ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 12874] New: Unable to dissect SPDY streams after a protoco

Date: Sun, 11 Sep 2016 16:03:28 +0000
Bug ID 12874
Summary Unable to dissect SPDY streams after a protocol switch in plain text
Product Wireshark
Version 2.1.x (Experimental)
Hardware x86
OS Fedora
Status UNCONFIRMED
Severity Major
Priority Low
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Build Information:
Wireshark 2.1.1 (Git Rev Unknown from unknown)

Copyright 1998-2016 Gerald Combs <[email protected]> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GTK+ 3.20.6, with Cairo 1.14.6, with Pango 1.40.1, with
libpcap, with POSIX capabilities (Linux), with libnl 3, with GLib 2.48.1, with
zlib 1.2.8, with SMI 0.4.8, with c-ares 1.11.0, without Lua, with GnuTLS
3.4.14,
with Gcrypt 1.6.5, with MIT Kerberos, with GeoIP, with PortAudio V19-devel
(built Feb  5 2016 01:14:30), without AirPcap.

Running on Linux 4.7.2-201.fc24.x86_64, with locale en_US.UTF-8, with libpcap
version 1.7.4, with GnuTLS 3.4.14, with Gcrypt 1.6.6, with zlib 1.2.8.
Intel(R) Core(TM) i7-4600U CPU @ 2.10GHz (with SSE4.2)

Built using gcc 6.1.1 20160621 (Red Hat 6.1.1-3).
--
I have a tcpdump capture which contains a conversation between a http client
and server, in PLAIN TEXT.

After the protocol switching they start a SPDY stream.

I cannot debug the SPDY stream, only HTTP. If I choose Anaylize->Decode
As->SPDY all I see is tcp stuff.


You are receiving this mail because:
  • You are watching all bug changes.