Discussion:
decode DNS draft-vandergaast-edns-client-ip-01
Mathias Koerber
2014-10-08 07:01:50 UTC
Permalink
Is there any way Wireshark (or tshark) can decode the additional EDNS0
OPT records added by

http://tools.ietf.org/html/draft-vandergaast-edns-client-ip-01

Currently all it shows is

data length 11
data

and I can only see the info in the hex part.

I am running Version 1.8.6 (SVN Rev 48142 from /trunk-1.8)
___________________________________________________________________________
Sent via: Wireshark-users mailing list <wireshark-users-IZ8446WsY0/***@public.gmane.org>
Archives: http://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
mailto:wireshark-users-request-IZ8446WsY0/***@public.gmane.org?subject=unsubscribe
Bill Meier
2014-10-08 16:27:09 UTC
Permalink
Post by Mathias Koerber
Is there any way Wireshark (or tshark) can decode the additional EDNS0
OPT records added by
http://tools.ietf.org/html/draft-vandergaast-edns-client-ip-01
Currently all it shows is
data length 11
data
and I can only see the info in the hex part.
I am running Version 1.8.6 (SVN Rev 48142 from /trunk-1.8)
Yes: update to a current Wireshark 1.12 version.

A quick look at the dissector code suggests that EDNS0 dissection is now
part of the DNS dissector.

(Wireshark 1.8 is pretty old).
___________________________________________________________________________
Sent via: Wireshark-users mailing list <wireshark-users-IZ8446WsY0/***@public.gmane.org>
Archives: http://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
mailto:wireshark-users-request-IZ8446WsY0/***@public.gmane.org?subject=unsubscribe
Loading...