Wireshark Help

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello everyone,
Does anyone know to sniff packets coming out of gnuradio? I am
spinning my wheels trying to figure this out on my own. Is there some
sort of sink that goes to an ip address or a USB port that will show
up in wiresharks interface?
Thanks,
Matt D


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/

iQEcBAEBAgAGBQJRS9oxAAoJEIC13XTKWhPPmuoH/27MbYkUsz67z5d4/XXr3Oxm
eG6ZtiX2Mvacx2ZC2CteAs/1Pd0dvXPcoIZzFhj37/jR/8jnhR4gyR3CR7cfa34y
3g1PmmoYIu0vv8h4SBEPQr+eM2obeTKwsu12rjHyBYJkCsJ4ZU+0izKNVVMI09v7
L+/afPXPoJJ/ALEaMy6v0NE+1aENTEbOuvPiON1cal7K7Pc0RYrTFw+FqKtVkmoY
21Y1IT5TqBRIzi7yfTdbVwYXZfwsAxPTskYnpTyo5jtrfAUd93CU5kvYPhwj5VxT
2tXg8Bj5kg76JsZYZ9hlN3PLeMDeRwwf6ocuKJ+oumC64Ex8jCibEuqk0MJbEbM=
=CtYL
-----END PGP SIGNATURE-----

Are you talking about sniffing USRP data? Gnuradio doesn’t have
“packets” – it only knows about raw samples. If you’re using a USRP,
UHD will packetize those samples on their way to/from the hardware; we
use the VITA 49/VRT protocol for this. You can use the VRT dissector
found here:

https://github.com/bistromath/vrt-dissector

…to view those packets, although there’s not a lot of information
there aside from the samples themselves. Alexander C. and Ivan
Kluchnikov put together a dissector for the control protocol N-series
USRPs use, which can be found here:

https://github.com/chemeris/uhd_dissector

Hope this helps,
–n

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Thanks Nick,
I was under the impression that gnu radio had a sink that would send
packets to an ip address on the local machine. the guys at osmomcom
did it somehow but their site is down (sad).
Thanks,
Matt


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/

iQEcBAEBAgAGBQJRTE++AAoJEIC13XTKWhPPeaUIALuV14X3QrSJ/0blbQUnae7g
KLvyHLRy52MTVDDUZIEKoT5hUM4UA5fkOefUjM3AcsZsvblEAsqlYww8+jP3UMgw
dbaUgBlj8xfsVPneJS8YntljvIM9GXtAz0cC5Y7+bRjGKCXNlfervwhGJ/cI2S53
GvkYP15aRhYj1sqVRGD2jBQnYuig9eUqQBjalCxG/63Fzw/+AwdfUEW6Tcp4dkb2
Bk7iWnsPFc/pLNcxtdrUT2ea5FHQmeC0sNBbcQKgn4WD0Ar2W7a+IC8BTMvnbZkv
igWUBIYMjHPurei11yMhL7HH8kxoEmjVBuTCcZcvE+GhlkpPvR6rSQzo7OYhhFo=
=XR7H
-----END PGP SIGNATURE-----

On 03/22/2013 11:06 AM, Matt D wrote:

the guys at osmomcom did it somehow but their site is down (sad).
Thanks, Matt -----------------------
Sounds right but I am stuck trying to find out how to send the packets
to the wireshark interface.
Thanks
(Replying to list)

You should be able to point the TCP/UDP sink to localhost on some
high-numbered port that you choose. Then in Wireshark, capture on the
local interface, usually “lo”.

8zzRym9MFaHY6ktFVmNwSdN/xU6Xj9+31I3EOPITieSIq5iTpuFKstW6Kj3JWHU=
=Wq7d
-----END PGP SIGNATURE-----


Sean M. Nowlan
Research Engineer I
ICL/CNSD
Georgia Tech Research Institute
250 14th St NW, Suite 470
Atlanta, GA 30318

404.407.7952
[email protected]