On Tue, May 9, 2017 at 7:23 AM, Brian Kantor <Brian(a)ucsd.edu> wrote:
You can look at the actual error packets by
downloading file
https://gw.ampr.org/private/errors/2.84.96.101.pcap
and use tcpdump or wireshark to look at them. Perhaps some
clue is to be found inside the packet itself. Unfortunately,
my tcpdump doesn't know how to decode the (probably) embedded
AX.25 packets in the packet payload area.
Brian,
I downloaded this pcap and opened it in Wireshark. It decodes the
embedded AX25 frames and NetRom protocol! This is very cool. Thank you
for implementing the pcap format!
Tom KD7LXL