ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 2731] New: tshark/wireshark don't allow snaplen < 68

Date: Tue, 22 Jul 2008 04:39:10 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2731

           Summary: tshark/wireshark don't allow snaplen < 68
           Product: Wireshark
           Version: unspecified
          Platform: PC
        OS/Version: All
            Status: NEW
          Severity: Normal
          Priority: Low
         Component: TShark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: mkucenski@xxxxxxx


Build Information:
TShark 1.0.2 (SVN Rev 25698)

Copyright 1998-2008 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GLib 2.14.6, with WinPcap (version unknown), with libz 1.2.3,
without POSIX capabilities, with libpcre 7.0, with SMI 0.4.8, with ADNS, with
Lua 5.1, with GnuTLS 2.3.8, with Gcrypt 1.4.1, with MIT Kerberos.

Running on Windows XP Service Pack 3, build 2600, with WinPcap version 4.0.2
(packet.dll version 4.0.0.1040), based on libpcap version 0.9.5.

Built using Microsoft Visual C++ 6.0 build 8804
--
Attempting to use tshark to only capture IP Packet headers (e.g. snaplen=34, 14
ethernet and 20 IP).  tshark seems to ignore values less than 68.  This seems
like an arbitrary restriction that in my case is a necessity.  Tcpdump and
daemonlogger both allow smaller snaplen values.  Is there any reason why tshark
cannot do the same?


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.