Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 6556] New: TCP Checksum

Date: Wed, 9 Nov 2011 17:38:14 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6556

           Summary: TCP Checksum
           Product: Wireshark
           Version: 1.6.3
          Platform: x86-64
        OS/Version: Windows 7
            Status: NEW
          Severity: Major
          Priority: Low
         Component: Wireshark
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: sborisch@xxxxxxxxxxxxxxx


Created an attachment (id=7392)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=7392)
Input Pcap file -- packet 7 will be fragmented.

Build Information:
Version 1.6.3 (SVN Rev 39702 from /trunk-1.6)

Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (32-bit) with GTK+ 2.22.1, with GLib 2.26.1, with WinPcap (version
unknown), with libz 1.2.5, without POSIX capabilities, without libpcre, with
SMI
0.4.8, with c-ares 1.7.1, with Lua 5.1, without Python, with GnuTLS 2.10.3,
with
Gcrypt 1.4.6, with MIT Kerberos, with GeoIP, with PortAudio V19-devel (built
Nov
 1 2011), with AirPcap.

Running on Windows XP Service Pack 3, build 2600, with WinPcap version 4.1.2
(packet.dll version 4.1.0.2001), based on libpcap version 1.0 branch 1_0_rel0b
(20091008), GnuTLS 2.10.3, Gcrypt 1.4.6, without AirPcap.

Built using Microsoft Visual C++ 9.0 build 21022

Wireshark is Open Source Software released under the GNU General Public
License.

Check the man page and http://www.wireshark.org for more information.
--
We have a device that performs IPv4 Fragmentation on Ethernet packets.  When
capturing the output of the device (fragmented packets), wireshark reports TCP
checksum errors.  Manually inspecting the fragmented packets shows this to not
be true.  The TCP checksum in the TCP header in the first of the two packet
fragments is unchanged, and none of the TCP payload data bytes have been
altered.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.