Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 5459] Riverbed TCP options dissection (options 0x4c 0x4e)

Date: Thu, 9 Dec 2010 15:34:41 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5459

Gerald Combs <gerald@xxxxxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |gerald@xxxxxxxxxxxxx

--- Comment #3 from Gerald Combs <gerald@xxxxxxxxxxxxx> 2010-12-09 15:34:39 PST ---
Hi,

Riverbed has an internal dissector for their TCP options as well. An engineer
there has been working on getting it ready for inclusion in Wireshark. I'll
attach it here for comparison in the next day or so.

(Disclosure: I'm also a Riverbed employee.)

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.