https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5546
Jeff Morriss <jeff.morriss.ws@xxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
--- Comment #2 from Jeff Morriss <jeff.morriss.ws@xxxxxxxxx> 2011-01-04 15:10:21 PST ---
Starting in rev 35366, the SCTP dissector will show you this about the first
packet:
Stream Control Transmission Protocol, Src Port: 34119 (34119), Dst Port: 20000
(20000)
Source port: 34119
Destination port: 20000
Verification tag: 0x00000000
Checksum: 0x2dd0b7fc [incorrect, should be 0x47c7120c (Adler32) or
0x58fa8a0c (CRC32C)]
INIT chunk (Outbound streams: 5, inbound streams: 5)
Chunk type: INIT (1)
0... .... = Bit: Stop processing of the packet
.0.. .... = Bit: Do not report
Chunk flags: 0x00
Chunk length: 108
[Expert Info (Error/Malformed): Chunk length (108) is longer than
remaining data (100) in the packet]
[Message: Chunk length (108) is longer than remaining data
(100) in the packet]
[Severity level: Error]
[Group: Malformed]
Initiate tag: 0x9f25ef61
Advertised receiver window credit (a_rwnd): 2097152
Number of outbound streams: 5
Number of inbound streams: 5
Initial TSN: 2271736697
[Malformed Packet: SCTP]
[Expert Info (Error/Malformed): Malformed Packet (Exception occurred)]
[Message: Malformed Packet (Exception occurred)]
[Severity level: Error]
[Group: Malformed]
Technically the dissector should be able to dissect even further into the
packet, but that requires more work.
Closing this bug since it's not a bug in Wireshark that the packet is
malformed.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.