Your message dated Fri, 12 Sep 2008 14:47:10 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#496768: fixed in wireshark 1.0.3-1
has caused the Debian Bug report #496768,
regarding wireshark: "Follow TCP stream" is not "Port numbers reused"-aware
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
496768: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496768
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: wireshark
Version: 1.0.2-3
Severity: normal

"TCP Port numbers reused" happens every now and then, especially if
the capture is run over a longer time and the client OS does not use a
wide range of local ports.

Now I noticed that at least for HTTP the extremely useful "Follow TCP
stream" function ignores all data in the second TCP stream.  This
hides potentially interesting data.

How to repeat
-------------

Use the following Perl script that does two HTTP GET request using the
same local port number.  Insert a web server in the $host variable,
and capture the traffic.

-----------------------------------------------------------
#!/usr/bin/perl -w

use IO::Socket;

use strict;

my $host = 'a.web.server';

for my $i (1..2) {
    my $sock = new IO::Socket::INET (
        PeerAddr => $host,
        PeerPort => 80,
        Proto => 'tcp',
        LocalPort => 9999,
        ReuseAddr => 1,
    ) || die ("Cannot create socket: $!.\n");

    print $sock 
        "GET / HTTP/1.0\r\n" .
        "Host: $host\r\n" .
        "X-Round: $i\r\n" .
        "\r\n";
    while (defined (my $line = <$sock>)) {
        ;
    }
    undef $sock;
    last if ($i == 2);
    sleep (1);
}
exit 0;
-----------------------------------------------------------

Open the capture file in wireshark and select "Follow TCP stream".

Expected behaviour: wireshark shows both request/response pairs.

Seen behaviour: wireshark always only shows the first pair, identified
by the "X-Round: 1" header. Selecting a packet of the second pair
before doing the "Follow TCP stream" does not help.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages wireshark depends on:
ii  libadns1              1.4-0.1            Asynchronous-capable DNS client li
ii  libatk1.0-0           1.22.0-1           The ATK accessibility toolkit
ii  libc6                 2.7-13             GNU C Library: Shared libraries
ii  libcairo2             1.6.4-6            The Cairo 2D vector graphics libra
ii  libcomerr2            1.41.0-3           common error description library
ii  libgcrypt11           1.4.1-1            LGPL Crypto library - runtime libr
ii  libglib2.0-0          2.16.4-2           The GLib library of C routines
ii  libgnutls26           2.4.1-1            the GNU TLS library - runtime libr
ii  libgtk2.0-0           2.12.11-3          The GTK+ graphical user interface 
ii  libkrb53              1.6.dfsg.4~beta1-3 MIT Kerberos runtime libraries
ii  libpango1.0-0         1.20.5-1           Layout and rendering of internatio
ii  libpcap0.8            0.9.8-5            system interface for user-level pa
ii  libpcre3              7.6-2.1            Perl 5 Compatible Regular Expressi
ii  libportaudio2         19+svn20071022-2   Portable audio I/O - shared librar
ii  wireshark-common      1.0.2-3            network traffic analyser (common f
ii  zlib1g                1:1.2.3.3.dfsg-12  compression library - runtime

Versions of packages wireshark recommends:
ii  gksu                          2.0.0-5    graphical frontend to su

wireshark suggests no packages.

-- no debconf information




--- End Message ---
--- Begin Message ---
Source: wireshark
Source-Version: 1.0.3-1

We believe that the bug you reported is fixed in the latest version of
wireshark, which is due to be installed in the Debian FTP archive:

tshark_1.0.3-1_i386.deb
  to pool/main/w/wireshark/tshark_1.0.3-1_i386.deb
wireshark-common_1.0.3-1_i386.deb
  to pool/main/w/wireshark/wireshark-common_1.0.3-1_i386.deb
wireshark-dev_1.0.3-1_i386.deb
  to pool/main/w/wireshark/wireshark-dev_1.0.3-1_i386.deb
wireshark_1.0.3-1.diff.gz
  to pool/main/w/wireshark/wireshark_1.0.3-1.diff.gz
wireshark_1.0.3-1.dsc
  to pool/main/w/wireshark/wireshark_1.0.3-1.dsc
wireshark_1.0.3-1_i386.deb
  to pool/main/w/wireshark/wireshark_1.0.3-1_i386.deb
wireshark_1.0.3.orig.tar.gz
  to pool/main/w/wireshark/wireshark_1.0.3.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joost Yervante Damad <[EMAIL PROTECTED]> (supplier of updated wireshark package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 12 Sep 2008 15:05:58 +0200
Source: wireshark
Binary: wireshark-common wireshark tshark wireshark-dev
Architecture: source i386
Version: 1.0.3-1
Distribution: unstable
Urgency: high
Maintainer: Frederic Peters <[EMAIL PROTECTED]>
Changed-By: Joost Yervante Damad <[EMAIL PROTECTED]>
Description: 
 tshark     - network traffic analyzer (console)
 wireshark  - network traffic analyzer
 wireshark-common - network traffic analyser (common files)
 wireshark-dev - network traffic analyser (development tools)
Closes: 496768 497878
Changes: 
 wireshark (1.0.3-1) unstable; urgency=high
 .
   * New upstream release 1.0.3 (Closes: #497878)
     - release notes:
      http://www.wireshark.org/docs/relnotes/wireshark-1.0.3.html
     - security fixes:
       - The NCP dissector was susceptible to a number of problems,
         including buffer overflows and an infinite loop
         (CVE-2008-3146, CVE-2008-3932)
       - Wireshark could crash while uncompressing zlib-compressed
         packet data (CVE-2008-3933)
       - Wireshark could crash while reading a Tektronix .rf5 file
         (CVE-2008-3934)
     - other fixes:
       - Following a TCP stream could incorrectly reassemble packets
         (Closes: #496768)
Checksums-Sha1: 
 e827500609cb31167684ee30565603cf86af1bf4 1470 wireshark_1.0.3-1.dsc
 160c8be5700aa045d85c07ab52bf8089c21bef2d 16782097 wireshark_1.0.3.orig.tar.gz
 796cd9b5eb0fe13c5c7d61ec3cc78dcd53f48865 47966 wireshark_1.0.3-1.diff.gz
 4069adcf9ebae2a627c65b8c9f3f05a81cf2c98d 10124450 
wireshark-common_1.0.3-1_i386.deb
 bcee2c8296e0f63d0d1872b49109ac4ac631a05b 619504 wireshark_1.0.3-1_i386.deb
 6bc5d436e06143496a16b3dae72f00c961da491e 112054 tshark_1.0.3-1_i386.deb
 60ddbed00cfa85f93ebf8f5ab8d49e79e728a77f 570440 wireshark-dev_1.0.3-1_i386.deb
Checksums-Sha256: 
 24b3273a0553424fa70d43163d869f8ce9c6beb245b8ed11131314386ad443bb 1470 
wireshark_1.0.3-1.dsc
 640bf50f7c05b627cfd86e78d8742050fc023c0c2931f14324d4b103cdde1ced 16782097 
wireshark_1.0.3.orig.tar.gz
 724389ea520ebae7b438d0dd337558c5951b3d6d7f971427ef711cfe74f2bbfe 47966 
wireshark_1.0.3-1.diff.gz
 cb041912d1afa7277e043b5d0abff23b1610bba32425208dbcb6bb6fd0bdd3e1 10124450 
wireshark-common_1.0.3-1_i386.deb
 cea07776221b1fb9c657d177424a24ab843cd98829c8436b433dd05da2a2839d 619504 
wireshark_1.0.3-1_i386.deb
 e765ec5a7d0f0d4a7822abe06051743307408266a1b3467b0ffec1470a6147c9 112054 
tshark_1.0.3-1_i386.deb
 22dbc1fe28c0d616e894a42bfacf282940898cbc19b57fd038e2d5aaaaf057fd 570440 
wireshark-dev_1.0.3-1_i386.deb
Files: 
 afbf7901ef1ae29d44db50999c78fa0c 1470 net optional wireshark_1.0.3-1.dsc
 ca48718f71d9bc1838fb44da872c1d14 16782097 net optional 
wireshark_1.0.3.orig.tar.gz
 6518ab8608d6f55341f55f32b0bdc56a 47966 net optional wireshark_1.0.3-1.diff.gz
 40dd1e57d732a68ce17101c6384154ab 10124450 net optional 
wireshark-common_1.0.3-1_i386.deb
 f043dda7e5e299e6482ea5e7eb496c15 619504 net optional wireshark_1.0.3-1_i386.deb
 d17de9e913197829c0de28def28ded06 112054 net optional tshark_1.0.3-1_i386.deb
 2bbd083957aaca696723c2f4f1ceff8b 570440 devel optional 
wireshark-dev_1.0.3-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkjKd/gACgkQ0/r2+3z8lN0/GgCfRFVh+TiUaPcwnIPVq5+QEFhC
YgUAn1cBH1mgGXt5HmpNDTG6C4wHhAhm
=R7HL
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to