Bug ID |
13199
|
Summary |
RPC-over-RDMA dissector requires ConnectionRequest packet in capture
|
Product |
Wireshark
|
Version |
unspecified
|
Hardware |
All
|
OS |
All
|
Status |
UNCONFIRMED
|
Severity |
Normal
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Build Information:
TShark (Wireshark) 2.3.0 (v2.3.0rc0-1610-ga29adc3)
Copyright 1998-2016 Gerald Combs <[email protected]> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with libpcap, with POSIX capabilities (Linux), with libnl 3,
with GLib 2.48.2, with zlib 1.2.8, with SMI 0.4.8, with c-ares 1.12.0, without
Lua, with GnuTLS 3.4.16, with Gcrypt 1.6.6, with MIT Kerberos, with GeoIP,
without nghttp2, without LZ4, without Snappy.
Running on Linux 4.8.10-200.fc24.x86_64, with Intel(R) Core(TM) i7-5557U CPU @
3.10GHz (with SSE4.2), with 1981 MB of physical memory, with locale
en_US.UTF-8,
with libpcap version 1.7.4, with GnuTLS 3.4.16, with Gcrypt 1.6.6, with zlib
1.2.8.
Built using gcc 6.2.1 20160916 (Red Hat 6.2.1-2).
--
The RPC-over-RDMA dissector doesn't work unless the ConnectRequest exchange
appears in the capture. If a capture is an excerpt of some traffic without the
CREQ, the RPC-over-RDMA dissector ignores the traffic completely.
Often NFS captures are done while a problem is ongoing on one or more
connections. There is way too much traffic involved to capture from beginning
to end.
You are receiving this mail because:
- You are watching all bug changes.