Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 11634] ISIS Hello trigger Error/Malformed Packet length 16

Date: Sat, 28 Nov 2015 14:17:02 +0000

Comment # 10 on bug 11634 from
(In reply to Jim Young from comment #9)
> >> pdu_length = tvb_get_ntohs(tvb, 9) - 8;
> 
> > I still kinda like this based on the options (passing packet length seems painful
> > to all of the other options that don't care), would also probably have to adjust
> > dissect_snp_checksum_clv()
> 
> With my initial proposed fix we no longer see an Error/Malformed message, 
> But we have a new problem; the ISIS Hello checksum now fails.  In the
> attached sample trace the ISIS Hellos' PDU length fields are reported as 173
> octets long, but we only pass in the last 165 octets; we need those 8
> previous octets if we really want to validate CRC.  (That's why the the
> original magic offset value was 17.)
> 
> I need to take another look later after I've had some sleep.

Hi Jim, do you have found time to sleep ? ;-)


You are receiving this mail because:
  • You are watching all bug changes.