http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1125
guy@xxxxxxxxxxxx changed:
           What    |Removed                     |Added
----------------------------------------------------------------------------
         OS/Version|Windows XP                  |All
           Platform|PC                          |All
------- Comment #6 from guy@xxxxxxxxxxxx  2006-10-12 20:52 GMT -------
It might be possible to do so, although the dissector should probably still put
a complaint into the protocol tree ("not irritating Cisco by pointing out where
they're violating the standard" is not a project goal for Wireshark :-)).
The fix would probably involve a new ASN.1 type, possibly called
PossiblyBrokenNetworkAddress or something such as that:
PossiblyBrokenNetworkAddress ::=
                 CHOICE {
                      internet
                      PossiblyBrokenIpAddress
                     }
PossiblyBrokenIpAddress ::=
    [APPLICATION 0]
        IMPLICIT OCTET STRING
with a conformance file change to handle PossiblyBrokenIpAddress as an IPv4
address if its length is 4, an IPv6 address (with a note in the display text
that this is NOT valid SNMP) if the length is 16, and a sequence of bytes (with
a note in the display text that this is NOT valid SNMP) otherwise.
(Note that this does not constitute a commitment on my part to implement this
within any particular time frame.)
-- 
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.