Ethereal-users: [Ethereal-users] Malformed Header Problem with Dantz Retrospect
Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.
From: "Steven J. Backus" <backus@xxxxxxxxxxxxx>
Date: Wed, 9 Jun 2004 10:39:22 -0600 (MDT)
Apologies in advance if this is not a good place to ask about this. I am using a disk backup program called Retrospect from Dantz. The application is failing and the Dantz people say it is hardware or network related. Every other application works fine on this machine, a Windows 2000 box. Here's ethereal's output, does anyone know what hardware problem could cause this? TIA. Steve 453.765578 155.100.176.25 -> 155.100.158.57 TCP [TCP Retransmission] dantz > 49166 [ACK] Seq=90548355 Ack=1124814 Win=49152 Len=12 TSV=698715 TSER=2045316676 453.765759 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#13] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.767222 155.100.176.25 -> 155.100.158.57 TCP [TCP Retransmission] dantz > 49166 [ACK] Seq=90548367 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704 453.767338 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#14] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.768783 155.100.176.25 -> 155.100.158.57 TDS [TCP Retransmission] Login Packet (Not last buffer) (Not last buffer)[Unreassembled Packet] 453.768897 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#15] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.770381 155.100.176.25 -> 155.100.158.57 TCP [TCP Retransmission] dantz > 49166 [ACK] Seq=90551263 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704 453.770559 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#16] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.772026 155.100.176.25 -> 155.100.158.57 TDS [TCP Retransmission] Unknown Packet Type: 249[Malformed Packet] 453.772148 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#17] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.773598 155.100.176.25 -> 155.100.158.57 TDS [TCP Retransmission] Query Packet (Not last buffer) (Not last buffer) 453.773716 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#18] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.775159 155.100.176.25 -> 155.100.158.57 TDS [TCP Out-Of-Order] Remote Procedure Call Packet (Not last buffer) (Not last buffer)[Unreassembled Packet] 453.775278 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#19] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.776723 155.100.176.25 -> 155.100.158.57 TDS [TCP Previous segment lost] Remote Procedure Call Packet (Not last buffer) (Not last buffer) (Not last buffer)[Unreassembled Packet] 453.776844 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#20] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.778300 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90558503 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704 453.778421 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#21] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.779878 155.100.176.25 -> 155.100.158.57 TDS Query Packet[Unreassembled Packet] 453.780002 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#22] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.781459 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 228 (Not last buffer)[Unreassembled Packet] 453.781589 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#23] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.783030 155.100.176.25 -> 155.100.158.57 TDS Query Packet (Not last buffer)[Unreassembled Packet] 453.783160 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#24] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.784618 155.100.176.25 -> 155.100.158.57 TDS Query Packet (Not last buffer) 453.784744 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#25] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.786186 155.100.176.25 -> 155.100.158.57 TDS Login Packet (Not last buffer) 453.786314 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#26] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.787778 155.100.176.25 -> 155.100.158.57 TDS Query Packet (Not last buffer) 453.787907 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#27] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.789371 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90568639 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704 453.789510 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#28] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.791005 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0[Unreassembled Packet] 453.791136 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#29] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.792598 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 255[Malformed Packet] 453.792742 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#30] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.794225 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0[Malformed Packet] 453.794359 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#31] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.795872 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0 453.796010 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#32] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.797456 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0 453.797593 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#33] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.799061 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0 (Not last buffer)[Unreassembled Packet] 453.799197 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#34] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.800700 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0[Malformed Packet] 453.800835 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#35] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.802316 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90580223 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704 453.802511 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#36] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.803976 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0[Malformed Packet] 453.804106 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#37] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.805550 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90583119 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704 453.805707 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#38] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.807148 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90584567 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704 453.807278 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#39] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.808721 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90586015 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704 453.808869 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#40] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.810342 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90587463 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704 453.810548 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#41] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.812013 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90588911 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704 453.812202 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#42] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.813692 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0 (Not last buffer)[Malformed Packet] 453.813858 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#43] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.815326 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0[Malformed Packet] 453.815498 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#44] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571 453.815546 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#45] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
- Follow-Ups:
- Prev by Date: [Ethereal-users] instruction at "0X00da127a" uses memory address "0x0000000". Memo ry can't be read
- Next by Date: Re: [Ethereal-users] Malformed Header Problem with Dantz Retrospect
- Previous by thread: [Ethereal-users] instruction at "0X00da127a" uses memory address "0x0000000". Memo ry can't be read
- Next by thread: Re: [Ethereal-users] Malformed Header Problem with Dantz Retrospect
- Index(es):