0

I am trying to decode raw frames of a diameter call using tshark, all the fields: Command code, Application Id, AVPs are labelled as 'Unknown'. This labelling is followed by a sentence 'if you know what this is you can add it to dictionay.xml'. Am I missing some options? How to resolve this issue?enter image description here

  • What version of `tshark` (Wireshark) are you using? If you're not using the latest version, try upgrading to see if a newer version includes the dissection you're looking for. If you are using the latest version, then you might want to open a Wireshark [Issue](https://gitlab.com/wireshark/wireshark/-/issues) and include a sample capture file. – Christopher Maynard Nov 04 '21 at 14:00
  • I was facing an issue with a locally built version of Wireshark. It got resolved by tracking down the path where tshark was trying to locate the dissector files. – Shriya Nagrath Nov 23 '21 at 10:28

1 Answers1

0

For sure, the protocol you're trying to decode (3GPP Cx) is part of Wireshark off-the-shelf dictionary:

jhartman@mbp wireshark-master % grep 16777216 -A 10 diameter/TGPP.xml
<application id="16777216" name="3GPP Cx" uri="http://www.3gpp.org/DynaReport/29229.htm">

  <!-- IMS Cx Dx Application -->
  <command name="User-Authorization"    code="300" vendor-id="TGPP"/>
  <command name="Server-Assignment" code="301" vendor-id="TGPP"/>
  <command name="Location-Info"     code="302" vendor-id="TGPP"/>
  <command name="Multimedia-Auth"       code="303" vendor-id="TGPP"/>
  <command name="Registration-Termination" code="304" vendor-id="TGPP"/>
  <command name="Push-Profile"      code="305" vendor-id="TGPP"/>

My suggestions:

  • Download latest version of Wireshark
  • Ensure Wireshark interprets the log as Diameter: Select a frame and choose "Decode As" from contextual menu. Then select "Diameter"

Decode As

Finally: the screenshot does not have other details, perhaps you could share a few frames from your log to analyse.

Jarek
  • 782
  • 5
  • 16