https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7149
--- Comment #17 from Cristian Constantin <const.crist@xxxxxxxxxxxxxx> 2012-04-19 13:26:01 PDT ---
(In reply to comment #8)
> Cristian, could you please post a link to one of your test files (or at least a
> subsection thereof)? None of the captures I have or can create are large enough
> to reliably test the timing, and there are a few experiments I'd like to run.
cristian: since the fish is too big to post it, here is how to fish it:
1. create two simple bash scripts using the files I am going to attach
a. client.sh
b. server.sh
(you need the famous "netcat" for them to work)
2. have a look at them to make sure I am not trying to break into your machine
or something :-). after that make them executable and start them; first the
"server.sh", second the "client.sh"
3. start tcpdump like this:
tcpdump -s0 -w /tmp/tcp.pcap -neli lo
make sure you have enough space on the partition where it saves the file.
also: both scripts are quite cpu hungry.
depending on how fast your machine is you'll get enough packets in several
seconds (wow!), minutes or hours (no...). I am testing with a little bit over
500k packets.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.