forked from ljakab/lisp-dissector
-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathTODO
28 lines (26 loc) · 1.24 KB
/
TODO
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
packet-lisp.c
=============
* Instead of the static variable "encapsulated", use the col_set_fence()
function
* Actually show the encapsulation header when present
* Dissect locator sets in detail, highlighting individual fields in the hex
data
* Implement support for the following LCAF types:
* AS Number (3)
* Application Data (4)
* Geo Coordinates (5)
* Opaque Key (6)
* Nonce Locator (8)
* Multicast Info (9)
* Security Key (11)
* Source/Dest Key (12)
* Improve LCAF parsing robustness, by ignoring length when dissecting known
types
* Implement support for LISP-SEC
packet-lisp-data.c
==================
Other
=====
* Publish my work as a branch on a clone of the upstream experimental git
repo
* Dino: in the Protocol column, add "/LISP" for data encapsulated packets, when an upper layer protocol dissecto decodes the inner data packet. For example, today a LISP encapsulated ICMP packet is shown simply as ICMP, and it is impossible to know at a glance if it a tunneled packet or not. This however requires hacking the main Wireshark code, not the LISP dissector code. The wreshark developers provided a workaround, adding a new column that shows the whole protocol stack is already possible today. But that is too verbose.