On Wednesday 27 August 2008 11:52:18 Christoph Biedl wrote:
> Package: wireshark
> Version: 1.0.2-3
> Severity: normal
>
> "TCP Port numbers reused" happens every now and then, especially if
> the capture is run over a longer time and the client OS does not use a
> wide range of local ports.
>
> Now I noticed that at least for HTTP the extremely useful "Follow TCP
> stream" function ignores all data in the second TCP stream.  This
> hides potentially interesting data.

I'd expect this as behavior as this are indeed 2 unrelated TCP streams that 
just happen to use the same ports "by accident".

The operation is called "Follow TCP stream" not "Follow TCP streams" ;-)

Joost

> How to repeat
> -------------
>
> Use the following Perl script that does two HTTP GET request using the
> same local port number.  Insert a web server in the $host variable,
> and capture the traffic.
>
> -----------------------------------------------------------
> #!/usr/bin/perl -w
>
> use IO::Socket;
>
> use strict;
>
> my $host = 'a.web.server';
>
> for my $i (1..2) {
>     my $sock = new IO::Socket::INET (
>         PeerAddr => $host,
>         PeerPort => 80,
>         Proto => 'tcp',
>         LocalPort => 9999,
>         ReuseAddr => 1,
>     ) || die ("Cannot create socket: $!.\n");
>
>     print $sock
>         "GET / HTTP/1.0\r\n" .
>         "Host: $host\r\n" .
>         "X-Round: $i\r\n" .
>         "\r\n";
>     while (defined (my $line = <$sock>)) {
>         ;
>     }
>     undef $sock;
>     last if ($i == 2);
>     sleep (1);
> }
> exit 0;
> -----------------------------------------------------------
>
> Open the capture file in wireshark and select "Follow TCP stream".
>
> Expected behaviour: wireshark shows both request/response pairs.
>
> Seen behaviour: wireshark always only shows the first pair, identified
> by the "X-Round: 1" header. Selecting a packet of the second pair
> before doing the "Follow TCP stream" does not help.
>
> -- System Information:
> Debian Release: lenny/sid
>   APT prefers testing
>   APT policy: (500, 'testing')
> Architecture: amd64 (x86_64)
>
> Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/bash
>
> Versions of packages wireshark depends on:
> ii  libadns1              1.4-0.1            Asynchronous-capable DNS
> client li ii  libatk1.0-0           1.22.0-1           The ATK
> accessibility toolkit ii  libc6                 2.7-13             GNU C
> Library: Shared libraries ii  libcairo2             1.6.4-6            The
> Cairo 2D vector graphics libra ii  libcomerr2            1.41.0-3          
> common error description library ii  libgcrypt11           1.4.1-1         
>   LGPL Crypto library - runtime libr ii  libglib2.0-0          2.16.4-2    
>       The GLib library of C routines ii  libgnutls26           2.4.1-1     
>       the GNU TLS library - runtime libr ii  libgtk2.0-0          
> 2.12.11-3          The GTK+ graphical user interface ii  libkrb53          
>    1.6.dfsg.4~beta1-3 MIT Kerberos runtime libraries ii  libpango1.0-0     
>    1.20.5-1           Layout and rendering of internatio ii  libpcap0.8    
>        0.9.8-5            system interface for user-level pa ii  libpcre3  
>            7.6-2.1            Perl 5 Compatible Regular Expressi ii 
> libportaudio2         19+svn20071022-2   Portable audio I/O - shared librar
> ii  wireshark-common      1.0.2-3            network traffic analyser
> (common f ii  zlib1g                1:1.2.3.3.dfsg-12  compression library
> - runtime
>
> Versions of packages wireshark recommends:
> ii  gksu                          2.0.0-5    graphical frontend to su
>
> wireshark suggests no packages.
>
> -- no debconf information

-- 
homepage: http://damad.be/joost
photo/blog: http://damad.be/joost/blog



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to