https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7497
Anders Broman <anders.broman@xxxxxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
--- Comment #3 from Anders Broman <anders.broman@xxxxxxxxxxxx> 2012-07-24 08:42:40 PDT ---
(In reply to comment #2)
> (In reply to comment #1)
> > You can try to either enable 'tcp.try_heuristic_first' option or disable TDS
> > protocol.
> tcp.try_heuristic_first has worked, thanks.
> It still seems odd that the fingerprinting failed in the default settings, just
> because the random source port happened to match a recognised service port.
Well not all protocols lend them self to "fingerprinting" aka "heuristics" so
Wireshark will try to decode packets using the dissector assigned to a port
as the default choice and I doubt that any thing else is possible.
Closing as INVALID as there is no bug in Wireshark.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.