Wireshark-bugs: [Wireshark-bugs] [Bug 1403] New: IPP response packets malformed.

Date: Mon, 26 Feb 2007 13:18:52 +0000 (GMT)
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1403

           Summary: IPP response packets malformed.
           Product: Wireshark
           Version: SVN
          Platform: PC
        OS/Version: Linux
            Status: NEW
          Severity: Normal
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: toralf.foerster@xxxxxx


Build Information:
tfoerste@n22 ~ $ ~/devel/wireshark/trunk/tshark -v
TShark 0.99.6 (SVN Rev 20932)

Copyright 1998-2007 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GLib 2.12.7, with libpcap 0.9.4, with libz 1.2.3, with libpcre
6.6, with Net-SNMP 5.2.1.2, without ADNS, without Lua, with GnuTLS 1.4.4, with
Gcrypt 1.2.2, without Kerberos.

Running on Linux 2.6.19-gentoo-r5, with libpcap version 0.9.4.

Built using gcc 3.4.6 (Gentoo 3.4.6-r2, ssp-3.4.6-1.0, pie-8.7.10).

--
I'm wondering why most of the IPP response packets from the sniffed stream of
#comment 1 are malformed.

I made a request (http://n22_uml:631/printers/) from my Gentoo Linux host
system (n22 : 192.168.0.254) to my user mode linux image (n22_uml : xxx.50) and
recorded the answer.

Most of the packets classified as IPP are malformed but a "Follow TCP Stream"
gives a human-readable output.


-- 
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.