ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Ethereal-dev: [Ethereal-dev] Malformed Header Problem with Dantz Retrospect

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

From: "Steven J. Backus" <backus@xxxxxxxxxxxxx>
Date: Wed, 9 Jun 2004 09:54:02 -0600 (MDT)
  Apologies in advance if this is not a good place to ask about
this.  I am using a disk backup program called Retrospect from
Dantz.  The application is failing and the Dantz people say it is
hardware or network related.  Every other application works fine on
this machine, a Windows 2000 box.  Here's ethereal's output, does
anyone know what hardware problem could cause this?  TIA.

Steve

453.765578 155.100.176.25 -> 155.100.158.57 TCP [TCP Retransmission] dantz > 49166 [ACK] Seq=90548355 Ack=1124814 Win=49152 Len=12 TSV=698715 TSER=2045316676
453.765759 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#13] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.767222 155.100.176.25 -> 155.100.158.57 TCP [TCP Retransmission] dantz > 49166 [ACK] Seq=90548367 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704
453.767338 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#14] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.768783 155.100.176.25 -> 155.100.158.57 TDS [TCP Retransmission] Login Packet (Not last buffer) (Not last buffer)[Unreassembled Packet]
453.768897 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#15] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.770381 155.100.176.25 -> 155.100.158.57 TCP [TCP Retransmission] dantz > 49166 [ACK] Seq=90551263 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704
453.770559 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#16] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.772026 155.100.176.25 -> 155.100.158.57 TDS [TCP Retransmission] Unknown Packet Type: 249[Malformed Packet]
453.772148 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#17] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.773598 155.100.176.25 -> 155.100.158.57 TDS [TCP Retransmission] Query Packet (Not last buffer) (Not last buffer)
453.773716 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#18] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.775159 155.100.176.25 -> 155.100.158.57 TDS [TCP Out-Of-Order] Remote Procedure Call Packet (Not last buffer) (Not last buffer)[Unreassembled Packet]
453.775278 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#19] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.776723 155.100.176.25 -> 155.100.158.57 TDS [TCP Previous segment lost] Remote Procedure Call Packet (Not last buffer) (Not last buffer) (Not last buffer)[Unreassembled Packet]
453.776844 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#20] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.778300 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90558503 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704
453.778421 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#21] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.779878 155.100.176.25 -> 155.100.158.57 TDS Query Packet[Unreassembled Packet]
453.780002 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#22] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.781459 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 228 (Not last buffer)[Unreassembled Packet]
453.781589 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#23] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.783030 155.100.176.25 -> 155.100.158.57 TDS Query Packet (Not last buffer)[Unreassembled Packet]
453.783160 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#24] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.784618 155.100.176.25 -> 155.100.158.57 TDS Query Packet (Not last buffer)
453.784744 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#25] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.786186 155.100.176.25 -> 155.100.158.57 TDS Login Packet (Not last buffer)
453.786314 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#26] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.787778 155.100.176.25 -> 155.100.158.57 TDS Query Packet (Not last buffer)
453.787907 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#27] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.789371 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90568639 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704
453.789510 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#28] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.791005 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0[Unreassembled Packet]
453.791136 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#29] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.792598 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 255[Malformed Packet]
453.792742 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#30] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.794225 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0[Malformed Packet]
453.794359 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#31] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.795872 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0
453.796010 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#32] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.797456 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0
453.797593 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#33] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.799061 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0 (Not last buffer)[Unreassembled Packet]
453.799197 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#34] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.800700 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0[Malformed Packet]
453.800835 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#35] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.802316 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90580223 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704
453.802511 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#36] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.803976 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0[Malformed Packet]
453.804106 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#37] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.805550 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90583119 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704
453.805707 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#38] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.807148 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90584567 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704
453.807278 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#39] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.808721 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90586015 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704
453.808869 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#40] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.810342 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90587463 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704
453.810548 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#41] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.812013 155.100.176.25 -> 155.100.158.57 TCP dantz > 49166 [ACK] Seq=90588911 Ack=1124814 Win=49152 Len=1448 TSV=698715 TSER=2045316704
453.812202 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#42] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.813692 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0 (Not last buffer)[Malformed Packet]
453.813858 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#43] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.815326 155.100.176.25 -> 155.100.158.57 TDS Unknown Packet Type: 0[Malformed Packet]
453.815498 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#44] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571
453.815546 155.100.158.57 -> 155.100.176.25 TCP [TCP Dup ACK 144364#45] 49166 > dantz [ACK] Seq=1124814 Ack=90546907 Win=66608 Len=0 TSV=2045316704 TSER=698571