What steps will reproduce the problem?
1. Setup OpenDPI netfilter rule to match the battlefield protocol
2. run "watch -n0 iptables -nvL" and monitor the matched packet count
3. Run BF2 and join a server
What is the expected output? What do you see instead?
Expect to see packets match the rule but non match at all
What version of the product are you using? On what operating system?
1.2.0 on Debian Linux 6.0 (Squeeze)
Please provide any additional information below.
The battlefield protocol match patterns seem to search for the string "battlefield2" and a few other things. By using tcpdump and wireshark I have not been able to locate either of these patterns for battlefield 2.
I have reversed the server information packet that is sent to the client on
each connection to the server and modified the battlefield.c source, this works
great and I am able to reliably detect BF2 connections.
I have attached the patch to fix this, but it needs review as BF2 matching may
need to be broken out from BF1942 since this packet is sent only once and the
BF1942 code is designed to sample every N ms.
Original issue reported on code.google.com by ge...@spacevs.com on 25 Mar 2011 at 3:44
Original issue reported on code.google.com by
ge...@spacevs.com
on 25 Mar 2011 at 3:44Attachments: