Wireshark-bugs: [Wireshark-bugs] [Bug 5546] Got error "Malformed Packets" on decoding SCTP init
Date: Tue, 4 Jan 2011 15:10:23 -0800 (PST)

Jeff Morriss <[email protected]> changed:

           What    |Removed                     |Added
             Status|NEW                         |RESOLVED
         Resolution|                            |INVALID

--- Comment #2 from Jeff Morriss <[email protected]> 2011-01-04 15:10:21 PST ---
Starting in rev 35366, the SCTP dissector will show you this about the first

Stream Control Transmission Protocol, Src Port: 34119 (34119), Dst Port: 20000
    Source port: 34119
    Destination port: 20000
    Verification tag: 0x00000000
    Checksum: 0x2dd0b7fc [incorrect, should be 0x47c7120c (Adler32) or
0x58fa8a0c (CRC32C)]
    INIT chunk (Outbound streams: 5, inbound streams: 5)
        Chunk type: INIT (1)
            0... .... = Bit: Stop processing of the packet
            .0.. .... = Bit: Do not report
        Chunk flags: 0x00
        Chunk length: 108
            [Expert Info (Error/Malformed): Chunk length (108) is longer than
remaining data (100) in the packet]
                [Message: Chunk length (108) is longer than remaining data
(100) in the packet]
                [Severity level: Error]
                [Group: Malformed]
        Initiate tag: 0x9f25ef61
        Advertised receiver window credit (a_rwnd): 2097152
        Number of outbound streams: 5
        Number of inbound streams: 5
        Initial TSN: 2271736697
[Malformed Packet: SCTP]
    [Expert Info (Error/Malformed): Malformed Packet (Exception occurred)]
        [Message: Malformed Packet (Exception occurred)]
        [Severity level: Error]
        [Group: Malformed]

Technically the dissector should be able to dissect even further into the
packet, but that requires more work.

Closing this bug since it's not a bug in Wireshark that the packet is

Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.