[Wireshark-bugs] [Bug 14506] PROXY protocol (v2) support (HAproxy) for TCP: skip and maybe implement a full dissector
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14506 --- Comment #9 from Alexis La Goutte--- (In reply to christian.rohmann from comment #8) > Hey Alexis, > > did you get to check out the PCAP files I provided? > Is there anything else I could provide to help you finish the dissector? > > > > Thanks again for taking the time and effort to implement this. > > > Regards > > Christian Hi Christian, it is always work in progress but actually very busy... -- You are receiving this mail because: You are watching all bug changes.___ Sent via:Wireshark-bugs mailing list Archives:https://www.wireshark.org/lists/wireshark-bugs Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe
[Wireshark-bugs] [Bug 14506] PROXY protocol (v2) support (HAproxy) for TCP: skip and maybe implement a full dissector
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14506 --- Comment #8 from christian.rohm...@inovex.de --- Hey Alexis, did you get to check out the PCAP files I provided? Is there anything else I could provide to help you finish the dissector? Thanks again for taking the time and effort to implement this. Regards Christian -- You are receiving this mail because: You are watching all bug changes.___ Sent via:Wireshark-bugs mailing listArchives:https://www.wireshark.org/lists/wireshark-bugs Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe
[Wireshark-bugs] [Bug 13673] Can not post anything on ask.wireshark.org
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13673 Graham Bloicechanged: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|--- |WONTFIX CC||graham.blo...@trihedral.com --- Comment #10 from Graham Bloice --- As these reports were all for the older Ask website, I'm closing this out. Any issues with the new Ask site should be raised on a new item. -- You are receiving this mail because: You are watching all bug changes.___ Sent via:Wireshark-bugs mailing list Archives:https://www.wireshark.org/lists/wireshark-bugs Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe
[Wireshark-bugs] [Bug 14575] Possible segmentation fault in HTTP dissector, dissect_http_heur_tcp(...)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14575 Roland Haenelchanged: What|Removed |Added Resolution|--- |NOTABUG Status|UNCONFIRMED |RESOLVED --- Comment #2 from Roland Haenel --- Yes, you're right, I got it now. Looks like the safety of tvb_strncaseeql() prevented havoc here. Maybe the code could be refactored to look better, along with the negative offset stuff you mentioned it should probably read if((tvb_strncaseeql(tvb, -8, "HTTP/1.", 7) == 0)|| instead of if((tvb_strncaseeql(tvb, linelen-8, "HTTP/1.", 7) == 0)|| But you can close the bug anyway because there is effectively nothing bad happening here. Thanks for your time and sorry for reporting a non-issue. -- You are receiving this mail because: You are watching all bug changes.___ Sent via:Wireshark-bugs mailing list Archives:https://www.wireshark.org/lists/wireshark-bugs Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe