Wireshark-bugs: [Wireshark-bugs] [Bug 10130] New: Follow SSL Stream duplicates last group of seg

Date: Fri, 23 May 2014 18:24:12 +0000
Bug ID 10130
Summary Follow SSL Stream duplicates last group of segments
Classification Unclassified
Product Wireshark
Version 1.10.7
Hardware x86
OS Windows 7
Status UNCONFIRMED
Severity Normal
Priority Low
Component Wireshark
Assignee [email protected]
Reporter [email protected]

Build Information:
wireshark 1.10.7 (v1.10.7-0-g6b931a1 from master-1.10)

Copyright 1998-2014 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GTK+ 2.24.14, with Cairo 1.10.2, with Pango 1.30.1, with
GLib 2.34.1, with WinPcap (4_1_3), with libz 1.2.5, without POSIX capabilities,
without libnl, with SMI 0.4.8, with c-ares 1.9.1, with Lua 5.1, without Python,
with GnuTLS 2.12.18, with Gcrypt 1.4.6, without Kerberos, with GeoIP, with
PortAudio V19-devel (built Apr 22 2014), with AirPcap.

Running on 64-bit Windows 7 Service Pack 1, build 7601, with WinPcap version
4.1.3 (packet.dll version 4.1.0.2980), based on libpcap version 1.0 branch
1_0_rel0b (20091008), GnuTLS 2.12.18, Gcrypt 1.4.6, without AirPcap.
Intel(R) Core(TM)2 Duo CPU     E8400  @ 3.00GHz, with 8061MB of physical
memory.


Built using Microsoft Visual C++ 10.0 build 40219


--

I'm tracing a HTTPS GET request with an uncompressed 96k+ payload.

When I use "Follow SSL Stream" it duplicates the last ~16kb of data in the
pop-up window and tells me the total size is ~110kb.

If I locate the final "HTTP 200 OK" frame it shows a correct view of the
payload under the HTTP details as well as in each of the lower tabbed windows,
e.g.

Frame (166 bytes) | Reassembled TCP (16421 bytes) | Decrypted SSL data (16384
bytes) | Reassembled SSL (98795 bytes ) | etc....


You are receiving this mail because:
  • You are watching all bug changes.