Wireshark-bugs: [Wireshark-bugs] [Bug 1136] TCP checksum validation

Date: Tue, 10 Oct 2006 06:11:04 +0000 (GMT)
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1136


nishikawa.shun@xxxxxxxxxxxxxx changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |nishikawa.shun@xxxxxxxxxxxxx
                   |                            |m




------- Comment #2 from nishikawa.shun@xxxxxxxxxxxxxx  2006-10-10 06:11 GMT -------
(In reply to comment #1)
> Can you attach a capture file containing a TCP segment with the checksum of
> 0xffff?
> 

Hi Stephen,

I tried to attach binary packet data.
However, bugzilla respond Internal-Error.
I already sent that trouble to wireshark-bugs.

If possible, I'll attach data later.
I paste that packet by text. Show below.
I guess this checksum generated by Load-Balancer.
Unfortunately I cannot provide whole session data
that's why these are privacy data of our user.

thanks.

No.     Time        Source                Destination           Protocol Info
      1 0.000000    16.33.10.17           18.139.10.15          TCP      37166
> 8002 [SYN] Seq=0 Ack=0 Win=49640 Len=0 MSS=1460

Frame 1 (62 bytes on wire, 62 bytes captured)
    Arrival Time: Sep 11, 2006 13:04:19.771183000
    Time delta from previous packet: 0.000000000 seconds
    Time since reference or first frame: 0.000000000 seconds
    Frame Number: 1
    Packet Length: 62 bytes
    Capture Length: 62 bytes
    Protocols in frame: eth:ip:tcp
Ethernet II, Src: AuroraCo_35:1f:44 (00:10:7d:35:1f:44), Dst: 00:34:f6:6e:92:98
(00:34:f6:6e:92:98)
    Destination: 00:34:f6:6e:92:98 (00:34:f6:6e:92:98)
    Source: AuroraCo_35:1f:44 (00:10:7d:35:1f:44)
    Type: IP (0x0800)
Internet Protocol, Src: 16.33.10.17 (16.33.10.17), Dst: 18.139.10.15
(18.139.10.15)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
        0000 00.. = Differentiated Services Codepoint: Default (0x00)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 48
    Identification: 0x4bb7 (19383)
    Flags: 0x04 (Don't Fragment)
        0... = Reserved bit: Not set
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 62
    Protocol: TCP (0x06)
    Header checksum: 0xba45 [correct]
        Good: True
        Bad : False
    Source: 16.33.10.17 (16.33.10.17)
    Destination: 18.139.10.15 (18.139.10.15)
Transmission Control Protocol, Src Port: 37166 (37166), Dst Port: 8002 (8002),
Seq: 0, Ack: 0, Len: 0
    Source port: 37166 (37166)
    Destination port: 8002 (8002)
    Sequence number: 0    (relative sequence number)
    Header length: 28 bytes
    Flags: 0x0002 (SYN)
        0... .... = Congestion Window Reduced (CWR): Not set
        .0.. .... = ECN-Echo: Not set
        ..0. .... = Urgent: Not set
        ...0 .... = Acknowledgment: Not set
        .... 0... = Push: Not set
        .... .0.. = Reset: Not set
        .... ..1. = Syn: Set
        .... ...0 = Fin: Not set
    Window size: 49640
    Checksum: 0xffff [correct]
    Options: (8 bytes)
        Maximum segment size: 1460 bytes
        NOP
        NOP
        SACK permitted

0000  00 34 f6 6e 92 98 00 10 7d 35 1f 44 08 00 45 00   .4.n....}5.D..E.
0010  00 30 4b b7 40 00 3e 06 ba 45 10 21 0a 11 12 8b   .0K.@.>..E.!....
0020  0a 0f 91 2e 1f 42 f5 18 e4 e1 00 00 00 00 70 02   .....B........p.
0030  c1 e8 ff ff 00 00 02 04 05 b4 01 01 04 02         ..............


-- 
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.