Bug ID |
10200
|
Summary |
wireshark v1.12.0-rc2 unable to dissect Kerberos protocol
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
1.12.0
|
Hardware |
x86
|
OS |
Solaris
|
Status |
UNCONFIRMED
|
Severity |
Major
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Build Information:
$ ./wireshark -v
wireshark 1.12.0-rc2 (Git Rev Unknown from unknown)
Copyright 1998-2014 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GTK+ 2.20.1, with Cairo 1.8.10, with Pango 1.28.3, with
GLib 2.28.6, with libpcap, with libz 1.2.3-T4mods, without POSIX capabilities,
without SMI, without c-ares, without ADNS, with Lua 5.1, without Python, with
GnuTLS 2.8.6, with Gcrypt 1.5.3, with MIT Kerberos, without GeoIP, without
PortAudio, with AirPcap.
Running on SunOS 5.11, with locale en_US.UTF-8, with libpcap version 1.5.1,
with
libz 1.2.3-T4mods, GnuTLS 2.8.6, Gcrypt 1.5.3, without AirPcap.
Built using Sun C 1.0
--
I just built wireshark 1.12.0-rc2 on Solaris 11 and used it on a packet capture
made using Solaris snoop. It is able to dissect a number of protocols like ARP
and DNS but none of the Kerberos messages are being dissected. They are
recognized, just not dissected. When I use wireshark v1.10.4, the krb messages
from that same snoop capture are dissected properly so this appears to be a
regresssion.
You are receiving this mail because:
- You are watching all bug changes.