Wireshark-bugs: [Wireshark-bugs] [Bug 3528] New: When following an HTTP tcp stream decode gzip d
Date: Thu, 11 Jun 2009 07:39:54 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528

           Summary: When following an HTTP tcp stream decode gzip data
                    automatically
           Product: Wireshark
           Version: 1.3.x (Experimental)
          Platform: Other
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: ta.bu.shi.da.yu@xxxxxxxxx


Build Information:
wireshark 1.0.7

Copyright 1998-2009 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GTK+ 2.16.1, with GLib 2.20.1, with libpcap 1.0.0, with libz
1.2.3.3, with POSIX capabilities (Linux), with libpcre 7.8, without SMI, with
ADNS, with Lua 5.1, with GnuTLS 2.4.2, with Gcrypt 1.4.1, with MIT Kerberos,
with PortAudio V19-devel (built Mar  4 2009), without AirPcap.

Running on Linux 2.6.28-11-generic, with libpcap version 1.0.0.

Built using gcc 4.3.3.

--
When following an HTTP tcp stream I've noticed that Wireshark doesn't currently
decode gzip or deflate encoded data automatically.

This would be a very useful feature!

Apologies if this has been asked before, I did a search but I didn't see any
Enhancements logged so I thought I'd log it myself.


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.