ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 3070] TightVNC support for VNC dissector

Date: Wed, 3 Nov 2010 08:54:07 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3070

Yaniv Kaul <mykaul@xxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |mykaul@xxxxxxxxx

--- Comment #4 from Yaniv Kaul <mykaul@xxxxxxxxx> 2010-11-03 08:54:03 PDT ---
(In reply to comment #3)
> I just tested this code with a capture of TightVNC traffic I had laying around
> and it threw errors all over the place! :-).  I am going to remove the
> REPORT_DISSECTOR_BUG() macro call under case TIGHT_AUTH_TYPE_REPLY in
> vnc_startup_messages() because it isn't really a dissector bug when it simply
> doesn't support a certain type of packet.
> 
> Federico - do you know which type of packet comes after a
> TIGHT_AUTH_TYPE_REPLY?  We need to set per_conversation_info->vnc_next_state to
> the next packet type within that case statement so it doesn't get stuck
> thinking every packet is a TIGHT_AUTH_TYPE_REPLY. Thanks in advance.

I've just filed a bug with a patch to hopefully improve the situation.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.