Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 2722] New: Follow TCP stream detects FIN flags as missing

Date: Fri, 18 Jul 2008 01:31:12 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2722

           Summary: Follow TCP stream detects FIN flags as missing byte
           Product: Wireshark
           Version: 1.0.0
          Platform: PC
        OS/Version: Ubuntu
            Status: NEW
          Severity: Minor
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: rtarty@xxxxxxxxx


Build Information:
Version 1.0.0

Copyright 1998-2008 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GTK+ 2.12.9, with GLib 2.16.1, with libpcap 0.9.8, with libz
1.2.3.3, with POSIX capabilities (Linux), with libpcre 7.4, without SMI, with
ADNS, with Lua 5.1, with GnuTLS 2.0.4, with Gcrypt 1.2.4, with MIT Kerberos,
with PortAudio V19-devel (built Mar 12 2008), without AirPcap.

Running on Linux 2.6.24-19-generic, with libpcap version 0.9.8.

Built using gcc 4.2.3 (Ubuntu 4.2.3-2ubuntu7).

Wireshark is Open Source Software released under the GNU General Public
License.

Check the man page and http://www.wireshark.org for more information.
--
The TCP stream is as follows:

1) A>B seq x len y
2) A>B seqX+Y FIN
3) A<B seq v len w ack X+Y+1

The "follow TCP Stream" windows shows "[1 byte missing]" just after the payload
of the first packet and before the payload of the third.

Unfortunately i cant provide the dump as it contains sensitive information.


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.