Wireshark-bugs: [Wireshark-bugs] [Bug 1136] TCP checksum validation
Date: Tue, 10 Oct 2006 06:11:04 +0000 (GMT)
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1136 nishikawa.shun@xxxxxxxxxxxxxx changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |nishikawa.shun@xxxxxxxxxxxxx | |m ------- Comment #2 from nishikawa.shun@xxxxxxxxxxxxxx 2006-10-10 06:11 GMT ------- (In reply to comment #1) > Can you attach a capture file containing a TCP segment with the checksum of > 0xffff? > Hi Stephen, I tried to attach binary packet data. However, bugzilla respond Internal-Error. I already sent that trouble to wireshark-bugs. If possible, I'll attach data later. I paste that packet by text. Show below. I guess this checksum generated by Load-Balancer. Unfortunately I cannot provide whole session data that's why these are privacy data of our user. thanks. No. Time Source Destination Protocol Info 1 0.000000 16.33.10.17 18.139.10.15 TCP 37166 > 8002 [SYN] Seq=0 Ack=0 Win=49640 Len=0 MSS=1460 Frame 1 (62 bytes on wire, 62 bytes captured) Arrival Time: Sep 11, 2006 13:04:19.771183000 Time delta from previous packet: 0.000000000 seconds Time since reference or first frame: 0.000000000 seconds Frame Number: 1 Packet Length: 62 bytes Capture Length: 62 bytes Protocols in frame: eth:ip:tcp Ethernet II, Src: AuroraCo_35:1f:44 (00:10:7d:35:1f:44), Dst: 00:34:f6:6e:92:98 (00:34:f6:6e:92:98) Destination: 00:34:f6:6e:92:98 (00:34:f6:6e:92:98) Source: AuroraCo_35:1f:44 (00:10:7d:35:1f:44) Type: IP (0x0800) Internet Protocol, Src: 16.33.10.17 (16.33.10.17), Dst: 18.139.10.15 (18.139.10.15) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00) 0000 00.. = Differentiated Services Codepoint: Default (0x00) .... ..0. = ECN-Capable Transport (ECT): 0 .... ...0 = ECN-CE: 0 Total Length: 48 Identification: 0x4bb7 (19383) Flags: 0x04 (Don't Fragment) 0... = Reserved bit: Not set .1.. = Don't fragment: Set ..0. = More fragments: Not set Fragment offset: 0 Time to live: 62 Protocol: TCP (0x06) Header checksum: 0xba45 [correct] Good: True Bad : False Source: 16.33.10.17 (16.33.10.17) Destination: 18.139.10.15 (18.139.10.15) Transmission Control Protocol, Src Port: 37166 (37166), Dst Port: 8002 (8002), Seq: 0, Ack: 0, Len: 0 Source port: 37166 (37166) Destination port: 8002 (8002) Sequence number: 0 (relative sequence number) Header length: 28 bytes Flags: 0x0002 (SYN) 0... .... = Congestion Window Reduced (CWR): Not set .0.. .... = ECN-Echo: Not set ..0. .... = Urgent: Not set ...0 .... = Acknowledgment: Not set .... 0... = Push: Not set .... .0.. = Reset: Not set .... ..1. = Syn: Set .... ...0 = Fin: Not set Window size: 49640 Checksum: 0xffff [correct] Options: (8 bytes) Maximum segment size: 1460 bytes NOP NOP SACK permitted 0000 00 34 f6 6e 92 98 00 10 7d 35 1f 44 08 00 45 00 .4.n....}5.D..E. 0010 00 30 4b b7 40 00 3e 06 ba 45 10 21 0a 11 12 8b .0K.@.>..E.!.... 0020 0a 0f 91 2e 1f 42 f5 18 e4 e1 00 00 00 00 70 02 .....B........p. 0030 c1 e8 ff ff 00 00 02 04 05 b4 01 01 04 02 .............. -- Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
- References:
- [Wireshark-bugs] [Bug 1136] New: TCP checksum validation
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 1136] New: TCP checksum validation
- Prev by Date: [Wireshark-bugs] [Bug 1151] Tshark segfaults with lots of IP addresses on eth device
- Next by Date: [Wireshark-bugs] [Bug 1154] STATUS_ACCESS_VIOLATION in WTP dissector
- Previous by thread: [Wireshark-bugs] [Bug 1136] TCP checksum validation
- Next by thread: [Wireshark-bugs] [Bug 1136] TCP checksum validation
- Index(es):