Protocol Analysis with Wireshark¶
This section explains how YESDR control-plane protocols can be viewed and analyzed using Wireshark. To support debugging, validation, and education, official Wireshark dissectors and example packet capture files are provided for selected YESDR protocols.
Supported Protocols¶
Wireshark dissectors are currently available for the following YESDR protocols:
- YACP — YESDR Access Control Protocol
- YSMP — YESDR Session Management Protocol
Additional protocol dissectors may be added in future releases.
Wireshark Dissector Overview¶
- Dissector language: Lua
- Compatible with standard Wireshark builds with Lua enabled
- Supports:
- Offline packet capture (
.pcap,.pcapng) - Live traffic capture over UDP/TCP
Installing the Lua Dissectors¶
Prerequisites¶
- Wireshark with Lua support (enabled by default in most installations)
Installation Steps¶
-
Locate the Wireshark plugins directory:
Linux
~/.local/lib/wireshark/plugins/Windows
C:\Users\<username>\AppData\Roaming\Wireshark\plugins\macOS
~/.local/lib/wireshark/plugins/ -
Copy the following dissector files into the plugins directory:
-
Restart Wireshark
-
Verify installation:
- Open Analyze → Enabled Protocols
- Confirm that YACP and YSMP are listed
Viewing YESDR Protocol Messages¶
Using Example PCAP Files¶
Example packet capture files are provided for learning and validation.
Sample PCAP File: Download
Steps¶
- Open Wireshark
- Load a capture file:
yacp_example.pcap
ysmp_example.pcap - Apply display filters:
GoTo Preferences -> Enabled Protocols -> HTTP --> Add Port "29525" in TCP Ports
yacp
ysmphttp - Expand protocol fields in the packet details pane to inspect:
Message types
Information Elements (IEs)
Identifiers and flags
Cause and status codes