MPTCP dissection in wireshark
UPDATE: The last pending patch got merged end of march. You can now use upstream wireshark \o/
Wireshark is a network analyzer. Over the past year, we introduced a number of improvements in MPTCP related dissection:
To get a full list of loosely related changes, you can run in your wireshark repository:
There is a last patch pending that needs more work & tests before upstreaming.
For ease of use, we provide a custom github mirror incorporating all current changes (checkout the branch ‘mptcp_final’).
Here is a picture of some additionnal fields that are available when using our version of wireshark:
The building is the same as for vanilla wireshark. Here is an example on how to install/use it with cmake (wireshark can use autotools directly or cmake):
Here is my custom command, feel free to change the compiler to yours or just remove the commands:
Full MPTCP dissection can be quite CPU-consuming (optimization was not our priority), thus we provide some options to enable only the needed features in the menu “Edit -> Preferences -> Protocols -> MPTCP”. Just tick the boxes but keep in mind it is a work in progress and don’t hesitate to report (or fix) bugs in the github tracker.
Here is my custom MPTCP profile in case it helps (finding the field names) !
Matt