bugzilla-daemon | 1 May 17:13 2012

[Bug 7210] Buildbot crash output: fuzz-2012-04-27-376.pcap

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7210

--- Comment #7 from Jeff Morriss <jeff.morriss.ws <at> gmail.com> 2012-05-01 08:13:39 PDT ---
(In reply to comment #5)
> (In reply to comment #4)
> > (In reply to comment #3)
> > > "Exception Occurred" means the dissector did crash
> > 
> > No, it means that the dissector called a tvbuff routine to fetch some data and
> > the data wasn't actually present in the tvbuff; this either means
> > 
> >     1) the dissector is attempting to fetch data that is legitimately not
> > there, which is a dissector bug;
> 
> Yes.
> 
> >     2) the dissector is attempting to fetch data that is supposed to be there,
> > but that isn't there in the packet, which is *not* a dissector bug, it's a
> > malformed packet;
> 
> Most of the time (in my experience) this is due to the dissector not validating
> a length field, in which case it is more correct for the dissector to validate
> the field against tvb_reported_length() or tvb_reported_length_remaining(), add
> an expert info to the actual malformed field, and continue on to dissect as
> much of the rest of the packet as it can.

FWIW, I tend to dislike dissectors that do that.  In my mind, simple is better
when it comes to dissectors: just dissect your stuff and if you go off the end
of a TVB, throw an exception and be done with it.  It does mean that exceptions
mean dissection stops, but, well...  Such is the price for (dramatically?)
(Continue reading)

bugzilla-daemon | 1 May 17:24 2012

[Bug 7220] New: Add decoding of ACS to packet-dtn.c

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7220

           Summary: Add decoding of ACS to packet-dtn.c
           Product: Wireshark
           Version: SVN
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Normal
          Priority: Medium
         Component: Wireshark
        AssignedTo: bugzilla-admin <at> wireshark.org
        ReportedBy: james.r.wright <at> colorado.edu

Jim Wright <james.r.wright <at> colorado.edu> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #8354|                            |review_for_checkin?
              Flags|                            |

Created attachment 8354
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=8354
patch file for ACS code

Build Information:
wireshark 1.7.2 (SVN Rev 42373 from /trunk)

Copyright 1998-2012 Gerald Combs <gerald <at> wireshark.org> and contributors.
This is free software; see the source for copying conditions. There is NO
(Continue reading)

bugzilla-daemon | 1 May 17:32 2012

[Bug 7220] Add decoding of ACS to packet-dtn.c

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7220

--- Comment #1 from Jim Wright <james.r.wright <at> colorado.edu> 2012-05-01 08:32:48 PDT ---
Created attachment 8355
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=8355
A packet capture file with a number of ACS bundles

Here is a small capture file with a number of ACS bundles. Note that these
packets are on UDP/4557, and are in response to data generated on UDP/4556.
Because of this, you will have to select a packet, choose "decode as..." and
choose "Bundle".

Alternatively, a command such as this will work:
./tshark -r ~/packet-dtn-ACS.cap -d udp.port==4557,bundle -V

--

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs <at> wireshark.org>
Archives:    http://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-request <at> wireshark.org?subject=unsubscribe

bugzilla-daemon | 1 May 18:19 2012

[Bug 6779] User-Password - PAP decoding passwords longer than 16 bytes

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6779

--- Comment #2 from Chris Maynard <christopher.maynard <at> gtech.com> 2012-05-01 09:19:17 PDT ---
Created attachment 8356
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=8356
A completely untested patch that *might* just work.

The patch compiles but it's completely untested so more than likely there's
something wrong with.  As Jeff mentioned in comment 1, a capture file would
probably help to test it.

Oh well, I'll leave it here in case you want to try to apply it and test it
yourself.  Who knows, it *might* work, but given that it's totally untested,
don't expect too much.

--

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs <at> wireshark.org>
Archives:    http://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-request <at> wireshark.org?subject=unsubscribe

bugzilla-daemon | 1 May 18:58 2012

[Bug 6779] User-Password - PAP decoding passwords longer than 16 bytes

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6779

Chris Maynard <christopher.maynard <at> gtech.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #8356|0                           |1
        is obsolete|                            |

--- Comment #3 from Chris Maynard <christopher.maynard <at> gtech.com> 2012-05-01 09:58:45 PDT ---
Created attachment 8357
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=8357
An updated (but still untested) patch.

This patch fixes a bug with the first one, but it is still untested.

--

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs <at> wireshark.org>
Archives:    http://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-request <at> wireshark.org?subject=unsubscribe

bugzilla-daemon | 1 May 19:56 2012

[Bug 6779] User-Password - PAP decoding passwords longer than 16 bytes

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6779

--- Comment #4 from Chris Maynard <christopher.maynard <at> gtech.com> 2012-05-01 10:56:44 PDT ---
Created attachment 8358
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=8358
Another update.

I was able to do some testing using radclient, and found another bug, which is
now fixed.  At least with radclient, I still can't get the password to fully
decrypt though.  I'll post my test capture in case someone else wants to have a
look.  It's possible that radclient has a bug (probably not).

--

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs <at> wireshark.org>
Archives:    http://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-request <at> wireshark.org?subject=unsubscribe

bugzilla-daemon | 1 May 19:58 2012

[Bug 6779] User-Password - PAP decoding passwords longer than 16 bytes

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6779

Chris Maynard <christopher.maynard <at> gtech.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #8357|0                           |1
        is obsolete|                            |

--

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs <at> wireshark.org>
Archives:    http://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-request <at> wireshark.org?subject=unsubscribe

bugzilla-daemon | 1 May 20:01 2012

[Bug 6779] User-Password - PAP decoding passwords longer than 16 bytes

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6779

--- Comment #5 from Chris Maynard <christopher.maynard <at> gtech.com> 2012-05-01 11:01:05 PDT ---
Created attachment 8359
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=8359
Sample capture file w/3 access-request packets, generated using radclient.

Username: Wireshark
Password: TheQuickBrownFoxJumpedOverTheLazyDogs
Shared Secret: foobar

--

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs <at> wireshark.org>
Archives:    http://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-request <at> wireshark.org?subject=unsubscribe

bugzilla-daemon | 2 May 12:49 2012

[Bug 7214] Decoding DOCSIS 3.0 Isolation DATA frames (FC_TYPE=10)

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7214

Anders Broman <anders.broman <at> ericsson.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |FIXED

--- Comment #2 from Anders Broman <anders.broman <at> ericsson.com> 2012-05-02 03:49:32 PDT ---
Committed revision 42382.

--

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs <at> wireshark.org>
Archives:    http://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-request <at> wireshark.org?subject=unsubscribe

bugzilla-daemon | 2 May 12:49 2012

[Bug 7214] Decoding DOCSIS 3.0 Isolation DATA frames (FC_TYPE=10)

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7214

Anders Broman <anders.broman <at> ericsson.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #8344|review_for_checkin?         |review_for_checkin+
              Flags|                            |

--

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs <at> wireshark.org>
Archives:    http://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-request <at> wireshark.org?subject=unsubscribe


Gmane