Bug ID |
13147
|
Summary |
TCP option type 19 (MD5 signature) dissector is not available
|
Product |
Wireshark
|
Version |
Git
|
Hardware |
All
|
OS |
All
|
Status |
UNCONFIRMED
|
Severity |
Normal
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
bugzilla-admin@wireshark.org
|
Reporter |
g.djavadyan@gmail.com
|
CC |
alexis.lagoutte@gmail.com
|
Depends on |
13141
|
Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
(In reply to Jaap Keuter from comment #3)
> (In reply to Alexis La Goutte from comment #2)
> > (In reply to Jaap Keuter from comment #1)
> >
> > Jaap, you think work on this ?
>
> There are two thing to be done here:
> 1. Implement the TCP option 19 dissector (which should be easy now)
> 2. Implement proper default option dissectors for IP, TCP, PPP(, etc ?)
>
> Point 1 should be done through a clone of this bug, for TCP option 19
> specifically;
+++ This bug was initially created as a clone of Bug #13141 +++
Build Information:
Version 2.3.0 (v2.3.0rc0-1492-g1431b97)
--
Dear Wireshark developers,
I've attached the BGP Keepalive message with TCP MD5 signature option. I
noticed that Wireshark interprets TCP option type field [1] as IP option type
field [2]. Also, for TCP option type 19 (MD5 signature) [3] length and value
bytes are not interpreted.
[1] https://tools.ietf.org/html/rfc793#section-3.1
[2] https://tools.ietf.org/html/rfc791#section-3.1
[3] https://tools.ietf.org/html/rfc2385
Garri
You are receiving this mail because:
- You are watching all bug changes.