe Garth Goodson may have done some work at least on the pNFS parts.
  • (probably hard) Given knowledge of the appropriate keys, decrypt and dissect privacy-encoded calls and replies.
Personal tools