Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 4149] IPcomp: decompress deflated payloads

Date: Tue, 30 Nov 2010 16:12:52 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4149

--- Comment #4 from Stephen Fisher <steve@xxxxxxxxxxxxxxxxxx> 2010-11-30 17:12:50 MST ---
(In reply to comment #3)
> I applied the patch, but didn't notice anything different with respect to how
> the packets were displayed in the attached packet capture file.  Does the
> packet capture file provided simply not contain any DEFLATE'd packets?  If
> that's the case, can you attach one that does?

Did you turn on the "Attempt to detect/decode NULL encrypted ESP payloads"
preference for the ESP dissector?

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.