Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 3317] pop/imf: malformed packet and a superfluous newline

Date: Tue, 23 Nov 2010 18:52:33 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3317

Guy Harris <guy@xxxxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
           Platform|x86                         |All
         OS/Version|Gentoo                      |All

--- Comment #7 from Guy Harris <guy@xxxxxxxxxxxx> 2010-11-23 18:52:32 PST ---
Probably the right way to handle this would be to, in the first pass over the
capture (when the capture is being read in), check for STLS requests and a +OK
response to STLS and, for all data following the +OK response, treat that as a
TLS negotiation followed by TLS traffic.  See RFC 2595.

We should also perhaps be more careful to decide whether we're seeing a mail
message - for some reason, we're treating packets 10 and beyond as a mail
message.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.