Re: Sniffing a DHCP Boot
Greg E Hersh <geh@world.std.com> Wed, 10 April 1996 15:03 UTC
Received: from ietf.cnri.reston.va.us by IETF.CNRI.Reston.VA.US id aa19285;
10 Apr 96 11:03 EDT
Received: from CNRI.Reston.VA.US by IETF.CNRI.Reston.VA.US id aa19281;
10 Apr 96 11:03 EDT
Received: from reef.bucknell.edu by CNRI.Reston.VA.US id aa09337;
10 Apr 96 11:03 EDT
Received: from localhost by reef.bucknell.edu with SMTP
(5.65/IDA-1.2.8) id AA11202; Wed, 10 Apr 1996 11:01:37 -0400
Date: Wed, 10 Apr 1996 11:01:37 -0400
Message-Id: <Pine.3.89.9604101044.A984-0100000@world.std.com>
Errors-To: droms@bucknell.edu
Reply-To: dhcp-v4@bucknell.edu
Originator: dhcp-v4@bucknell.edu
X-Orig-Sender: dhcp-v4@bucknell.edu
Precedence: bulk
Sender: ietf-archive-request@IETF.CNRI.Reston.VA.US
From: Greg E Hersh <geh@world.std.com>
To: Multiple recipients of list <dhcp-v4@bucknell.edu>
Subject: Re: Sniffing a DHCP Boot
X-Listprocessor-Version: 6.0c -- ListProcessor by Anastasios Kotsikonas
X-Comment: Discussion of DHCP for IPv4
Mime-Version: 1.0
On Wed, 10 Apr 1996, Evan Wetstone wrote: > Bill Fox writes: > > > > We are testing DHCP as served by Windows NT, and just to NT clients > > right now. My Network General Sniffer did not see DHCP, so I asked > > their support group if DHCP is decoded. The answer was, "We don't > > think so." > > > > In the trace file, which is taken from the client end, > > I see BOOTP packets, then an ARP for the IP address of the client > > workstation, from the client workstation. > > > > Do you folks have any experience with this? > > DHCP is supported by the Sniffer, it just gets called BootP due to the > same port numbers (67 and 68) being used. If you look at the detail of > the captured packets, you'll see that while it calls it a BootP packet, > the decode also correctly identifes DHCPDiscover, DHCPOffer, etc. > > -- > Evan Wetstone evanw@dell.com > > The Network Works. No Excuses. > Last time I've talked to Network General (January) they told me they did NOT have DHCP decoding and it was planned for this spring. It is true, Sniffer decodes DHCP as BOOTP. Unfortunately - at least with a sniffer software i was working - once sniffer reaches the 'user defined fields', it no longer decodes correctly, so you have to do some manual work. (I guess it just doesn't understand a 'length' field, so everything gets slowly shifted) If anyone was able to use Sniffer to COMPLETELY and CORRECTLY decode DHCP packet, would you please let us know which particular sniffer software release you've been using? Thanks, - Greg -
- Sniffing a DHCP Boot Bill Fox
- Re: Sniffing a DHCP Boot KEY
- Re: Sniffing a DHCP Boot Evan Wetstone
- Re: Sniffing a DHCP Boot Evan Wetstone
- Re: Sniffing a DHCP Boot Greg E Hersh
- Re: Sniffing a DHCP Boot Michael J. Lewis