Closed echoechoin closed 7 months ago
and this SNMP pcap is identified as TLS: snmp.tar.gz
Without using Wireshark, I would say that such things may happen for malformed packets. nDPI does packet dissection different then Wireshark and thus the results (especially for malformed packets) may vary. Is that packet a forged / fuzzed one?
how about the smnp pcap files? They look like right packets.
Please try running ndpiReader
again with -d -v2
as additional arguments and paste the output here.
In the first trace, there is (only) a valid Client Hello to m.etax.chinatax.gov.cn, so the classification returned from nDPI seems correct.
In the second trace, the first pkt is a valid Client Hello, but the response from the server is a SMTP banner, in cleartext. This is completely non standard; if this is real traffic I would like to see the next reply from the client: I bet it is some kind of TCP RST or TLS error. You can see this trace as an TLS attempt connection with the server replying with random data, i.e. the TLS handshake fails. No sure what nDPI should/could do differently here...
Thanks! Our device is filled with lots of error messages. That is a big problem.
pcap.tar.gz