https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5524
Sake <sake@xxxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
--- Comment #1 from Sake <sake@xxxxxxxxxx> 2010-12-27 07:06:38 PST ---
(In reply to comment #0)
> For some reason which I couldn't understand, in tcp_dissect_pdus(), can_dseg =
> 0, which is why LDAP desegmentation does not even work. I see no reason for it
> to fail and I can't understand under what circumstances it may change.
> Attached capture demonestrates it - see packet 29, for example.
Desegmentation only works if all data is captured. However, the capture file
was created with a snap-length of 1482, as can be seen in the packet details on
the first line:
Frame 29: 1514 bytes on wire (12112 bits), 1482 bytes captured (11856 bits)
Or on the last line:
[Packet size limited during capture: LDAP truncated]
You can make desegmentation work by capturing with a snaplength of 0 to capture
whole packets.
Closing this bugreport as "INVALID" as things are working as designed...
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.