Wireshark-bugs: [Wireshark-bugs] [Bug 13147] New: TCP option type 19 (MD5 signature) dissector i

Date: Wed, 16 Nov 2016 19:27:44 +0000
Bug ID 13147
Summary TCP option type 19 (MD5 signature) dissector is not available
Product Wireshark
Version Git
Hardware All
OS All
Status UNCONFIRMED
Severity Normal
Priority Low
Component Dissection engine (libwireshark)
Assignee bugzilla-admin@wireshark.org
Reporter g.djavadyan@gmail.com
CC alexis.lagoutte@gmail.com
Depends on 13141

Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
(In reply to Jaap Keuter from comment #3)
> (In reply to Alexis La Goutte from comment #2)
> > (In reply to Jaap Keuter from comment #1)
> > 
> > Jaap, you think work on this ?
> 
> There are two thing to be done here:
> 1. Implement the TCP option 19 dissector (which should be easy now)
> 2. Implement proper default option dissectors for IP, TCP, PPP(, etc ?)
> 
> Point 1 should be done through a clone of this bug, for TCP option 19
> specifically;



+++ This bug was initially created as a clone of Bug #13141 +++

Build Information:
Version 2.3.0 (v2.3.0rc0-1492-g1431b97)
--
Dear Wireshark developers,

I've attached the BGP Keepalive message with TCP MD5 signature option. I
noticed that Wireshark interprets TCP option type field [1] as IP option type
field [2]. Also, for TCP option type 19 (MD5 signature) [3] length and value
bytes are not interpreted.

[1] https://tools.ietf.org/html/rfc793#section-3.1
[2] https://tools.ietf.org/html/rfc791#section-3.1
[3] https://tools.ietf.org/html/rfc2385


Garri


You are receiving this mail because:
  • You are watching all bug changes.