-
Notifications
You must be signed in to change notification settings - Fork 274
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug] tcprewrite --fixlen not working #582
Comments
Unable to recreate with version 4.3.3-beta1. May need to get your PCAP file to reproduce this issue. Here is what I did with the attached pcap file which was captured with a 256 byte snaplen: tcprewrite --fixlen=pad -i test-truncated-packet.pcap -o test-fixed-packet.pcap -v
reading from file -, link-type EN10MB (Ethernet)
11:52:50.1591210370 IP 216.58.217.36.443 > 192.168.189.247.47128: Flags [P.], seq 4081210986:4081212234, ack 4052912492, win 64240, length 1248 Possibilities:
|
I have also met the similar bug. After truncating the packets, the total length in the ipv4 header exceeds the actual length by 14 bytes. The problem can be reproduced by prompting: verison: 4.3.3 |
Thanks for the sample PCAP and exact instructions. I have recreated the bug. |
…dlt_conversion Bug #582 calculate L2 length based on exporter DLT
Fixed in PR #664 |
Describe the bug
I have packet truncated packet capture file and Wireshark is not interpreting packets correctly. So I am trying tcprewrite --fixlen=pad or trunk to fix capture file, but it just goes through file and does not do anything.
Packet example:
When I do verbose I see this meassage:
11:00:56.1590051656 IP truncated-ip - 565 bytes missing! x.x.x.x.59038 > d.d.d.d.443: Flags [P.], seq 462872182:462873003, ack 2319763168, win 2048, length 821
To Reproduce
Steps to reproduce the behavior:
Expected behavior
Pading added or IP length rewriten
System (please complete the following information):
The text was updated successfully, but these errors were encountered: