Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 4606] problem opening dumpfiles and capturing

Date: Mon, 22 Mar 2010 12:07:07 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4606

--- Comment #7 from Jeff Morriss <jeff.morriss.ws@xxxxxxxxx> 2010-03-22 12:07:05 PDT ---
OTOH, 1435526081 == 0x559063C1 and there are plenty of occurrences of that
number in the PCAP file.

Looks like that's the last 4 bytes of the 2nd packet (a DNS response pointing
to www.heise.de).  That IP features prominently in this capture file.

Looking a bit further, the PCAP global file header says the snapshot length was
96 bytes.  But, looking at frame 6, for instance, it says that only 90 bytes
were captured and Wireshark notes that the capture was truncated.  That's odd
but it *shouldn't* cause any problems.  Hand-decoding the PCAP file up to the
7th packet *seems* to be OK to me.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.