<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Wireshark BLE L2CAP packet reassembly</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/14627/wireshark-ble-l2cap-packet-reassembly</link><description>I have some BLE traffic that I have sniffed and am displaying in Wireshark. Most of the opcodes (read/write request/response indications/notifications etc.) are parsed/displayed correctly. However, I have some packets that are prepare write requests/responses</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Fri, 26 Aug 2016 12:35:38 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/14627/wireshark-ble-l2cap-packet-reassembly" /><item><title>RE: Wireshark BLE L2CAP packet reassembly</title><link>https://devzone.nordicsemi.com/thread/55816?ContentTypeID=1</link><pubDate>Fri, 26 Aug 2016 12:35:38 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e0523586-1c33-478d-a5c4-7aaf3d5cd141</guid><dc:creator>Stig</dc:creator><description>&lt;p&gt;As a temporary workaround (until nRFSniffer is updated) it&amp;#39;s possible to capture with Wireshark 1.10.x and then save the capture file to be used in Wireshark 2.x.x to use the updated BLE dissectors.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark BLE L2CAP packet reassembly</title><link>https://devzone.nordicsemi.com/thread/55815?ContentTypeID=1</link><pubDate>Fri, 26 Aug 2016 11:35:07 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b7a95c27-7f65-4d3f-b5d5-9a81be9775e8</guid><dc:creator>David Edwin</dc:creator><description>&lt;p&gt;That is good if it works. This other question would be related to getting the latest wirehshark to work properly. &lt;a href="https://devzone.nordicsemi.com/question/67447/wireshark-201-and-nrfsniffer/"&gt;devzone.nordicsemi.com/.../&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Can you try it and let us know if this works for you ?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark BLE L2CAP packet reassembly</title><link>https://devzone.nordicsemi.com/thread/55814?ContentTypeID=1</link><pubDate>Tue, 09 Aug 2016 20:46:40 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:bf6f9e2f-a565-4507-99c4-d6b26d739912</guid><dc:creator>Stig</dc:creator><description>&lt;p&gt;The latest development version of Wireshark has support for BLE L2CAP reassembly, and even the Nordic BLE sniffer meta header (so you don&amp;#39;t need the plugin).&lt;/p&gt;
&lt;p&gt;You can try one of the latest automated builds from &lt;a href="https://www.wireshark.org/download/automated/"&gt;www.wireshark.org/.../&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark BLE L2CAP packet reassembly</title><link>https://devzone.nordicsemi.com/thread/55810?ContentTypeID=1</link><pubDate>Fri, 08 Jul 2016 15:45:30 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:32757b28-1980-4825-861f-ea8c78488bad</guid><dc:creator>RK</dc:creator><description>&lt;p&gt;Wireshark is open source. Post a message on the developer list saying you think this feature is useful and ask how it should be implemented, then write the code and submit a pull request.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark BLE L2CAP packet reassembly</title><link>https://devzone.nordicsemi.com/thread/55809?ContentTypeID=1</link><pubDate>Fri, 08 Jul 2016 15:32:21 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ea94b84f-c103-451a-9e23-102cf9d01ba8</guid><dc:creator>Elm</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;I just wants to add that there are more companies in need of fragments handling in Wireshark. At least my company. How would I do to show my interest and even possibly support such work?&lt;/p&gt;
&lt;p&gt;regards,
Elm&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark BLE L2CAP packet reassembly</title><link>https://devzone.nordicsemi.com/thread/55813?ContentTypeID=1</link><pubDate>Tue, 21 Jun 2016 12:23:55 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:0f344a51-11f4-45e9-993b-12a5d1fd64f0</guid><dc:creator>RK</dc:creator><description>&lt;p&gt;There were quite a lot of changes to the BLE dissectors between 1.10/1.11 and 1.12 which is very similar to what ended up in 2.x  and I&amp;#39;m not entirely sure I totally understand some of them. Some of the useful header information (like direction) is explicitly stripped on the way down the dissector chain which seemed a bit daft to me. I have to assume that there were cases it was wrong but I didn&amp;#39;t manage to get a straight answer out of the mailing list.&lt;/p&gt;
&lt;p&gt;I maintain the OSX port of the sniffer, I didn&amp;#39;t have trouble on 1.12, but had to make a few changes to support 2.x and recompile it against latest libraries and use that one now, and live with the annoyances in the latest BLE dissector codebase.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark BLE L2CAP packet reassembly</title><link>https://devzone.nordicsemi.com/thread/55812?ContentTypeID=1</link><pubDate>Tue, 21 Jun 2016 12:15:13 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c22c43c9-7791-401f-ac85-a67f5acc4a5f</guid><dc:creator>cgreen</dc:creator><description>&lt;p&gt;Thanks for the clarification.  I can see the packet fragments and can manually extract the header/reassemble the value but as RK mentioned I was looking for a way similar to TCP and SSL protocols to have wireshark automatically reassemble the L2CAP fragments.&lt;/p&gt;
&lt;p&gt;FYI I&amp;#39;m using wireshark v 1.12.5 and have noticed that the nordic BLE sniffer meta doesn&amp;#39;t show up correctly in newer versions (I have had to mention using an older version to several colleagues).  One colleague uses 1.10.x and the L2CAP fragments show as &amp;quot;Malformed Packet&amp;quot; rather than &amp;quot;L2CAP Fragment&amp;quot;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark BLE L2CAP packet reassembly</title><link>https://devzone.nordicsemi.com/thread/55811?ContentTypeID=1</link><pubDate>Tue, 21 Jun 2016 12:02:00 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d937e0dd-ef3d-4884-9832-3ebeac2ab88d</guid><dc:creator>RK</dc:creator><description>&lt;p&gt;You can see the individual packets but wireshark&amp;#39;s BLE dissector doesn&amp;#39;t re-assemble separate packet fragments into entire messages in the same way it does with some TCP and other protocols. That was what the OP was asking.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark BLE L2CAP packet reassembly</title><link>https://devzone.nordicsemi.com/thread/55808?ContentTypeID=1</link><pubDate>Tue, 21 Jun 2016 11:20:45 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:045aabd2-536d-455d-a304-121c71f0f159</guid><dc:creator>FormerMember</dc:creator><description>&lt;p&gt;It should work fine to see prepare write request/response in wireshark. Which version of wireshark do you use? The sniffer works best with version 1.10.x (I just tested with wireshark 1.10.14).&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Wireshark BLE L2CAP packet reassembly</title><link>https://devzone.nordicsemi.com/thread/55807?ContentTypeID=1</link><pubDate>Tue, 21 Jun 2016 01:55:23 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:cb160c77-de79-4d58-b8ef-d32a58e1e03c</guid><dc:creator>RK</dc:creator><description>&lt;p&gt;Nope. There&amp;#39;s no code in wireshark which does that for BLE. In fact there&amp;#39;s not much stateful conversation parsing in the BLE dissectors at all.&lt;/p&gt;
&lt;p&gt;You could add code to do that and submit it to wireshark, but you probably want to check it&amp;#39;s not already on someone&amp;#39;s radar and if it&amp;#39;s the kind of stateful dissection they&amp;#39;d want.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>