内容发布更新时间 : 2024/11/16 22:50:44星期一 下面是文章的全部内容请认真阅读。
1、报文抓取
A、tcpdum本机端口互发抓包 写包到tr069文件
tcpdump -i 2 -s0 tcp port 8080 -w tr069.pcap
B、用wireshark 查看内容
C、tcpdump -D 可以查看网卡序号 2、连接 2.1 Cpe
A、Cpe connect request http header POST /openacs/acs HTTP/1.1
Host: 192.168.1.115:8080
User-Agent: gSOAP/2.7
Content-Type: text/xml; charset=utf-8
Content-Length: 2023
Connection: Keep-Alive
SOAPAction: \
B、Connect request Soap 消息
SOAP-ENV:encodingStyle=\
2.2 Openacs--http header HTTP/1.1 401 Unauthorized
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181417)/JBossWeb-2.0
Set-Cookie: JSESSIONID=B7ED1CA86F84EB0B71F076607DE4ED6E; Path=/
WWW-Authenticate: Digest realm=\
Content-Type: text/html;charset=utf-8
Content-Length: 948
Date: Wed, 15 Aug 2012 05:43:47 GMT
3、认证 3.1cpe
3.1.1 http header HTTP/1.1
Host: 192.168.1.115:8080
User-Agent: gSOAP/2.7
Content-Type: text/xml; charset=utf-8
Content-Length: 2023
Connection: Keep-Alive
Authorization: Digest realm=%username=\nonce=%uri=\qop=\nc=00000001, cnonce=\response=\opaque=\
Cookie: JSESSIONID=B7ED1CA86F84EB0B71F076607DE4ED6E
SOAPAction: \
3.1.2 soap 消息