Bug ID |
12282
|
Summary |
TCP Analyzer - spurious retransmissions not always recognized
|
Product |
Wireshark
|
Version |
Git
|
Hardware |
x86-64
|
OS |
Red Hat
|
Status |
UNCONFIRMED
|
Severity |
Minor
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Created attachment 14437 [details]
A pcap with a single spurious retransmission - that is not marked as such.
Build Information:
Wireshark 2.1.0 (v2.1.0rc0-2411-g3385002 from master)
Copyright 1998-2016 Gerald Combs <[email protected]> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with Qt 4.8.5, with libpcap, without POSIX capabilities,
without libnl, with libz 1.2.7, with GLib 2.42.2, without SMI, with c-ares
1.10.0, without Lua, without GnuTLS, without Gcrypt, with MIT Kerberos, without
GeoIP, with QtMultimedia, without AirPcap.
Running on Linux 3.10.0-327.el7.x86_64, with locale C, with libpcap version
1.5.3, with libz 1.2.7.
Intel(R) Core(TM) i7-4870HQ CPU @ 2.50GHz (with SSE4.2)
--
The TCP Analyzer (packet-tcp.c) does not recognize spurious retransmissions
when the retransmitted packet's sequence number + len exactly equals the last
ack. They are marked as regular retransmissions. See the attached pcap.
I will be submitting a patch for this issue for review.
You are receiving this mail because:
- You are watching all bug changes.