http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1139
Summary: NFSv4 filehandle length is ignored
Product: Wireshark
Version: unspecified
Platform: PC
OS/Version: Linux
Status: NEW
Severity: Blocker
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: jlayton@xxxxxxxxxx
Build Information:
--
--
When looking at NFSv4 captures, wireshark seems to correctly parse the length
field, for filehandles, but then seems to ignore that length and assume that
the filehandle is actually 128 bytes long (the maximum).
The rest of the packet is analyzed correctly. It sees other parts of compound
operations, but the filehandle is assumed to be overlayed on top of those
parts. It also incorrectly reports that packets are malformed because of this,
when it perceives the NFS packet as being truncated because there is not enough
data in the packet to make up a 128-bit filehandle.
Apologies if my description is not good here, it's a little hard to describe.
But if you capture traffic between a Linux NFS4 server and client and look at
the filehandles within, you'll see what I mean.
Let me know if you have questions.
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.