tr069报文汇总 下载本文

内容发布更新时间 : 2024/6/21 13:24:34星期一 下面是文章的全部内容请认真阅读。

1、报文抓取

A、tcpdum本机端口互发抓包 写包到tr069文件

tcpdump -i 2 -s0 tcp port 8080 -w tr069.pcap

B、用wireshark 查看内容

C、tcpdump -D 可以查看网卡序号 2、连接 2.1 Cpe

A、Cpe connect request http header POST /openacs/acs HTTP/1.1

Host: 192.168.1.115:8080

User-Agent: gSOAP/2.7

Content-Type: text/xml; charset=utf-8

Content-Length: 2023

Connection: Keep-Alive

SOAPAction: \

B、Connect request Soap 消息

SOAP-ENV:encodingStyle=\ FishCore 00A00D FishCore IGD Device FC1234567890

0 BOOTSTRAP 1 2012-08-15T01:43:47 0 InternetGatewayDevice.DeviceSummary InternetGatewayDevice.DeviceInfo.HardwareVersion InternetGatewayDevice.DeviceInfo.SoftwareVersion InternetGatewayDevice.DeviceInfo.ProvisioningCode InternetGatewayDevice.ManagementServer.ParameterKey InternetGatewayDevice.ManagementServer.ConnectionRequestURL

2.2 Openacs--http header HTTP/1.1 401 Unauthorized

Server: Apache-Coyote/1.1

X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181417)/JBossWeb-2.0

Set-Cookie: JSESSIONID=B7ED1CA86F84EB0B71F076607DE4ED6E; Path=/

WWW-Authenticate: Digest realm=\

Content-Type: text/html;charset=utf-8

Content-Length: 948

Date: Wed, 15 Aug 2012 05:43:47 GMT

3、认证 3.1cpe

3.1.1 http header HTTP/1.1

Host: 192.168.1.115:8080

User-Agent: gSOAP/2.7

Content-Type: text/xml; charset=utf-8

Content-Length: 2023

Connection: Keep-Alive

Authorization: Digest realm=%username=\nonce=%uri=\qop=\nc=00000001, cnonce=\response=\opaque=\

Cookie: JSESSIONID=B7ED1CA86F84EB0B71F076607DE4ED6E

SOAPAction: \

3.1.2 soap 消息