Wireshark-bugs: [Wireshark-bugs] [Bug 1463] New: Ability to dissect and decode encapsulated traf
Date: Fri, 23 Mar 2007 18:22:42 +0000 (GMT)
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1463

           Summary: Ability to dissect and decode encapsulated traffic in
                    OpenVPN
           Product: Wireshark
           Version: 0.99.5
          Platform: PC
        OS/Version: Windows XP
            Status: NEW
          Severity: Enhancement
          Priority: Medium
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: bill.fassler@xxxxxxxxx


Build Information:
Version 0.99.5 (SVN Rev 20677)

Copyright 1998-2007 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GTK+ 2.10.7, with GLib 2.12.7, with WinPcap (version unknown),
with libz 1.2.3, with libpcre 6.4, with Net-SNMP 5.4, with ADNS, with Lua 5.1,
with GnuTLS 1.6.1, with Gcrypt 1.2.3, with MIT Kerberos, with PortAudio
PortAudio V19-devel, with AirPcap.

Running on Windows XP Service Pack 2, build 2600, with WinPcap version 4.0
(packet.dll version 4.0.0.755), based on libpcap version 0.9.5, without
AirPcap.

Built using Microsoft Visual C++ 6.0 build 8804
--
The ability to capture, dissect and decode encapsulated traffic through a VPN
tunnel would be a great enhancement to any packet sniffer.  This would
facilitate legitimate software development debugging when the VPN cypher key is
set to NULL and the packet traffic hence unencrypted. Starting with OpenVPN is
logical not only because I am using it and can provide input, but also because
it is an open source product.


-- 
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.