[Wireshark-bugs] [Bug 16265] Some Windows packages need updating

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16265 Graham Bloice changed: What|Removed |Added CC||graham.blo...@trihedral.com --- C

[Wireshark-bugs] [Bug 16265] Some Windows packages need updating

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16265 --- Comment #6 from Pascal Quantin --- For reference, the Npcap 0.9984 upgrade in master-3.0 is done in https://code.wireshark.org/review/#/c/35379/ -- You are receiving this mail because: You are watching all bug changes.___

[Wireshark-bugs] [Bug 16265] Some Windows packages need updating

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16265 --- Comment #5 from Christopher Maynard --- (In reply to Pascal Quantin from comment #2) > If you are aware of security issues with the packages we bundle, please let > us know and we will see what we can do. Otherwise we generally do not

[Wireshark-bugs] [Bug 16266] New: DHCP Dissector for Option 97 (GUID) for PXE boot does not properly present format

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16266 Bug ID: 16266 Summary: DHCP Dissector for Option 97 (GUID) for PXE boot does not properly present format Product: Wireshark Version: 3.0.6 Hardware: x86-64

[Wireshark-bugs] [Bug 16265] Some Windows packages need updating

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16265 --- Comment #4 from Pascal Quantin --- (In reply to Christopher Maynard from comment #3) > Well, it's more than just security, after all, while no new features are > introduced into older Wireshark branches, Wirehsark bugs themselves are >

[Wireshark-bugs] [Bug 16265] Some Windows packages need updating

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16265 --- Comment #3 from Christopher Maynard --- (In reply to Pascal Quantin from comment #2) > master-2.6 could deserve an update of USBPcap and Npcap, but I wonder why > people would still use it anyway. I don't know either (maybe they still

[Wireshark-bugs] [Bug 16265] Some Windows packages need updating

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16265 Pascal Quantin changed: What|Removed |Added CC||pas...@wireshark.org --- Comment

[Wireshark-bugs] [Bug 16265] Some Windows packages need updating

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16265 --- Comment #1 from Christopher Maynard --- It also looks like the latest lz4 version is 1.9.2, so it looks like all branches could use an update here. (https://github.com/lz4/lz4) -- You are receiving this mail because: You are watchin

[Wireshark-bugs] [Bug 16265] New: Some Windows packages need updating

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16265 Bug ID: 16265 Summary: Some Windows packages need updating Product: Wireshark Version: 3.0.7 Hardware: All OS: Windows Status: UNCONFIRMED Severity

[Wireshark-bugs] [Bug 16264] TWAMP dissector not working

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16264 WH83 changed: What|Removed |Added Status|INCOMPLETE |RESOLVED Resolution|---

[Wireshark-bugs] [Bug 16054] Add SSH decryption support

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16054 --- Comment #5 from Gerrit Code Review --- Change 35376 had a related patch set uploaded by Tyman Sin: SSH: Add dissection for unencrypted packets https://code.wireshark.org/review/35376 -- You are receiving this mail because: You are w

[Wireshark-bugs] [Bug 16264] TWAMP dissector not working

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16264 --- Comment #12 from Pascal Quantin --- That's correct you configure the ports used for TWAP decoding using 'Decode as' dialog rather then the protocols preference. You can click on the save button to make it persistent. -- You are recei

[Wireshark-bugs] [Bug 16264] TWAMP dissector not working

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16264 --- Comment #11 from WH83 --- Fair enough, I see it is likely customized by IXIA. Now, in new Version 3 onwards, I assume payload has to be specifically decoded and there is no way to identify the protocol automatically using (for exampl

[Wireshark-bugs] [Bug 16264] TWAMP dissector not working

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16264 --- Comment #10 from Pascal Quantin --- Then it means you are using a custom Wireshark build: I checked out the 1.8.3 source code and confirmed there is no TWAMP-Test dissector. -- You are receiving this mail because: You are watching al

[Wireshark-bugs] [Bug 16264] TWAMP dissector not working

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16264 --- Comment #9 from WH83 --- Created attachment 17509 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=17509&action=edit V1.8.3 plugins The tab is there for sure, but I do not see any TWAMP plugin -- You are receiving this ma

[Wireshark-bugs] [Bug 16264] TWAMP dissector not working

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16264 --- Comment #8 from Pascal Quantin --- Then it means that you are either having a custom version of Wireshark 1.8.3 adding TWAMP decoding, or you have installed a plug-in adding TWAMP decoding to that official version. What do you have in

[Wireshark-bugs] [Bug 16264] TWAMP dissector not working

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16264 --- Comment #7 from WH83 --- All I did in 1.8.3 was to go to Edit -> Preferences -> Protocols and picked TWAMP listed there. I believe decoding was done then based on UDP port number then. -- You are receiving this mail because: You are

[Wireshark-bugs] [Bug 16264] TWAMP dissector not working

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16264 --- Comment #6 from Pascal Quantin --- Wireshark 1.8.3 source code does not have any TWAMP dissector built-in. Maybe you are using a plugin? -- You are receiving this mail because: You are watching all bug changes.___

[Wireshark-bugs] [Bug 16264] TWAMP dissector not working

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16264 --- Comment #5 from WH83 --- (In reply to WH83 from comment #4) > Created attachment 17508 [details] > V1.8.3 decode The decode on version 1.8.3 seems to partially work Version 1.8.3 Copyright 1998-2012 Gerald Com

[Wireshark-bugs] [Bug 16264] TWAMP dissector not working

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16264 --- Comment #4 from WH83 --- Created attachment 17508 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=17508&action=edit V1.8.3 decode -- You are receiving this mail because: You are watching all bug changes.__

[Wireshark-bugs] [Bug 16264] TWAMP dissector not working

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16264 --- Comment #3 from Pascal Quantin --- Hi, could you clarify what you mean by did not work? When I apply the 'Decode as' feature and select 'TWAAMP-Test', I get: Frame 4: 1464 bytes on wire (11712 bits), 1464 bytes captured (11712 bits)

[Wireshark-bugs] [Bug 16264] TWAMP dissector not working

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16264 Pascal Quantin changed: What|Removed |Added Hardware|x86-64 |All OS|Windows S

[Wireshark-bugs] [Bug 16264] TWAMP dissector not working

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16264 --- Comment #2 from WH83 --- Hi there, I have tried it on the data portion of the UDP payload and that did not work. When moving one step up, i.e., decoding whole UDP payload it does work. -- You are receiving this mail because: You ar

[Wireshark-bugs] [Bug 16054] Add SSH decryption support

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16054 --- Comment #4 from Peter Wu --- The intention was to develop a mechanism similar to the SSLKEYLOGFILE mechanism for TLS implementations. Right now there is no implementation that writes the ephemeral Diffie-Hellman secret (or the derived

[Wireshark-bugs] [Bug 16264] TWAMP dissector not working

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16264 Pascal Quantin changed: What|Removed |Added Ever confirmed|0 |1 Status|UNCONFIRMED

[Wireshark-bugs] [Bug 16261] SMB IOCTL response packet with BUFFER_OVERFLOW status is dissected improperly

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16261 Volodymyr Khomenko changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|

[Wireshark-bugs] [Bug 15021] ZigBee APS re-assemble with re-used sequence number

2019-12-09 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15021 --- Comment #7 from Gerrit Code Review --- Change 35371 had a related patch set uploaded by Kenneth Soerensen: ZigBee: Maintain APS extended counter for nodes https://code.wireshark.org/review/35371 -- You are receiving this mail becaus