ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 5810] Add conversation tracking to ICMPv6

Date: Mon, 11 Apr 2011 10:51:56 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5810

Chris Maynard <christopher.maynard@xxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|ASSIGNED                    |RESOLVED
         Resolution|                            |FIXED

--- Comment #10 from Chris Maynard <christopher.maynard@xxxxxxxxx> 2011-04-11 10:51:54 PDT ---
OK, so that was pretty easy to implement.  I never really looked at ICMPv6
before.  I guess I was expecting something more radically different from
ICMPv4, but it's basically the same thing.  Still, the capture files did help
to verify proper operation, and there were some minor differences, so thanks
for those.

Anyway, this is now fixed in r36561.  Like ICMPv4, I also added a tshark tap;
however, a Wireshark tap has not yet been implemented.  Guy seemed to suggest
that we might be able to make use of the stats_tree stuff for ICMPv4, so that
almost certainly applies here as well.  At some point in the hopefully not too
distant future, I'll try to take a look at that.  If it can be used, then I'll
convert it over; otherwise it could be awhile before I ever get around to
adding a Wireshark tap to either ICMPv4 or ICMPv6.

Lastly, the ICMPv6 payload also appears to carry the sender's timestamp, so
like ICMPv4 (see bug 5770), this information might be used to estimate the
total SRT.  My initial results were not very good with ICMPv4 though, but this
might be a future area of interest to someone.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.