Skip to content

Latest commit

 

History

History
45 lines (26 loc) · 1.8 KB

README.md

File metadata and controls

45 lines (26 loc) · 1.8 KB

wireshark_plugins

A place to hold WireShark Filters for Cyphal Headers. These filters are based on the specification from https://opencyphal.org/specification.

PROTOCOL Status
Cyphal/UDP working
Cyphal/CAN working
Cyphal/serial -

Serial debugging with Wireshark may be possible with some tools which redirect the serial port over a named pipe.

The older Wireshark plugin which uses SocketCAN for UAVCAN/CAN is implemented in C in Wireshark itself.

Installation

Copy the *.lua to your WireShark Plugins directory. The location of the Lua plugin directory can be found via Help → About → Folders:

image

You may have to give your root password to install or sudo cp.

How to Use

Cyphal/UDP

The following BPF expression can be used to filter Cyphal/UDP traffic only (useful if the network traffic is high):

udp and dst net 239.0.0.0 mask 255.0.0.0 and dst port 9382

The Cyphal/UDP filter will automatically detect messages. The Cyphal/CAN filter however will not and will need to be added to the "Decode As" list.

Cyphal/CAN

Right-click on the CANFD messages stream and select "Decode As". Remove the initial entry from the list and add a new entry which sets the first column to "CAN next level dissector", and the "current" column to "CYPHALCAN".

Once added the message stream in the top of Wireshark will continue to say "CANFD" but the detail window will have all the decoded parts of the Cyphal/CAN header, payload (for Heartbeat and GetInfo) and the footer.

Development

To add features to the protocol plugin, simply copy, reload (Cmd+Shift+L on Mac, Ctrl+Shift+L elsewhere), and test.

Happy Decoding!