https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6556
Summary: TCP Checksum
Product: Wireshark
Version: 1.6.3
Platform: x86-64
OS/Version: Windows 7
Status: NEW
Severity: Major
Priority: Low
Component: Wireshark
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: sborisch@xxxxxxxxxxxxxxx
Created an attachment (id=7392)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=7392)
Input Pcap file -- packet 7 will be fragmented.
Build Information:
Version 1.6.3 (SVN Rev 39702 from /trunk-1.6)
Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GTK+ 2.22.1, with GLib 2.26.1, with WinPcap (version
unknown), with libz 1.2.5, without POSIX capabilities, without libpcre, with
SMI
0.4.8, with c-ares 1.7.1, with Lua 5.1, without Python, with GnuTLS 2.10.3,
with
Gcrypt 1.4.6, with MIT Kerberos, with GeoIP, with PortAudio V19-devel (built
Nov
1 2011), with AirPcap.
Running on Windows XP Service Pack 3, build 2600, with WinPcap version 4.1.2
(packet.dll version 4.1.0.2001), based on libpcap version 1.0 branch 1_0_rel0b
(20091008), GnuTLS 2.10.3, Gcrypt 1.4.6, without AirPcap.
Built using Microsoft Visual C++ 9.0 build 21022
Wireshark is Open Source Software released under the GNU General Public
License.
Check the man page and http://www.wireshark.org for more information.
--
We have a device that performs IPv4 Fragmentation on Ethernet packets. When
capturing the output of the device (fragmented packets), wireshark reports TCP
checksum errors. Manually inspecting the fragmented packets shows this to not
be true. The TCP checksum in the TCP header in the first of the two packet
fragments is unchanged, and none of the TCP payload data bytes have been
altered.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.