-
Notifications
You must be signed in to change notification settings - Fork 544
npcap 1.31 (back to at least 0.9987) does not capture all packets from windows 10 network bridge #115
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@fyodor this issue is still not resolved, as I understand it. Meaning you cannot sniff, what is external device connected to one of the physical ethernet port in bridge sending or receiving. Will similar feature, as was on WinPcap capturing on bridged physical interfarces, implemented to Ncap in future? I found more questions like this unresolved with Ncap, i.e. https://ask.wireshark.org/question/1073/help-to-set-up-a-pass-through-bridge-sniffer/?answer=1082#post-id-1082 |
Tested on npcap 1.31, still missing a lot of packets, they simply do not show up in wireshark, Everything else is the same as OP |
I'm requesting issue reopen. |
Thanks for the updates @misterti and @mirozitnansky . I'm re-opening. I'll change the title to note Npcap 1.31. |
I just checked on version 1.55, behaviour is still the same on windows bridge adapter. |
This is an interesting problem. The cause is almost certainly a difference in how Windows routes traffic through the NDIS stack, since Npcap is a NDIS 6 Lightweight Filter Driver and WinPcap is a NDIS 5 Protocol Driver. But I cannot find any documentation on what a "network bridge" is within the NDIS environment. Lots of guides on how to create one with the Network Connections window or netsh.exe, but no info on how the adapters are modified or what kind of adapter the bridge itself is. NDIS or WFP docs would be best, but Powershell, .NET, or WMI docs would be great, too. I imagine I'll have to set one up and just poke at it for a while. One potential suggestion: the original network adapters may be able to be opened for capture, even if they don't show up in Wireshark's listing. Try this procedure to see if it works (dumpcap.exe can be found in
If that works, then the Npcap driver is capable of capturing on the adapter just like (though probably faster than) WinPcap did. The problem then becomes how to communicate that capability to libpcap and Wireshark. If it doesn't work, then we will probably have to look into it as part of #516, using WFP to capture this traffic instead, with a much longer fix timeline. |
Ok I'll try as you suggested. |
Ok I've tested it.
After bridge configuration, these 2 are missing, 1 new appeared dumpcap gives an error
Npcap updated to 1.60, still not able to sniff communication from Ethernet2 to router, which is part of the bridge. |
It's regrettable that npcap is unable to capture full traffic on the bridge on any bridged interface. This feature is really useful to creating taps without additional hardware (or installing WinPcap instead). Please make it work if possible. |
Error 20 is The packet32.dll code will return The error message in question comes from a call to |
That matters only in the Wireshark GUI, as it doesn't let you specify an arbitrary string to be handed to libpcap as a device name to open. The command-line tools don't have that limitation, and dumpcap is a command-line too, so the scenario in this earlier comment isn't a case of "Wireshark doesn't know about the device", it's a case of "Npcap won't let you open that device". As that scenario says:
which indicates that |
I believe we can resolve this behavior by modifying the |
Is it possible to test this modifying installed c:\Program Files\Npcap\npcap.inf directly? |
I would also be interested in testing those changes. |
This may be related to #534. Although I tested 1.71 release and it doesn't seem solved. |
When creating a network bridge in Win 10, many packets are missing from capture. Tests done:
WinPcap 4.1.3:
npcap 0.9987:
The test is done with a device, a sip telephone, booting from one side of the bridge, where it does multiple network connections in the boot process, dhcp, ntp, http, tcp and finally sip and rtp. Tried also npcap in winpcap compatible mode, same results.
The text was updated successfully, but these errors were encountered: