Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 3033] many zero edonkey layers for tcp(port: 4582, 4662)

Date: Wed, 17 Nov 2010 10:18:10 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3033

--- Comment #2 from Chris Maynard <christopher.maynard@xxxxxxxxx> 2010-11-17 10:18:08 PST ---
Seems like eDonkey would be better suited as a heuristic dissector than
blatantly steal ports from the registered protocols of kar2ouche, oms, noteit,
contclientms and rfa.  Also, eDonkey makes use of tcp_dissect_pdus(), so what's
this "continuation data"?  Shouldn't dissect_edonkey_tcp_pdu() get called only
when all the data is present and reassembled by TCP?  I'm not familiar enough
with eDonkey to confidently go any further with it; just posing some questions
for someone who might be.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.