http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1302
Summary: Wireshark breaks outbound TCP connections with an Intel
Pro/100 S adapter
Product: Wireshark
Version: 0.99.4
Platform: PC
OS/Version: Windows XP
Status: NEW
Severity: Major
Priority: Medium
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: wireshark@xxxxxxxxxxxx
Build Information:
Version 0.99.4 (SVN Rev 19757)
Copyright 1998-2006 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GTK+ 2.6.9, with GLib 2.6.6, with WinPcap (version unknown), with
libz 1.2.3, with libpcre 6.4, with Net-SNMP 5.3.1, with ADNS, with Lua 5.1,
with
GnuTLS 1.5.1, with Gcrypt 1.2.3, with MIT Kerberos, with PortAudio <= V18, with
AirPcap.
Running on Windows XP Service Pack 2, build 2600, with WinPcap version 3.1
(packet.dll version 3, 1, 0, 27), based on libpcap version 0.9[.x], without
AirPcap.
Built using Microsoft Visual C++ 6.0 build 8804
--
When wireshark is active (capturing from the network device), any attempted
outbound TCP connections will fail. This appears to be due to a TCP checksum
errors in the syn-ack-ack packet (the syn packet checksum is correct), to which
the server responds to with a rst. Connections already established when the
capture is started are unaffected and continue to operate normally.
Using Intel PROSet version 11.1.0.19 drivers. TCP checksum offloading is
disabled - enabling it does not fix the problem either.
The network adapter is an onboard Intel Pro/100 S adapter on a MSI K7D Master-L
motherboard, with two MP2600 CPUs.
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.