[Wireshark-bugs] [Bug 12847] pdml protocol filter incorrectly filters desired subfields

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12847 Peter Wu changed: What|Removed |Added CC|

[Wireshark-bugs] [Bug 12876] [SIGSEGV] crashes on OS X in QtWidgets

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12876 Gerald Combs changed: What|Removed |Added See Also|

[Wireshark-bugs] [Bug 12876] [SIGSEGV] crashes on OS X in QtWidgets

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12876 --- Comment #3 from Evgeny --- I am using an official 2.2.0 installer downloaded from the wireshark.org. About screen says Qt 5.3.2. Hope Karabiner will be updated soon with your patch, thank you. -- You are receiving

[Wireshark-bugs] [Bug 12876] [SIGSEGV] crashes on OS X in QtWidgets

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12876 --- Comment #2 from Gerald Combs --- Workaround for Karabiner: https://github.com/tekezo/Karabiner/pull/726 -- You are receiving this mail because: You are watching all bug changes.

[Wireshark-bugs] [Bug 12804] Version 2.0.5 maybe TLS dissector having problems. Single packet causes 200MB+ of memory usage

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12804 --- Comment #11 from Peter Wu --- Creating a synthetic keylog file is doable, I will try to reproduce it later and report possible results here. -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 12804] Large SSL/TLS keylog file results in even more memory usage

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12804 Peter Wu changed: What|Removed |Added Summary|Version 2.0.5 maybe TLS |Large SSL/TLS

[Wireshark-bugs] [Bug 12876] [SIGSEGV] crashes on OS X in QtWidgets

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12876 Gerald Combs changed: What|Removed |Added See Also|

[Wireshark-bugs] [Bug 12804] Version 2.0.5 maybe TLS dissector having problems. Single packet causes 200MB+ of memory usage

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12804 --- Comment #10 from Patrick --- Also, I can gunzip that ssl key log file and attach it here if you would like. That would save you the pain of having to generate one on your own to test with. -- You are

[Wireshark-bugs] [Bug 12804] Version 2.0.5 maybe TLS dissector having problems. Single packet causes 200MB+ of memory usage

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12804 --- Comment #9 from Patrick --- (In reply to Peter Wu from comment #6) > You mentioned that the memory grows after some time, does this happen during > live captures? Do you have any interaction? We could

[Wireshark-bugs] [Bug 12885] VTPv3 dissection

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12885 --- Comment #2 from Garri --- (In reply to Alexis La Goutte from comment #1) > Hi Garri, > > There is no spec ? Hi Alexis, Unfortunately, it is Cisco proprietary protocol. There is no publicly available

[Wireshark-bugs] [Bug 12804] Version 2.0.5 maybe TLS dissector having problems. Single packet causes 200MB+ of memory usage

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12804 --- Comment #8 from Patrick --- Created attachment 14913 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=14913=edit properties of file open at 10GB -- You are receiving this mail because: You are

[Wireshark-bugs] [Bug 12804] Version 2.0.5 maybe TLS dissector having problems. Single packet causes 200MB+ of memory usage

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12804 --- Comment #7 from Patrick --- Created attachment 14912 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=14912=edit 10MB file at 10GB 10MB file opened at 5GB. -- You are receiving this mail

[Wireshark-bugs] [Bug 12843] extcap.c fails to build on some platforms when building from Wireshark 2.2.0 sources

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12843 Guy Harris changed: What|Removed |Added Summary|wireshark-gtk fails to |extcap.c fails to

[Wireshark-bugs] [Bug 12804] Version 2.0.5 maybe TLS dissector having problems. Single packet causes 200MB+ of memory usage

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12804 --- Comment #6 from Peter Wu --- That is quite a large file... if you were using Wireshark 1.12 or older, you would be crying since that was terrible inefficient with such large keylog files. The keylog file is

[Wireshark-bugs] [Bug 12804] Version 2.0.5 maybe TLS dissector having problems. Single packet causes 200MB+ of memory usage

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12804 --- Comment #5 from Patrick --- (In reply to Peter Wu from comment #4) > Can you reproduce this with other capture files? Have you configured a SSL > keylog file which happens to be large? Oh dear, thats

[Wireshark-bugs] [Bug 12071] Capture File Properties under Statistics Grayed Out after Stopping a Capture

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12071 Kevin Hatem changed: What|Removed |Added CC|

[Wireshark-bugs] [Bug 12804] Version 2.0.5 maybe TLS dissector having problems. Single packet causes 200MB+ of memory usage

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12804 --- Comment #4 from Peter Wu --- Created attachment 14911 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=14911=edit Output of Massif tool (Wireshark v2.0.5) I tried to reproduce this on Linux using

[Wireshark-bugs] [Bug 12886] New: Buildbot crash output: fuzz-2016-09-11-21126.pcap

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12886 Bug ID: 12886 Summary: Buildbot crash output: fuzz-2016-09-11-21126.pcap Product: Wireshark Version: unspecified Hardware: x86-64 URL:

[Wireshark-bugs] [Bug 12885] VTPv3 dissection

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12885 Alexis La Goutte changed: What|Removed |Added Status|UNCONFIRMED

[Wireshark-bugs] [Bug 12845] First start with non-empty extcap folder after install or reboot hangs at "initializing tap listeners"

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12845 Roland Knall changed: What|Removed |Added Status|UNCONFIRMED |CONFIRMED

[Wireshark-bugs] [Bug 12885] New: VTPv3 dissection

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12885 Bug ID: 12885 Summary: VTPv3 dissection Product: Wireshark Version: Git Hardware: All OS: All Status: UNCONFIRMED Severity: Normal

[Wireshark-bugs] [Bug 12884] sshdump only captures a few packets

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12884 Graham Bloice changed: What|Removed |Added CC|

[Wireshark-bugs] [Bug 12884] New: sshdump only captures a few packets

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12884 Bug ID: 12884 Summary: sshdump only captures a few packets Product: Wireshark Version: 2.3.x (Experimental) Hardware: x86-64 OS: Windows 10 Status:

[Wireshark-bugs] [Bug 12883] Linking problem on NetBSD: WEXITSTATUS

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12883 Pascal Quantin changed: What|Removed |Added Status|UNCONFIRMED

[Wireshark-bugs] [Bug 12843] wireshark-gtk fails to build on openSUSE 11.4 x86_64 when building from Wireshark 2.2.0 sources

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12843 Pascal Quantin changed: What|Removed |Added CC|

[Wireshark-bugs] [Bug 12883] Linking problem on NetBSD: WEXITSTATUS

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12883 Thomas Klausner changed: What|Removed |Added Attachment #14909|0 |1

[Wireshark-bugs] [Bug 12883] New: Linking problem on NetBSD: WEXITSTATUS

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12883 Bug ID: 12883 Summary: Linking problem on NetBSD: WEXITSTATUS Product: Wireshark Version: 2.2.0 Hardware: All OS: NetBSD Status: UNCONFIRMED

[Wireshark-bugs] [Bug 12831] Fails to compile against Heimdal 1.5.3

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12831 Thomas Klausner changed: What|Removed |Added CC|

[Wireshark-bugs] [Bug 12879] Cannot decrypt EAP-TTLS traffic (not recognized as conversation)

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12879 --- Comment #3 from michael+wiresh...@stapelberg.de --- (In reply to Alexis La Goutte from comment #2) > We need to use session key from > https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12880 ? Yes, you can, but it’s not strictly

[Wireshark-bugs] [Bug 12881] WIFEXITED WEXITSTATUS are not defined without

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12881 Alexis La Goutte changed: What|Removed |Added Status|UNCONFIRMED

[Wireshark-bugs] [Bug 12843] wireshark-gtk fails to build on openSUSE 11.4 x86_64 when building from Wireshark 2.2.0 sources

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12843 Alexis La Goutte changed: What|Removed |Added CC|

[Wireshark-bugs] [Bug 12879] Cannot decrypt EAP-TTLS traffic (not recognized as conversation)

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12879 Alexis La Goutte changed: What|Removed |Added CC|

[Wireshark-bugs] [Bug 12879] Cannot decrypt EAP-TTLS traffic (not recognized as conversation)

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12879 Alexis La Goutte changed: What|Removed |Added CC|

[Wireshark-bugs] [Bug 12882] New: TCP packets sometimes are incorrectly parsed as TDS (or other corruptions)

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12882 Bug ID: 12882 Summary: TCP packets sometimes are incorrectly parsed as TDS (or other corruptions) Product: Wireshark Version: 2.2.0 Hardware: x86

[Wireshark-bugs] [Bug 12880] Support dissecting AVPs in EAP-TTLS payload

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12880 --- Comment #4 from michael+wiresh...@stapelberg.de --- (In reply to Michael Mann from comment #1) > Do you have a sample capture to go with it (for testing)? Yep, attached it now. Note that you’ll need to fix/work around

[Wireshark-bugs] [Bug 12880] Support dissecting AVPs in EAP-TTLS payload

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12880 --- Comment #2 from michael+wiresh...@stapelberg.de --- Created attachment 14906 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=14906=edit EAP-TTLS capture file of a Mac doing a one-packet EAP session as inner authentication

[Wireshark-bugs] [Bug 12880] Support dissecting AVPs in EAP-TTLS payload

2016-09-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12880 --- Comment #3 from michael+wiresh...@stapelberg.de --- Created attachment 14907 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=14907=edit Corresponding session keys for previous attachment -- You are receiving this mail