Bug ID |
9762
|
Summary |
Rx ACK packets are displayed with transposed Interface MTU and Max MTU fields
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
1.10.5
|
Hardware |
x86
|
OS |
All
|
Status |
UNCONFIRMED
|
Severity |
Major
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Created attachment 12560 [details]
Network trace that will exhibit the problem
Build Information:
Version 1.10.5 (SVN Rev Unknown from unknown)
Copyright 1998-2013 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GTK+ 2.24.22, with Cairo 1.13.1, with Pango 1.36.1, with
GLib 2.38.2, with libpcap, with libz 1.2.8, with POSIX capabilities (Linux),
without libnl, with SMI 0.4.8, with c-ares 1.10.0, with Lua 5.2, without
Python,
with GnuTLS 3.1.18, with Gcrypt 1.5.3, with MIT Kerberos, with GeoIP, with
PortAudio V19-devel (built Aug 4 2013 06:59:20), with AirPcap.
Running on Linux 3.14.0-rc1-fsdevel+, with locale en_GB.UTF-8, with libpcap
version 1.5.0, with libz 1.2.8, GnuTLS 3.1.17, Gcrypt 1.5.3, without AirPcap.
Intel(R) Core(TM)2 CPU 6300 @ 1.86GHz
Built using gcc 4.8.2 20131212 (Red Hat 4.8.2-7).
Wireshark is Open Source Software released under the GNU General Public
License.
Check the man page and http://www.wireshark.org for more information.
--
When displaying an Rx ACK packet, wireshark transposes the Interface MTU and
Max MTU fields.
Open the that attached network trace, go to packet 20, an Rx ACK packet going
from 90.155* to 204.29*. In the parsed packet contents window, go to "RX
Protocol" and thence to "ACK Packet". Under that you will see "Interface MTU"
first (val 5692) and then "Max MTU" (val 1444). Those two labels should be the
other way around.
You are receiving this mail because:
- You are watching all bug changes.