Blame SOURCES/wireshark-0026-mptcp.patch

5229e4
diff --git a/epan/dissectors/packet-tcp.c b/epan/dissectors/packet-tcp.c
5229e4
index 36e8afb2a3..73f4a2647a 100644
5229e4
--- a/epan/dissectors/packet-tcp.c
5229e4
+++ b/epan/dissectors/packet-tcp.c
5229e4
@@ -285,7 +285,9 @@ static int hf_mptcp_analysis_subflows_stream_id = -1;
5229e4
 static int hf_mptcp_analysis_subflows = -1;
5229e4
 static int hf_mptcp_number_of_removed_addresses = -1;
5229e4
 static int hf_mptcp_related_mapping = -1;
5229e4
-static int hf_mptcp_duplicated_data = -1;
5229e4
+static int hf_mptcp_reinjection_of = -1;
5229e4
+static int hf_mptcp_reinjected_in = -1;
5229e4
+
5229e4
 
5229e4
 static int hf_tcp_option_fast_open_cookie_request = -1;
5229e4
 static int hf_tcp_option_fast_open_cookie = -1;
5229e4
@@ -1455,8 +1457,8 @@ mptcp_init_subflow(tcp_flow_t *flow)
5229e4
 
5229e4
     DISSECTOR_ASSERT(flow->mptcp_subflow == 0);
5229e4
     flow->mptcp_subflow = sf;
5229e4
-    sf->mappings        = wmem_itree_new(wmem_file_scope());
5229e4
-    sf->dsn_map         = wmem_itree_new(wmem_file_scope());
5229e4
+    sf->ssn2dsn_mappings        = wmem_itree_new(wmem_file_scope());
5229e4
+    sf->dsn2packet_map         = wmem_itree_new(wmem_file_scope());
5229e4
 }
5229e4
 
5229e4
 
5229e4
@@ -2607,13 +2609,13 @@ guint64 rawdsn64low, guint64 rawdsn64high
5229e4
     mptcp_dsn2packet_mapping_t *packet = NULL;
5229e4
     proto_item *item = NULL;
5229e4
 
5229e4
-    results = wmem_itree_find_intervals(subflow->mappings,
5229e4
+    results = wmem_itree_find_intervals(subflow->dsn2packet_map,
5229e4
                     wmem_packet_scope(),
5229e4
                     rawdsn64low,
5229e4
                     rawdsn64high
5229e4
                     );
5229e4
 
5229e4
-    for(packet_it=wmem_list_head(results);
5229e4
+    for(packet_it = wmem_list_head(results);
5229e4
         packet_it != NULL;
5229e4
         packet_it = wmem_list_frame_next(packet_it))
5229e4
     {
5229e4
@@ -2621,43 +2623,18 @@ guint64 rawdsn64low, guint64 rawdsn64high
5229e4
         packet = (mptcp_dsn2packet_mapping_t *) wmem_list_frame_data(packet_it);
5229e4
         DISSECTOR_ASSERT(packet);
5229e4
 
5229e4
-        item = proto_tree_add_uint(tree, hf_mptcp_duplicated_data, tvb, 0, 0, packet->frame);
5229e4
+        if(pinfo->num > packet->frame) {
5229e4
+            item = proto_tree_add_uint(tree, hf_mptcp_reinjection_of, tvb, 0, 0, packet->frame);
5229e4
+        }
5229e4
+        else {
5229e4
+            item = proto_tree_add_uint(tree, hf_mptcp_reinjected_in, tvb, 0, 0, packet->frame);
5229e4
+        }
5229e4
         PROTO_ITEM_SET_GENERATED(item);
5229e4
     }
5229e4
 
5229e4
     return packet;
5229e4
 }
5229e4
 
5229e4
-/* Finds mappings that cover the sent data */
5229e4
-static mptcp_dss_mapping_t *
5229e4
-mptcp_add_matching_dss_on_subflow(packet_info *pinfo _U_, proto_tree *tree, tvbuff_t *tvb, struct mptcp_subflow *subflow,
5229e4
-guint32 relseq, guint32 seglen
5229e4
-)
5229e4
-{
5229e4
-    wmem_list_t *results = NULL;
5229e4
-    wmem_list_frame_t *dss_it = NULL;
5229e4
-    mptcp_dss_mapping_t *mapping = NULL;
5229e4
-    proto_item *item = NULL;
5229e4
-
5229e4
-    results = wmem_itree_find_intervals(subflow->mappings,
5229e4
-                    wmem_packet_scope(),
5229e4
-                    relseq,
5229e4
-                    (seglen) ? relseq + seglen - 1 : relseq
5229e4
-                    );
5229e4
-
5229e4
-    for(dss_it=wmem_list_head(results);
5229e4
-        dss_it!= NULL;
5229e4
-        dss_it= wmem_list_frame_next(dss_it))
5229e4
-    {
5229e4
-        mapping = (mptcp_dss_mapping_t *) wmem_list_frame_data(dss_it);
5229e4
-        DISSECTOR_ASSERT(mapping);
5229e4
-
5229e4
-        item = proto_tree_add_uint(tree, hf_mptcp_related_mapping, tvb, 0, 0, mapping->frame);
5229e4
-        PROTO_ITEM_SET_GENERATED(item);
5229e4
-    }
5229e4
-
5229e4
-    return mapping;
5229e4
-}
5229e4
 
5229e4
 /* Lookup mappings that describe the packet and then converts the tcp seq number
5229e4
  * into the MPTCP Data Sequence Number (DSN)
5229e4
@@ -2698,13 +2675,29 @@ mptcp_analysis_dsn_lookup(packet_info *pinfo , tvbuff_t *tvb,
5229e4
         rawdsn = tcpd->fwd->mptcp_subflow->meta->base_dsn;
5229e4
         convert = DSN_CONV_NONE;
5229e4
     }
5229e4
+    /* if it's a non-syn packet without data (just used to convey TCP options)
5229e4
+     * then there would be no mappings */
5229e4
+    else if(relseq == 1 && tcph->th_seglen == 0) {
5229e4
+        rawdsn = tcpd->fwd->mptcp_subflow->meta->base_dsn + 1;
5229e4
+        convert = DSN_CONV_NONE;
5229e4
+    }
5229e4
     else {
5229e4
-        /* display packets that conveyed the mappings covering the data range */
5229e4
-        mapping = mptcp_add_matching_dss_on_subflow(pinfo, parent_tree, tvb,
5229e4
-                            tcpd->fwd->mptcp_subflow, relseq,
5229e4
-                            (tcph->th_have_seglen) ? tcph->th_seglen : 0
5229e4
-                                                    );
5229e4
-        if(mapping == NULL) {
5229e4
+
5229e4
+        wmem_list_frame_t *dss_it = NULL;
5229e4
+        wmem_list_t *results = NULL;
5229e4
+        guint32 ssn_low = relseq;
5229e4
+        guint32 seglen = tcph->th_seglen;
5229e4
+
5229e4
+        results = wmem_itree_find_intervals(tcpd->fwd->mptcp_subflow->ssn2dsn_mappings,
5229e4
+                    wmem_packet_scope(),
5229e4
+                    ssn_low,
5229e4
+                    (seglen) ? ssn_low + seglen - 1 : ssn_low
5229e4
+                    );
5229e4
+        dss_it = wmem_list_head(results); /* assume it's always ok */
5229e4
+        if(dss_it) {
5229e4
+            mapping = (mptcp_dss_mapping_t *) wmem_list_frame_data(dss_it);
5229e4
+        }
5229e4
+        if(dss_it == NULL || mapping == NULL) {
5229e4
             expert_add_info(pinfo, parent_tree, &ei_mptcp_mapping_missing);
5229e4
             return;
5229e4
         }
5229e4
@@ -2713,6 +2706,19 @@ mptcp_analysis_dsn_lookup(packet_info *pinfo , tvbuff_t *tvb,
5229e4
         }
5229e4
 
5229e4
         DISSECTOR_ASSERT(mapping);
5229e4
+        if(seglen) {
5229e4
+            /* Finds mappings that cover the sent data and adds them to the dissection tree */
5229e4
+            for(dss_it = wmem_list_head(results);
5229e4
+                dss_it != NULL;
5229e4
+                dss_it = wmem_list_frame_next(dss_it))
5229e4
+            {
5229e4
+                mapping = (mptcp_dss_mapping_t *) wmem_list_frame_data(dss_it);
5229e4
+                DISSECTOR_ASSERT(mapping);
5229e4
+
5229e4
+                item = proto_tree_add_uint(parent_tree, hf_mptcp_related_mapping, tvb, 0, 0, mapping->frame);
5229e4
+                PROTO_ITEM_SET_GENERATED(item);
5229e4
+            }
5229e4
+        }
5229e4
 
5229e4
         convert = (mapping->extended_dsn) ? DSN_CONV_NONE : DSN_CONV_32_TO_64;
5229e4
         DISSECTOR_ASSERT(mptcp_map_relssn_to_rawdsn(mapping, relseq, &rawdsn));
5229e4
@@ -2732,39 +2738,40 @@ mptcp_analysis_dsn_lookup(packet_info *pinfo , tvbuff_t *tvb,
5229e4
             proto_item_append_text(item, " (Relative)");
5229e4
         }
5229e4
 
5229e4
-        /* register */
5229e4
-        if (!PINFO_FD_VISITED(pinfo))
5229e4
-        {
5229e4
-            mptcp_dsn2packet_mapping_t *packet;
5229e4
-            packet = wmem_new0(wmem_file_scope(), mptcp_dsn2packet_mapping_t);
5229e4
-            packet->frame = pinfo->fd->num;
5229e4
-            packet->subflow = tcpd;
5229e4
-
5229e4
-            /* tcph->th_mptcp->mh_rawdsn64 */
5229e4
-            if (tcph->th_have_seglen) {
5229e4
-                wmem_itree_insert(tcpd->fwd->mptcp_subflow->dsn_map,
5229e4
+        /* register dsn->packet mapping */
5229e4
+        if(mptcp_intersubflows_retransmission
5229e4
+            && !PINFO_FD_VISITED(pinfo)
5229e4
+            && tcph->th_seglen > 0
5229e4
+          ) {
5229e4
+                mptcp_dsn2packet_mapping_t *packet = 0;
5229e4
+                packet = wmem_new0(wmem_file_scope(), mptcp_dsn2packet_mapping_t);
5229e4
+                packet->frame = pinfo->fd->num;
5229e4
+                packet->subflow = tcpd;
5229e4
+
5229e4
+                wmem_itree_insert(tcpd->fwd->mptcp_subflow->dsn2packet_map,
5229e4
                         tcph->th_mptcp->mh_rawdsn64,
5229e4
                         tcph->th_mptcp->mh_rawdsn64 + (tcph->th_seglen - 1 ),
5229e4
                         packet
5229e4
                         );
5229e4
-            }
5229e4
         }
5229e4
         PROTO_ITEM_SET_GENERATED(item);
5229e4
 
5229e4
         /* We can do this only if rawdsn64 is valid !
5229e4
         if enabled, look for overlapping mappings on other subflows */
5229e4
-        if(mptcp_intersubflows_retransmission) {
5229e4
+        if(mptcp_intersubflows_retransmission
5229e4
+            && tcph->th_have_seglen
5229e4
+            && tcph->th_seglen) {
5229e4
 
5229e4
             wmem_list_frame_t *subflow_it = NULL;
5229e4
 
5229e4
-            /* results should be some kind of  in case 2 DSS are needed to cover this packet */
5229e4
+            /* results should be some kind of list in case 2 DSS are needed to cover this packet */
5229e4
             for(subflow_it = wmem_list_head(mptcpd->subflows); subflow_it != NULL; subflow_it = wmem_list_frame_next(subflow_it)) {
5229e4
                 struct tcp_analysis *sf_tcpd = (struct tcp_analysis *)wmem_list_frame_data(subflow_it);
5229e4
                 struct mptcp_subflow *sf = mptcp_select_subflow_from_meta(sf_tcpd, tcpd->fwd->mptcp_subflow->meta);
5229e4
 
5229e4
                 /* for current subflow */
5229e4
                 if (sf == tcpd->fwd->mptcp_subflow) {
5229e4
-                    /* skip, was done just before */
5229e4
+                    /* skip, this is the current subflow */
5229e4
                 }
5229e4
                 /* in case there were retransmissions on other subflows */
5229e4
                 else  {
5229e4
@@ -2776,7 +2783,7 @@ mptcp_analysis_dsn_lookup(packet_info *pinfo , tvbuff_t *tvb,
5229e4
         }
5229e4
     }
5229e4
     else {
5229e4
-        /* ignore and continue */
5229e4
+        /* could not get the rawdsn64, ignore and continue */
5229e4
     }
5229e4
 
5229e4
 }
5229e4
@@ -4590,7 +4597,6 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
 
5229e4
                     if (!PINFO_FD_VISITED(pinfo))
5229e4
                     {
5229e4
-
5229e4
                         /* register SSN range described by the mapping into a subflow interval_tree */
5229e4
                         mptcp_dss_mapping_t *mapping = NULL;
5229e4
                         mapping = wmem_new0(wmem_file_scope(), mptcp_dss_mapping_t);
5229e4
@@ -4601,7 +4607,7 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
                         mapping->ssn_low = mph->mh_dss_ssn;
5229e4
                         mapping->ssn_high = mph->mh_dss_ssn + mph->mh_dss_length-1;
5229e4
 
5229e4
-                        wmem_itree_insert(tcpd->fwd->mptcp_subflow->mappings,
5229e4
+                        wmem_itree_insert(tcpd->fwd->mptcp_subflow->ssn2dsn_mappings,
5229e4
                             mph->mh_dss_ssn,
5229e4
                             mapping->ssn_high,
5229e4
                             mapping
5229e4
@@ -7564,15 +7570,19 @@ proto_register_tcp(void)
5229e4
             "This frame has some of the MPTCP analysis shown", HFILL }},
5229e4
 
5229e4
         { &hf_mptcp_related_mapping,
5229e4
-          { "Related mapping",   "mptcp.related_mapping", FT_FRAMENUM , BASE_NONE, NULL, 0x0,
5229e4
-            "Packet in which mapping describing current packet was sent", HFILL }},
5229e4
+          { "Related mapping", "mptcp.related_mapping", FT_FRAMENUM , BASE_NONE, NULL, 0x0,
5229e4
+            "Packet in which current packet DSS mapping was sent", HFILL }},
5229e4
+
5229e4
+        { &hf_mptcp_reinjection_of,
5229e4
+          { "Reinjection of", "mptcp.reinjection_of", FT_FRAMENUM , BASE_NONE, NULL, 0x0,
5229e4
+            "This is a retransmission of data sent on another subflow", HFILL }},
5229e4
 
5229e4
-        { &hf_mptcp_duplicated_data,
5229e4
-          { "Was data duplicated",   "mptcp.duplicated_dsn", FT_FRAMENUM , BASE_NONE, NULL, 0x0,
5229e4
+        { &hf_mptcp_reinjected_in,
5229e4
+          { "Data reinjected in", "mptcp.reinjected_in", FT_FRAMENUM , BASE_NONE, NULL, 0x0,
5229e4
             "This was retransmitted on another subflow", HFILL }},
5229e4
 
5229e4
         { &hf_mptcp_analysis_subflows,
5229e4
-          { "TCP subflow stream id(s):",   "mptcp.analysis.subflows", FT_NONE, BASE_NONE, NULL, 0x0,
5229e4
+          { "TCP subflow stream id(s):", "mptcp.analysis.subflows", FT_NONE, BASE_NONE, NULL, 0x0,
5229e4
             "List all TCP connections mapped to this MPTCP connection", HFILL }},
5229e4
 
5229e4
         { &hf_mptcp_stream,
5229e4
@@ -7752,13 +7762,16 @@ proto_register_tcp(void)
5229e4
         &mptcp_relative_seq);
5229e4
 
5229e4
     prefs_register_bool_preference(mptcp_module, "analyze_mappings",
5229e4
-        "In depth analysis of Data Sequence Signal (DSS) mappings.",
5229e4
+        "Deeper analysis of Data Sequence Signal (DSS)",
5229e4
+        "Scales logarithmically with the number of packets"
5229e4
         "You need to capture the handshake for this to work."
5229e4
         "\"Map TCP subflows to their respective MPTCP connections\"",
5229e4
         &mptcp_analyze_mappings);
5229e4
 
5229e4
     prefs_register_bool_preference(mptcp_module, "intersubflows_retransmission",
5229e4
         "Check for data duplication across subflows",
5229e4
+        "(Greedy algorithm: Scales linearly with number of subflows and"
5229e4
+        " logarithmic scaling with number of packets)"
5229e4
         "You need to enable DSS mapping analysis for this option to work",
5229e4
         &mptcp_intersubflows_retransmission);
5229e4
 
5229e4
diff --git a/epan/dissectors/packet-tcp.h b/epan/dissectors/packet-tcp.h
5229e4
index 7f84351ade..c1811fa049 100644
5229e4
--- a/epan/dissectors/packet-tcp.h
5229e4
+++ b/epan/dissectors/packet-tcp.h
5229e4
@@ -257,15 +257,16 @@ struct mptcp_subflow {
5229e4
 	guint8 address_id;   /* sent during an MP_JOIN */
5229e4
 
5229e4
 
5229e4
-	/* Attempt to map DSN to packets
5229e4
-	 * Ideally this was to generate application latency
5229e4
-	 * each node contains a GSList * ?
5229e4
-	 * this should be done in tap or 3rd party tools
5229e4
+	/* map DSN to packets
5229e4
+	 * Used when looking for reinjections across subflows
5229e4
 	 */
5229e4
-	wmem_itree_t *dsn_map;
5229e4
+	wmem_itree_t *dsn2packet_map;
5229e4
 
5229e4
-	/* Map SSN to a DSS mappings, each node registers a mptcp_dss_mapping_t */
5229e4
-	wmem_itree_t *mappings;
5229e4
+	/* Map SSN to a DSS mappings
5229e4
+	 * a DSS can map DSN to SSNs possibily over several packets,
5229e4
+	 * hence some packets may have been mapped by previous DSS,
5229e4
+	 * whence the necessity to be able to look for SSN -> DSN */
5229e4
+	wmem_itree_t *ssn2dsn_mappings;
5229e4
 	/* meta flow to which it is attached. Helps setting forward and backward meta flow */
5229e4
 	mptcp_meta_flow_t *meta;
5229e4
 };
5229e4
diff --git a/epan/wmem/wmem_interval_tree.c b/epan/wmem/wmem_interval_tree.c
5229e4
index d52267de18..48888996b7 100644
5229e4
--- a/epan/wmem/wmem_interval_tree.c
5229e4
+++ b/epan/wmem/wmem_interval_tree.c
5229e4
@@ -121,7 +121,7 @@ wmem_itree_insert(wmem_itree_t *tree, const guint64 low, const guint64 high, voi
5229e4
     node = wmem_tree_insert(tree, range, data, (compare_func)wmem_tree_compare_ranges);
5229e4
 
5229e4
     /* Even If no rotations, still a need to update max_edge */
5229e4
-    update_max_edge(node);
5229e4
+    update_max_edge(node->parent);
5229e4
 }
5229e4
 
5229e4
 
5229e4
diff --git a/epan/dissectors/packet-tcp.c b/epan/dissectors/packet-tcp.c
5229e4
index 74e9b6b10c..efcfa005af 100644
5229e4
--- a/epan/dissectors/packet-tcp.c
5229e4
+++ b/epan/dissectors/packet-tcp.c
5229e4
@@ -4361,6 +4361,35 @@ get_or_create_mptcpd_from_key(struct tcp_analysis* tcpd, tcp_flow_t *fwd, guint6
5229e4
     return mptcpd;
5229e4
 }
5229e4
 
5229e4
+/* record this mapping */
5229e4
+static
5229e4
+void analyze_mapping(struct tcp_analysis *tcpd, packet_info *pinfo, guint16 len, guint64 dsn, gboolean extended, guint32 ssn) {
5229e4
+
5229e4
+    /* store mapping only if analysis is enabled and mapping is not unlimited */
5229e4
+    if (!mptcp_analyze_mappings || !len) {
5229e4
+        return;
5229e4
+    }
5229e4
+
5229e4
+    if (PINFO_FD_VISITED(pinfo)) {
5229e4
+        return;
5229e4
+    }
5229e4
+
5229e4
+    /* register SSN range described by the mapping into a subflow interval_tree */
5229e4
+    mptcp_dss_mapping_t *mapping = NULL;
5229e4
+    mapping = wmem_new0(wmem_file_scope(), mptcp_dss_mapping_t);
5229e4
+
5229e4
+    mapping->rawdsn  = dsn;
5229e4
+    mapping->extended_dsn = extended;
5229e4
+    mapping->frame = pinfo->fd->num;
5229e4
+    mapping->ssn_low = ssn;
5229e4
+    mapping->ssn_high = ssn + len - 1;
5229e4
+
5229e4
+    wmem_itree_insert(tcpd->fwd->mptcp_subflow->ssn2dsn_mappings,
5229e4
+        mapping->ssn_low,
5229e4
+        mapping->ssn_high,
5229e4
+        mapping
5229e4
+        );
5229e4
+}
5229e4
 
5229e4
 /*
5229e4
  * The TCP Extensions for Multipath Operation with Multiple Addresses
5229e4
@@ -4449,8 +4478,11 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
             }
5229e4
             offset += 1;
5229e4
 
5229e4
-            /* optlen == 12 => SYN or SYN/ACK; optlen == 20 => ACK */
5229e4
-            if (optlen == 12 || optlen == 20) {
5229e4
+            /* optlen == 12 => SYN or SYN/ACK; optlen == 20 => ACK;
5229e4
+             * optlen == 22 => ACK + data (v1 only);
5229e4
+             * optlen == 24 => ACK + data + csum (v1 only)
5229e4
+             */
5229e4
+            if (optlen == 12 || optlen == 20 || optlen == 22 || optlen == 24) {
5229e4
 
5229e4
                 mph->mh_key = tvb_get_ntoh64(tvb,offset);
5229e4
                 proto_tree_add_uint64(mptcp_tree, hf_tcp_option_mptcp_sender_key, tvb, offset, 8, mph->mh_key);
5229e4
@@ -4468,9 +4500,10 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
                 PROTO_ITEM_SET_GENERATED(item);
5229e4
 
5229e4
                 /* last ACK of 3WHS, repeats both keys */
5229e4
-                if (optlen == 20) {
5229e4
+                if (optlen >= 20) {
5229e4
                     guint64 recv_key = tvb_get_ntoh64(tvb,offset);
5229e4
                     proto_tree_add_uint64(mptcp_tree, hf_tcp_option_mptcp_recv_key, tvb, offset, 8, recv_key);
5229e4
+                    offset += 8;
5229e4
 
5229e4
                     if(tcpd->rev->mptcp_subflow->meta
5229e4
                         && (tcpd->rev->mptcp_subflow->meta->static_flags & MPTCP_META_HAS_KEY)) {
5229e4
@@ -4484,6 +4517,26 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
                         mptcpd = get_or_create_mptcpd_from_key(tcpd, tcpd->rev, recv_key, mph->mh_capable_flags & MPTCP_CAPABLE_CRYPTO_MASK);
5229e4
                     }
5229e4
                 }
5229e4
+
5229e4
+                /* MPTCP v1 ACK + data, contains data_len and optional checksum */
5229e4
+                if (optlen >= 22) {
5229e4
+                    proto_tree_add_item(mptcp_tree, hf_tcp_option_mptcp_data_lvl_len, tvb, offset, 2, ENC_BIG_ENDIAN);
5229e4
+                    mph->mh_dss_length = tvb_get_ntohs(tvb,offset);
5229e4
+                    offset += 2;
5229e4
+
5229e4
+                    if (mph->mh_dss_length == 0) {
5229e4
+                        expert_add_info(pinfo, mptcp_tree, &ei_mptcp_infinite_mapping);
5229e4
+                    }
5229e4
+
5229e4
+                    /* when data len is present, this MP_CAPABLE also carries an implicit mapping ... */
5229e4
+                    analyze_mapping(tcpd, pinfo, mph->mh_dss_length, tcpd->fwd->mptcp_subflow->meta->base_dsn + 1, TRUE, tcph->th_seq);
5229e4
+
5229e4
+                    /* ... with optional checksum */
5229e4
+                    if (optlen == 24)
5229e4
+                    {
5229e4
+                        proto_tree_add_checksum(mptcp_tree, tvb, offset, hf_tcp_option_mptcp_checksum, -1, NULL, pinfo, 0, ENC_BIG_ENDIAN, PROTO_CHECKSUM_NO_FLAGS);
5229e4
+                    }
5229e4
+                }
5229e4
             }
5229e4
             break;
5229e4
 
5229e4
@@ -4650,29 +4703,7 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
                     /* ignore and continue */
5229e4
                 }
5229e4
 
5229e4
-                /* if mapping analysis enabled and not a */
5229e4
-                if(mptcp_analyze_mappings && mph->mh_dss_length)
5229e4
-                {
5229e4
-
5229e4
-                    if (!PINFO_FD_VISITED(pinfo))
5229e4
-                    {
5229e4
-                        /* register SSN range described by the mapping into a subflow interval_tree */
5229e4
-                        mptcp_dss_mapping_t *mapping = NULL;
5229e4
-                        mapping = wmem_new0(wmem_file_scope(), mptcp_dss_mapping_t);
5229e4
-
5229e4
-                        mapping->rawdsn  = mph->mh_dss_rawdsn;
5229e4
-                        mapping->extended_dsn = (mph->mh_dss_flags & MPTCP_DSS_FLAG_DATA_ACK_8BYTES);
5229e4
-                        mapping->frame = pinfo->fd->num;
5229e4
-                        mapping->ssn_low = mph->mh_dss_ssn;
5229e4
-                        mapping->ssn_high = mph->mh_dss_ssn + mph->mh_dss_length-1;
5229e4
-
5229e4
-                        wmem_itree_insert(tcpd->fwd->mptcp_subflow->ssn2dsn_mappings,
5229e4
-                            mph->mh_dss_ssn,
5229e4
-                            mapping->ssn_high,
5229e4
-                            mapping
5229e4
-                            );
5229e4
-                    }
5229e4
-                }
5229e4
+                analyze_mapping(tcpd, pinfo, mph->mh_dss_length, mph->mh_dss_rawdsn, mph->mh_dss_flags & MPTCP_DSS_FLAG_DATA_ACK_8BYTES, mph->mh_dss_ssn);
5229e4
 
5229e4
                 if ((int)optlen >= offset-start_offset+4)
5229e4
                 {
5229e4
diff --git a/epan/dissectors/packet-tcp.c b/epan/dissectors/packet-tcp.c
5229e4
index efcfa005af..238b592927 100644
5229e4
--- a/epan/dissectors/packet-tcp.c
5229e4
+++ b/epan/dissectors/packet-tcp.c
5229e4
@@ -246,7 +246,8 @@ static int hf_tcp_option_mptcp_flags = -1;
5229e4
 static int hf_tcp_option_mptcp_backup_flag = -1;
5229e4
 static int hf_tcp_option_mptcp_checksum_flag = -1;
5229e4
 static int hf_tcp_option_mptcp_B_flag = -1;
5229e4
-static int hf_tcp_option_mptcp_H_flag = -1;
5229e4
+static int hf_tcp_option_mptcp_H_v0_flag = -1;
5229e4
+static int hf_tcp_option_mptcp_H_v1_flag = -1;
5229e4
 static int hf_tcp_option_mptcp_F_flag = -1;
5229e4
 static int hf_tcp_option_mptcp_m_flag = -1;
5229e4
 static int hf_tcp_option_mptcp_M_flag = -1;
5229e4
@@ -593,10 +594,18 @@ static guint32 mptcp_stream_count;
5229e4
  */
5229e4
 static wmem_tree_t *mptcp_tokens = NULL;
5229e4
 
5229e4
-static const int *tcp_option_mptcp_capable_flags[] = {
5229e4
+static const int *tcp_option_mptcp_capable_v0_flags[] = {
5229e4
   &hf_tcp_option_mptcp_checksum_flag,
5229e4
   &hf_tcp_option_mptcp_B_flag,
5229e4
-  &hf_tcp_option_mptcp_H_flag,
5229e4
+  &hf_tcp_option_mptcp_H_v0_flag,
5229e4
+  &hf_tcp_option_mptcp_reserved_flag,
5229e4
+  NULL
5229e4
+};
5229e4
+
5229e4
+static const int *tcp_option_mptcp_capable_v1_flags[] = {
5229e4
+  &hf_tcp_option_mptcp_checksum_flag,
5229e4
+  &hf_tcp_option_mptcp_B_flag,
5229e4
+  &hf_tcp_option_mptcp_H_v1_flag,
5229e4
   &hf_tcp_option_mptcp_reserved_flag,
5229e4
   NULL
5229e4
 };
5229e4
@@ -2574,6 +2583,24 @@ mptcp_cryptodata_sha1(const guint64 key, guint32 *token, guint64 *idsn)
5229e4
     *idsn = GUINT64_FROM_BE(_isdn);
5229e4
 }
5229e4
 
5229e4
+/* Generate the initial data sequence number and MPTCP connection token from the key. */
5229e4
+static void
5229e4
+mptcp_cryptodata_sha256(const guint64 key, guint32 *token, guint64 *idsn)
5229e4
+{
5229e4
+    guint8 digest_buf[HASH_SHA2_256_LENGTH];
5229e4
+    guint64 pseudokey = GUINT64_TO_BE(key);
5229e4
+    guint32 _token;
5229e4
+    guint64 _isdn;
5229e4
+
5229e4
+    gcry_md_hash_buffer(GCRY_MD_SHA256, digest_buf, (const guint8 *)&pseudokey, 8);
5229e4
+
5229e4
+    /* memcpy to prevent -Wstrict-aliasing errors with GCC 4 */
5229e4
+    memcpy(&_token, digest_buf, sizeof(_token));
5229e4
+    *token = GUINT32_FROM_BE(_token);
5229e4
+    memcpy(&_isdn, digest_buf + HASH_SHA2_256_LENGTH - sizeof(_isdn), sizeof(_isdn));
5229e4
+    *idsn = GUINT64_FROM_BE(_isdn);
5229e4
+}
5229e4
+
5229e4
 
5229e4
 /* Print formatted list of tcp stream ids that are part of the connection */
5229e4
 static void
5229e4
@@ -4338,7 +4365,7 @@ mptcp_get_meta_from_token(struct tcp_analysis* tcpd, tcp_flow_t *tcp_flow, guint
5229e4
 /* setup from_key */
5229e4
 static
5229e4
 struct mptcp_analysis*
5229e4
-get_or_create_mptcpd_from_key(struct tcp_analysis* tcpd, tcp_flow_t *fwd, guint64 key, guint8 hmac_algo _U_) {
5229e4
+get_or_create_mptcpd_from_key(struct tcp_analysis* tcpd, tcp_flow_t *fwd, guint8 version, guint64 key, guint8 hmac_algo _U_) {
5229e4
 
5229e4
     guint32 token = 0;
5229e4
     guint64 expected_idsn= 0;
5229e4
@@ -4348,8 +4375,11 @@ get_or_create_mptcpd_from_key(struct tcp_analysis* tcpd, tcp_flow_t *fwd, guint6
5229e4
         return mptcpd;
5229e4
     }
5229e4
 
5229e4
-    /* MPTCP only standardizes SHA1 for now. */
5229e4
-    mptcp_cryptodata_sha1(key, &token, &expected_idsn);
5229e4
+    /* MPTCP v0 only standardizes SHA1, and v1 SHA256. */
5229e4
+    if (version == 0)
5229e4
+        mptcp_cryptodata_sha1(key, &token, &expected_idsn);
5229e4
+    else if (version == 1)
5229e4
+        mptcp_cryptodata_sha256(key, &token, &expected_idsn);
5229e4
 
5229e4
     mptcpd = mptcp_get_meta_from_token(tcpd, fwd, token);
5229e4
 
5229e4
@@ -4409,6 +4439,7 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
     proto_item *item,*main_item;
5229e4
     proto_tree *mptcp_tree;
5229e4
 
5229e4
+    guint32 version;
5229e4
     guint8 subtype;
5229e4
     guint8 ipver;
5229e4
     int offset = 0;
5229e4
@@ -4462,18 +4493,19 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
         case TCPOPT_MPTCP_MP_CAPABLE:
5229e4
             mph->mh_mpc = TRUE;
5229e4
 
5229e4
-            proto_tree_add_item(mptcp_tree, hf_tcp_option_mptcp_version, tvb,
5229e4
-                        offset, 1, ENC_BIG_ENDIAN);
5229e4
+            proto_tree_add_item_ret_uint(mptcp_tree, hf_tcp_option_mptcp_version, tvb,
5229e4
+                        offset, 1, ENC_BIG_ENDIAN, &version);
5229e4
             offset += 1;
5229e4
 
5229e4
             item = proto_tree_add_bitmask(mptcp_tree, tvb, offset, hf_tcp_option_mptcp_flags,
5229e4
-                         ett_tcp_option_mptcp, tcp_option_mptcp_capable_flags,
5229e4
+                         ett_tcp_option_mptcp,
5229e4
+                         version == 1 ? tcp_option_mptcp_capable_v1_flags : tcp_option_mptcp_capable_v0_flags,
5229e4
                          ENC_BIG_ENDIAN);
5229e4
             mph->mh_capable_flags = tvb_get_guint8(tvb, offset);
5229e4
             if ((mph->mh_capable_flags & MPTCP_CAPABLE_CRYPTO_MASK) == 0) {
5229e4
                 expert_add_info(pinfo, item, &ei_mptcp_analysis_missing_algorithm);
5229e4
             }
5229e4
-            if ((mph->mh_capable_flags & MPTCP_CAPABLE_CRYPTO_MASK) != MPTCP_HMAC_SHA1) {
5229e4
+            if ((mph->mh_capable_flags & MPTCP_CAPABLE_CRYPTO_MASK) != MPTCP_HMAC_SHA) {
5229e4
                 expert_add_info(pinfo, item, &ei_mptcp_analysis_unsupported_algorithm);
5229e4
             }
5229e4
             offset += 1;
5229e4
@@ -4488,7 +4520,7 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
                 proto_tree_add_uint64(mptcp_tree, hf_tcp_option_mptcp_sender_key, tvb, offset, 8, mph->mh_key);
5229e4
                 offset += 8;
5229e4
 
5229e4
-                mptcpd = get_or_create_mptcpd_from_key(tcpd, tcpd->fwd, mph->mh_key, mph->mh_capable_flags & MPTCP_CAPABLE_CRYPTO_MASK);
5229e4
+                mptcpd = get_or_create_mptcpd_from_key(tcpd, tcpd->fwd, version, mph->mh_key, mph->mh_capable_flags & MPTCP_CAPABLE_CRYPTO_MASK);
5229e4
                 mptcpd->master = tcpd;
5229e4
 
5229e4
                 item = proto_tree_add_uint(mptcp_tree,
5229e4
@@ -4514,7 +4546,7 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
                         }
5229e4
                     }
5229e4
                     else {
5229e4
-                        mptcpd = get_or_create_mptcpd_from_key(tcpd, tcpd->rev, recv_key, mph->mh_capable_flags & MPTCP_CAPABLE_CRYPTO_MASK);
5229e4
+                        mptcpd = get_or_create_mptcpd_from_key(tcpd, tcpd->rev, version, recv_key, mph->mh_capable_flags & MPTCP_CAPABLE_CRYPTO_MASK);
5229e4
                     }
5229e4
                 }
5229e4
 
5229e4
@@ -7147,10 +7179,14 @@ proto_register_tcp(void)
5229e4
           { "Extensibility", "tcp.options.mptcp.extensibility.flag", FT_UINT8,
5229e4
             BASE_DEC, NULL, 0x40, NULL, HFILL}},
5229e4
 
5229e4
-        { &hf_tcp_option_mptcp_H_flag,
5229e4
+        { &hf_tcp_option_mptcp_H_v0_flag,
5229e4
           { "Use HMAC-SHA1", "tcp.options.mptcp.sha1.flag", FT_UINT8,
5229e4
             BASE_DEC, NULL, 0x01, NULL, HFILL}},
5229e4
 
5229e4
+        { &hf_tcp_option_mptcp_H_v1_flag,
5229e4
+          { "Use HMAC-SHA256", "tcp.options.mptcp.sha256.flag", FT_UINT8,
5229e4
+            BASE_DEC, NULL, 0x01, NULL, HFILL}},
5229e4
+
5229e4
         { &hf_tcp_option_mptcp_F_flag,
5229e4
           { "DATA_FIN", "tcp.options.mptcp.datafin.flag", FT_UINT8,
5229e4
             BASE_DEC, NULL, MPTCP_DSS_FLAG_DATA_FIN_PRESENT, NULL, HFILL}},
5229e4
diff --git a/epan/dissectors/packet-tcp.h b/epan/dissectors/packet-tcp.h
5229e4
index dfee9cdeb4..38630d3a51 100644
5229e4
--- a/epan/dissectors/packet-tcp.h
5229e4
+++ b/epan/dissectors/packet-tcp.h
5229e4
@@ -277,7 +277,8 @@ struct mptcp_subflow {
5229e4
 
5229e4
 typedef enum {
5229e4
 	MPTCP_HMAC_NOT_SET = 0,
5229e4
-	MPTCP_HMAC_SHA1 = 1,
5229e4
+	/* this is either SHA1 for MPTCP v0 or sha256 for MPTCP v1 */
5229e4
+	MPTCP_HMAC_SHA = 1,
5229e4
 	MPTCP_HMAC_LAST
5229e4
 } mptcp_hmac_algorithm_t;
5229e4
 
5229e4
diff --git a/epan/dissectors/packet-tcp.c b/epan/dissectors/packet-tcp.c
5229e4
index c4a9a6eb15..ca284604ed 100644
5229e4
--- a/epan/dissectors/packet-tcp.c
5229e4
+++ b/epan/dissectors/packet-tcp.c
5229e4
@@ -271,6 +271,7 @@ static int hf_tcp_option_mptcp_subflow_seq_no = -1;
5229e4
 static int hf_tcp_option_mptcp_data_lvl_len = -1;
5229e4
 static int hf_tcp_option_mptcp_checksum = -1;
5229e4
 static int hf_tcp_option_mptcp_ipver = -1;
5229e4
+static int hf_tcp_option_mptcp_echo = -1;
5229e4
 static int hf_tcp_option_mptcp_ipv4 = -1;
5229e4
 static int hf_tcp_option_mptcp_ipv6 = -1;
5229e4
 static int hf_tcp_option_mptcp_port = -1;
5229e4
@@ -4776,33 +4777,32 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
             break;
5229e4
 
5229e4
         case TCPOPT_MPTCP_ADD_ADDR:
5229e4
-            proto_tree_add_item(mptcp_tree,
5229e4
-                            hf_tcp_option_mptcp_ipver, tvb, offset, 1, ENC_BIG_ENDIAN);
5229e4
             ipver = tvb_get_guint8(tvb, offset) & 0x0F;
5229e4
+            if (ipver == 4 || ipver == 6)
5229e4
+                proto_tree_add_item(mptcp_tree,
5229e4
+                            hf_tcp_option_mptcp_ipver, tvb, offset, 1, ENC_BIG_ENDIAN);
5229e4
+            else
5229e4
+                proto_tree_add_item(mptcp_tree,
5229e4
+                            hf_tcp_option_mptcp_echo, tvb, offset, 1, ENC_BIG_ENDIAN);
5229e4
             offset += 1;
5229e4
 
5229e4
             proto_tree_add_item(mptcp_tree,
5229e4
                     hf_tcp_option_mptcp_address_id, tvb, offset, 1, ENC_BIG_ENDIAN);
5229e4
             offset += 1;
5229e4
 
5229e4
-            switch (ipver) {
5229e4
-                case 4:
5229e4
-                    proto_tree_add_item(mptcp_tree,
5229e4
+            if (optlen == 8 || optlen == 10 || optlen == 16 || optlen == 18) {
5229e4
+                proto_tree_add_item(mptcp_tree,
5229e4
                             hf_tcp_option_mptcp_ipv4, tvb, offset, 4, ENC_BIG_ENDIAN);
5229e4
-                    offset += 4;
5229e4
-                    break;
5229e4
+                offset += 4;
5229e4
+            }
5229e4
 
5229e4
-                case 6:
5229e4
-                    proto_tree_add_item(mptcp_tree,
5229e4
+            if (optlen == 20 || optlen == 22 || optlen == 28 || optlen == 30) {
5229e4
+                proto_tree_add_item(mptcp_tree,
5229e4
                             hf_tcp_option_mptcp_ipv6, tvb, offset, 16, ENC_NA);
5229e4
-                    offset += 16;
5229e4
-                    break;
5229e4
-
5229e4
-                default:
5229e4
-                    break;
5229e4
+                offset += 16;
5229e4
             }
5229e4
 
5229e4
-            if (optlen % 4 == 2) {
5229e4
+            if (optlen == 10 || optlen == 18 || optlen == 22 || optlen == 30) {
5229e4
                 proto_tree_add_item(mptcp_tree,
5229e4
                             hf_tcp_option_mptcp_port, tvb, offset, 2, ENC_BIG_ENDIAN);
5229e4
                 offset += 2;
5229e4
@@ -7303,6 +7303,10 @@ proto_register_tcp(void)
5229e4
           { "IP version", "tcp.options.mptcp.ipver", FT_UINT8,
5229e4
             BASE_DEC, NULL, 0x0F, NULL, HFILL}},
5229e4
 
5229e4
+        { &hf_tcp_option_mptcp_echo,
5229e4
+          { "Echo", "tcp.options.mptcp.echo", FT_UINT8,
5229e4
+            BASE_DEC, NULL, 0x01, NULL, HFILL}},
5229e4
+
5229e4
         { &hf_tcp_option_mptcp_ipv4,
5229e4
           { "Advertised IPv4 Address", "tcp.options.mptcp.ipv4", FT_IPv4,
5229e4
             BASE_NONE, NULL, 0x0, NULL, HFILL}},
5229e4
diff --git a/epan/dissectors/packet-tcp.c b/epan/dissectors/packet-tcp.c
5229e4
index 6bc1915e82..b0ed652215 100644
5229e4
--- a/epan/dissectors/packet-tcp.c
5229e4
+++ b/epan/dissectors/packet-tcp.c
5229e4
@@ -2152,13 +2152,19 @@ tcp_analyze_sequence_number(packet_info *pinfo, guint32 seq, guint32 ack, guint3
5229e4
     &&  seq==tcpd->fwd->tcp_analyze_seq_info->nextseq
5229e4
     &&  ack==tcpd->fwd->tcp_analyze_seq_info->lastack
5229e4
     &&  (flags&(TH_SYN|TH_FIN|TH_RST))==0 ) {
5229e4
-        tcpd->fwd->tcp_analyze_seq_info->dupacknum++;
5229e4
-        if(!tcpd->ta) {
5229e4
-            tcp_analyze_get_acked_struct(pinfo->num, seq, ack, TRUE, tcpd);
5229e4
-        }
5229e4
-        tcpd->ta->flags|=TCP_A_DUPLICATE_ACK;
5229e4
-        tcpd->ta->dupack_num=tcpd->fwd->tcp_analyze_seq_info->dupacknum;
5229e4
-        tcpd->ta->dupack_frame=tcpd->fwd->tcp_analyze_seq_info->lastnondupack;
5229e4
+
5229e4
+        /* MPTCP tolerates duplicate acks in some circumstances, see RFC 8684 4. */
5229e4
+        if(tcpd->mptcp_analysis && (tcpd->mptcp_analysis->mp_operations!=tcpd->fwd->mp_operations)) {
5229e4
+            /* just ignore this DUPLICATE ACK */
5229e4
+        } else {
5229e4
+            tcpd->fwd->tcp_analyze_seq_info->dupacknum++;
5229e4
+            if(!tcpd->ta) {
5229e4
+                tcp_analyze_get_acked_struct(pinfo->num, seq, ack, TRUE, tcpd);
5229e4
+            }
5229e4
+            tcpd->ta->flags|=TCP_A_DUPLICATE_ACK;
5229e4
+            tcpd->ta->dupack_num=tcpd->fwd->tcp_analyze_seq_info->dupacknum;
5229e4
+            tcpd->ta->dupack_frame=tcpd->fwd->tcp_analyze_seq_info->lastnondupack;
5229e4
+       }
5229e4
     }
5229e4
 
5229e4
 
5229e4
@@ -2343,6 +2349,10 @@ finished_checking_retransmission_type:
5229e4
     tcpd->fwd->tcp_analyze_seq_info->lastacktime.secs=pinfo->abs_ts.secs;
5229e4
     tcpd->fwd->tcp_analyze_seq_info->lastacktime.nsecs=pinfo->abs_ts.nsecs;
5229e4
 
5229e4
+    /* remember the MPTCP operations if any */
5229e4
+    if( tcpd->mptcp_analysis ) {
5229e4
+        tcpd->fwd->mp_operations=tcpd->mptcp_analysis->mp_operations;
5229e4
+    }
5229e4
 
5229e4
     /* if there were any flags set for this segment we need to remember them
5229e4
      * we only remember the flags for the very last segment though.
5229e4
@@ -2702,24 +2712,17 @@ mptcp_analysis_add_subflows(packet_info *pinfo _U_,  tvbuff_t *tvb,
5229e4
     proto_tree *parent_tree, struct mptcp_analysis* mptcpd)
5229e4
 {
5229e4
     wmem_list_frame_t *it;
5229e4
-    proto_tree *tree;
5229e4
     proto_item *item;
5229e4
 
5229e4
-    item=proto_tree_add_item(parent_tree, hf_mptcp_analysis_subflows, tvb, 0, 0, ENC_NA);
5229e4
-    PROTO_ITEM_SET_GENERATED(item);
5229e4
-
5229e4
-    tree=proto_item_add_subtree(item, ett_mptcp_analysis_subflows);
5229e4
+    wmem_strbuf_t *val = wmem_strbuf_new(wmem_packet_scope(), "");
5229e4
 
5229e4
     /* for the analysis, we set each subflow tcp stream id */
5229e4
     for(it = wmem_list_head(mptcpd->subflows); it != NULL; it = wmem_list_frame_next(it)) {
5229e4
         struct tcp_analysis *sf = (struct tcp_analysis *)wmem_list_frame_data(it);
5229e4
-        proto_item *subflow_item;
5229e4
-        subflow_item=proto_tree_add_uint(tree, hf_mptcp_analysis_subflows_stream_id, tvb, 0, 0, sf->stream);
5229e4
-        PROTO_ITEM_SET_HIDDEN(subflow_item);
5229e4
-
5229e4
-        proto_item_append_text(item, " %d", sf->stream);
5229e4
+        wmem_strbuf_append_printf(val, "%u ", sf->stream);
5229e4
     }
5229e4
 
5229e4
+    item = proto_tree_add_string(parent_tree, hf_mptcp_analysis_subflows, tvb, 0, 0, wmem_strbuf_get_str(val));
5229e4
     PROTO_ITEM_SET_GENERATED(item);
5229e4
 }
5229e4
 
5229e4
@@ -2962,6 +2965,42 @@ mptcp_add_analysis_subtree(packet_info *pinfo, tvbuff_t *tvb, proto_tree *parent
5229e4
 
5229e4
     PROTO_ITEM_SET_GENERATED(item);
5229e4
 
5229e4
+    /* store the TCP Options related to MPTCP then we will avoid false DUP ACKs later */
5229e4
+    guint8 nbOptionsChanged = 0;
5229e4
+    if((tcpd->mptcp_analysis->mp_operations&(0x01))!=tcph->th_mptcp->mh_mpc) {
5229e4
+        tcpd->mptcp_analysis->mp_operations |= 0x01;
5229e4
+        nbOptionsChanged++;
5229e4
+    }
5229e4
+    if((tcpd->mptcp_analysis->mp_operations&(0x02))!=tcph->th_mptcp->mh_join) {
5229e4
+        tcpd->mptcp_analysis->mp_operations |= 0x02;
5229e4
+        nbOptionsChanged++;
5229e4
+    }
5229e4
+    if((tcpd->mptcp_analysis->mp_operations&(0x04))!=tcph->th_mptcp->mh_dss) {
5229e4
+        tcpd->mptcp_analysis->mp_operations |= 0x04;
5229e4
+        nbOptionsChanged++;
5229e4
+    }
5229e4
+    if((tcpd->mptcp_analysis->mp_operations&(0x08))!=tcph->th_mptcp->mh_add) {
5229e4
+        tcpd->mptcp_analysis->mp_operations |= 0x08;
5229e4
+        nbOptionsChanged++;
5229e4
+    }
5229e4
+    if((tcpd->mptcp_analysis->mp_operations&(0x10))!=tcph->th_mptcp->mh_remove) {
5229e4
+        tcpd->mptcp_analysis->mp_operations |= 0x10;
5229e4
+        nbOptionsChanged++;
5229e4
+    }
5229e4
+    if((tcpd->mptcp_analysis->mp_operations&(0x20))!=tcph->th_mptcp->mh_prio) {
5229e4
+        tcpd->mptcp_analysis->mp_operations |= 0x20;
5229e4
+        nbOptionsChanged++;
5229e4
+    }
5229e4
+    if((tcpd->mptcp_analysis->mp_operations&(0x40))!=tcph->th_mptcp->mh_fail) {
5229e4
+        tcpd->mptcp_analysis->mp_operations |= 0x40;
5229e4
+        nbOptionsChanged++;
5229e4
+    }
5229e4
+    if((tcpd->mptcp_analysis->mp_operations&(0x80))!=tcph->th_mptcp->mh_fastclose) {
5229e4
+        tcpd->mptcp_analysis->mp_operations |= 0x80;
5229e4
+        nbOptionsChanged++;
5229e4
+    }
5229e4
+    /* we could track MPTCP option changes here, with nbOptionsChanged */
5229e4
+
5229e4
     item = proto_tree_add_uint(tree, hf_mptcp_stream, tvb, 0, 0, mptcpd->stream);
5229e4
     PROTO_ITEM_SET_GENERATED(item);
5229e4
 
5229e4
@@ -4537,6 +4576,7 @@ get_or_create_mptcpd_from_key(struct tcp_analysis* tcpd, tcp_flow_t *fwd, guint8
5229e4
 
5229e4
     DISSECTOR_ASSERT(fwd->mptcp_subflow->meta);
5229e4
 
5229e4
+    fwd->mptcp_subflow->meta->version = version;
5229e4
     fwd->mptcp_subflow->meta->key = key;
5229e4
     fwd->mptcp_subflow->meta->static_flags |= MPTCP_META_HAS_KEY;
5229e4
     fwd->mptcp_subflow->meta->base_dsn = expected_idsn;
5229e4
@@ -4747,6 +4787,13 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
                     offset += 4;
5229e4
 
5229e4
                     mptcpd = mptcp_get_meta_from_token(tcpd, tcpd->rev, mph->mh_token);
5229e4
+                    if (tcpd->fwd->mptcp_subflow->meta->version == 1) {
5229e4
+                        mptcp_meta_flow_t *tmp = tcpd->fwd->mptcp_subflow->meta;
5229e4
+
5229e4
+                        /* if the negotiated version is v1 the first key was exchanged on SYN/ACK packet: we must swap the meta */
5229e4
+                        tcpd->fwd->mptcp_subflow->meta = tcpd->rev->mptcp_subflow->meta;
5229e4
+                        tcpd->rev->mptcp_subflow->meta = tmp;
5229e4
+                    }
5229e4
 
5229e4
                     proto_tree_add_item_ret_uint(mptcp_tree, hf_tcp_option_mptcp_sender_rand, tvb, offset,
5229e4
                             4, ENC_BIG_ENDIAN, &tcpd->fwd->mptcp_subflow->nonce);
5229e4
@@ -4897,6 +4944,7 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
             break;
5229e4
 
5229e4
         case TCPOPT_MPTCP_ADD_ADDR:
5229e4
+            mph->mh_add = TRUE;
5229e4
             ipver = tvb_get_guint8(tvb, offset) & 0x0F;
5229e4
             if (ipver == 4 || ipver == 6)
5229e4
                 proto_tree_add_item(mptcp_tree,
5229e4
@@ -4935,6 +4983,7 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
             break;
5229e4
 
5229e4
         case TCPOPT_MPTCP_REMOVE_ADDR:
5229e4
+            mph->mh_remove = TRUE;
5229e4
             item = proto_tree_add_uint(mptcp_tree, hf_mptcp_number_of_removed_addresses, tvb, start_offset+2,
5229e4
                 1, optlen - 3);
5229e4
             PROTO_ITEM_SET_GENERATED(item);
5229e4
@@ -4947,6 +4996,7 @@ dissect_tcpopt_mptcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void*
5229e4
             break;
5229e4
 
5229e4
         case TCPOPT_MPTCP_MP_PRIO:
5229e4
+            mph->mh_prio = TRUE;
5229e4
             proto_tree_add_bitmask(mptcp_tree, tvb, offset, hf_tcp_option_mptcp_flags,
5229e4
                          ett_tcp_option_mptcp, tcp_option_mptcp_join_flags,
5229e4
                          ENC_BIG_ENDIAN);
5229e4
@@ -8040,7 +8090,7 @@ proto_register_tcp(void)
5229e4
             "This was retransmitted on another subflow", HFILL }},
5229e4
 
5229e4
         { &hf_mptcp_analysis_subflows,
5229e4
-          { "TCP subflow stream id(s):", "mptcp.analysis.subflows", FT_NONE, BASE_NONE, NULL, 0x0,
5229e4
+          { "TCP subflow stream id(s)", "mptcp.analysis.subflows", FT_STRING, BASE_NONE, NULL, 0x0,
5229e4
             "List all TCP connections mapped to this MPTCP connection", HFILL }},
5229e4
 
5229e4
         { &hf_mptcp_stream,
5229e4
diff --git a/epan/dissectors/packet-tcp.h b/epan/dissectors/packet-tcp.h
5229e4
index ac250d948e..21e6a61086 100644
5229e4
--- a/epan/dissectors/packet-tcp.h
5229e4
+++ b/epan/dissectors/packet-tcp.h
5229e4
@@ -49,8 +49,11 @@ struct mptcpheader {
5229e4
 	gboolean mh_mpc;         /* true if seen an mp_capable option */
5229e4
 	gboolean mh_join;        /* true if seen an mp_join option */
5229e4
 	gboolean mh_dss;         /* true if seen a dss */
5229e4
-	gboolean mh_fastclose;   /* true if seen a fastclose */
5229e4
+	gboolean mh_add;         /* true if seen an MP_ADD */
5229e4
+	gboolean mh_remove;      /* true if seen an MP_REMOVE */
5229e4
+	gboolean mh_prio;        /* true if seen an MP_PRIO */
5229e4
 	gboolean mh_fail;        /* true if seen an MP_FAIL */
5229e4
+	gboolean mh_fastclose;   /* true if seen a fastclose */
5229e4
 
5229e4
 	guint8  mh_capable_flags; /* to get hmac version for instance */
5229e4
 	guint8  mh_dss_flags; /* data sequence signal flag */
5229e4
@@ -332,6 +335,7 @@ typedef struct _tcp_flow_t {
5229e4
 	gboolean valid_bif;     /* if lost pkts, disable BiF until ACK is recvd */
5229e4
 	guint32 push_bytes_sent; /* bytes since the last PSH flag */
5229e4
 	gboolean push_set_last; /* tracking last time PSH flag was set */
5229e4
+	guint8 mp_operations; /* tracking of the MPTCP operations */
5229e4
 
5229e4
 	tcp_analyze_seq_flow_info_t* tcp_analyze_seq_info;
5229e4
 
5229e4
@@ -378,6 +382,9 @@ struct mptcp_analysis {
5229e4
 
5229e4
 	/* identifier of the tcp stream that saw the initial 3WHS with MP_CAPABLE option */
5229e4
 	struct tcp_analysis *master;
5229e4
+
5229e4
+	/* Keep track of the last TCP operations seen in order to avoid false DUP ACKs */
5229e4
+	guint8 mp_operations;
5229e4
 };
5229e4
 
5229e4
 struct tcp_analysis {