[Wireshark-bugs] [Bug 14241] BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not able to decode the packet correctly

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 --- Comment #11 from Garri --- (In reply to Dipankar Shaw from comment #10) > How to use the patch to load in my current wireshark version > Version 2.4.2 (v2.4.2-0-gb6c63ae086) > or, Can you give me a download link

[Wireshark-bugs] [Bug 14241] BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not able to decode the packet correctly

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 --- Comment #12 from Garri --- Below is important note from the RFC 7911 [1], related to the issue: - The only explicit indication that the encoding described in Section 3 is in use in a particular

[Wireshark-bugs] [Bug 13260] packet-rpcrdma: properly dissect NFS READ and WRITE requests that use chunks

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13260 Jorge Mora changed: What|Removed |Added CC||m...@netapp.com

[Wireshark-bugs] [Bug 14250] New: Buildbot crash output: fuzz-2017-11-28-28119.pcap

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14250 Bug ID: 14250 Summary: Buildbot crash output: fuzz-2017-11-28-28119.pcap Product: Wireshark Version: unspecified Hardware: x86-64 OS: Ubuntu Status:

[Wireshark-bugs] [Bug 13122] "Decode as" on a packet isn't working for DCERPC/SPOOLSS with the Qt frontend

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13122 --- Comment #4 from Gerrit Code Review --- Change 24602 merged by Anders Broman: Qt: Add support for DCE/RPC in Decode As https://code.wireshark.org/review/24602 -- You are receiving this mail

[Wireshark-bugs] [Bug 12075] Error while trying to run remote capture - bind address already in use (code 98)

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12075 --- Comment #12 from Guy Harris --- (In reply to Guy Harris from comment #11) > Oh, wait, that's probably an error from the *server*, which is probably > running Linux. Linux, in what I assume is a desire to be as >

[Wireshark-bugs] [Bug 12075] Error while trying to run remote capture - bind address already in use (code 98)

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12075 --- Comment #10 from Guy Harris --- (In reply to Jörg Mayer from comment #8) > Created attachment 15332 [details] > Capture opening multiple interfaces > > jmayer@newegg:~/firmatmp/2017kw11vwfs$ dumpcap -i >

[Wireshark-bugs] [Bug 12075] Error while trying to run remote capture - bind address already in use (code 98)

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12075 --- Comment #11 from Guy Harris --- (In reply to Guy Harris from comment #10) > (In reply to Jörg Mayer from comment #8) > > Created attachment 15332 [details] > > Capture opening multiple interfaces > > > >

[Wireshark-bugs] [Bug 14241] BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not able to decode the packet correctly

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 Alexis La Goutte changed: What|Removed |Added Status|RESOLVED

[Wireshark-bugs] [Bug 12075] Error while trying to run remote capture - bind address already in use (code 98)

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12075 --- Comment #13 from Guy Harris --- (In reply to Guy Harris from comment #11) > If so, that suggests that the Linux stack has the same behavior, so either > I'm missing something about how listening for both IPv4 and

[Wireshark-bugs] [Bug 14250] Buildbot crash output: fuzz-2017-11-28-28119.pcap

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14250 --- Comment #1 from Gerrit Code Review --- Change 24621 had a related patch set uploaded by Pascal Quantin: CIP Safety: check packet length before dissecting https://code.wireshark.org/review/24621 --

[Wireshark-bugs] [Bug 12075] Error while trying to run remote capture - bind address already in use (code 98)

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12075 Guy Harris changed: What|Removed |Added OS|Windows 10 |All

[Wireshark-bugs] [Bug 14115] packet-knxnetip.c:936: bad bitmask ?

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14115 Gerald Combs changed: What|Removed |Added Summary|wireshark-2.4.2/epan/dissec

[Wireshark-bugs] [Bug 14116] packet-q931.c:1306: bad compare ?

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14116 Gerald Combs changed: What|Removed |Added Summary|wireshark-2.4.2/epan/dissec

[Wireshark-bugs] [Bug 14131] 3GPP Civic Address not displayed in Packet Details

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14131 Gerald Combs changed: What|Removed |Added Summary|Civic Address not displayed |3GPP Civic

[Wireshark-bugs] [Bug 14094] File loading is very slow with TRANSUM dissector enabled

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14094 Gerald Combs changed: What|Removed |Added Summary|File loading is very slow |File loading

[Wireshark-bugs] [Bug 14197] Wireshark crashes if "rip.display_routing_domain" is set to TRUE in preferences file

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14197 Gerald Combs changed: What|Removed |Added Summary|WireShark crashes if|Wireshark

[Wireshark-bugs] [Bug 14136] PEEKREMOTE dissector does not decode 11ac MCS rates properly

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14136 Gerald Combs changed: What|Removed |Added Summary|Peekremote dissector does |PEEKREMOTE

[Wireshark-bugs] [Bug 13846] Makefile: version target is run 2x with autotools

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13846 João Valverde changed: What|Removed |Added Resolution|---

[Wireshark-bugs] [Bug 14241] BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not able to decode the packet correctly

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 --- Comment #18 from Dipankar Shaw --- hi garri, I see in this build Version 2.4.3rc0-70-gf40faca928 (v2.4.3rc0-70-gf40faca928) When there is no path ID in the Update packet, then Wire-shark is not able to decode

[Wireshark-bugs] [Bug 13096] Allow capture of iptap and pktap pseudo-interfaces on Mac OS

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13096 --- Comment #3 from Gerrit Code Review --- Change 24641 had a related patch set uploaded by Jim Young: [WIP] Initial support for reading Apple's pktap pcapng values

[Wireshark-bugs] [Bug 14250] Buildbot crash output: fuzz-2017-11-28-28119.pcap

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14250 --- Comment #2 from Gerrit Code Review --- Change 24621 merged by Anders Broman: CIP Safety: check packet length before dissecting https://code.wireshark.org/review/24621 -- You are receiving this

[Wireshark-bugs] [Bug 14241] BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not able to decode the packet correctly

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 Dipankar Shaw changed: What|Removed |Added CC|

[Wireshark-bugs] [Bug 14241] BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not able to decode the packet correctly

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 --- Comment #17 from Dipankar Shaw --- (In reply to Garri from comment #11) > (In reply to Dipankar Shaw from comment #10) > > How to use the patch to load in my current wireshark version > > Version 2.4.2

[Wireshark-bugs] [Bug 14243] Wrong SSL decryption when using EXTENDED MASTER SECRET and Client certificate request (mutual authentication)

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14243 --- Comment #24 from Peter Wu --- (In reply to Alexis La Goutte from comment #23) > (In reply to Peter Wu from comment #22) > > Fixed in master and backported to master-2.4, will be part of 2.4.3. > > Add a check on

[Wireshark-bugs] [Bug 14241] BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not able to decode the packet correctly

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 --- Comment #14 from Garri --- (In reply to Alexis La Goutte from comment #13) > or need to add preference to force a capability... Maybe Wireshark could use some heuristics. For example, it could try to dissect an

[Wireshark-bugs] [Bug 14241] BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not able to decode the packet correctly

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 --- Comment #16 from Dipankar Shaw --- (In reply to Garri from comment #12) > > If I understand It correctly, Wireshark should decode NLRI as Add-path > capable only if it seen Open messages exchange with Add-path

[Wireshark-bugs] [Bug 14247] Cannot decrypt DTLS with Session Tickets and Client certificate request (mutual authentication) by mbedTLS library

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14247 --- Comment #4 from Oren --- Will the wireshark logs be enough? anything else you need for the investigation? thanks. -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 14247] Cannot decrypt DTLS with Session Tickets and Client certificate request (mutual authentication) by mbedTLS library

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14247 --- Comment #3 from Oren --- Following additional test - This problem occurred only in the 2nd handshake of the connection (while wireshark listening to both sessions). Scenario to reproduce: * Use mbedTLS library,

[Wireshark-bugs] [Bug 14241] BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not able to decode the packet correctly

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 --- Comment #15 from Garri --- (In reply to Garri from comment #14) > P.S.: I could provide any BGP conversations related to AddPath capability, > if needed. I mean dumps of BGP messages. -- You are receiving

[Wireshark-bugs] [Bug 14247] Cannot decrypt DTLS with Session Tickets and Client certificate request (mutual authentication) by mbedTLS library

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14247 --- Comment #2 from Oren --- Hi, This defect has nothing to do with the extended Master secret. It happened both when it was enabled and not. I would have created the trace over the internet with this issue but I

[Wireshark-bugs] [Bug 14247] Cannot decrypt DTLS with Session Tickets and Client certificate request (mutual authentication) by mbedTLS library

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14247 --- Comment #1 from Peter Wu --- Session tickets are defined in https://tools.ietf.org/html/rfc5077#section-3.1 NST appears after CCS, so that should be ok. Not sure what is wrong. Does this have

[Wireshark-bugs] [Bug 14241] BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not able to decode the packet correctly

2017-11-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 --- Comment #10 from Dipankar Shaw --- How to use the patch to load in my current wireshark version Version 2.4.2 (v2.4.2-0-gb6c63ae086) or, Can you give me a download link for Wire shark containing this Patch !!