https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5743
Sake <sake@xxxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |FIXED
--- Comment #1 from Sake <sake@xxxxxxxxxx> 2011-03-08 03:35:28 PST ---
(In reply to comment #0)
> The following shows a tshark command with its result to demonstrate this (Have
> a look at packet 6):
>
>
> tshark -n -r test.cap -e frame.number -e tcp.stream -e tcp.flags -e ip.src -e
> tcp.srcport -e ip.dst -e tcp.dstport -T fields
> 1 0 0x02 10.1.73.43 33622 10.1.91.89 2001
> 2 0 0x12 10.1.91.89 2001 10.1.73.43 33622
> 3 1 0x02 10.1.73.43 50945 10.1.91.89 2001
> 4 1 0x02 10.1.73.43 50945 10.1.91.89 2001
> 5 1 0x12 10.1.91.89 2001 10.1.73.43 50945
> 6 0 0x02 10.1.73.43 33622 10.1.91.89 2001
> 7 2 0x12 10.1.91.89 2001 10.1.73.43 33622
Good catch... there is a fix in SVN 36162 which will be included in 1.4.5
If you need it earlier, you can download an automated build in a couple of
hours from http://www.wireshark.org/download/automated/
Thanks!
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.