http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1125
guy@xxxxxxxxxxxx changed:
What |Removed |Added
----------------------------------------------------------------------------
OS/Version|Windows XP |All
Platform|PC |All
------- Comment #6 from guy@xxxxxxxxxxxx 2006-10-12 20:52 GMT -------
It might be possible to do so, although the dissector should probably still put
a complaint into the protocol tree ("not irritating Cisco by pointing out where
they're violating the standard" is not a project goal for Wireshark :-)).
The fix would probably involve a new ASN.1 type, possibly called
PossiblyBrokenNetworkAddress or something such as that:
PossiblyBrokenNetworkAddress ::=
CHOICE {
internet
PossiblyBrokenIpAddress
}
PossiblyBrokenIpAddress ::=
[APPLICATION 0]
IMPLICIT OCTET STRING
with a conformance file change to handle PossiblyBrokenIpAddress as an IPv4
address if its length is 4, an IPv6 address (with a note in the display text
that this is NOT valid SNMP) if the length is 16, and a sequence of bytes (with
a note in the display text that this is NOT valid SNMP) otherwise.
(Note that this does not constitute a commitment on my part to implement this
within any particular time frame.)
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.