Wireshark-bugs: [Wireshark-bugs] [Bug 3528] New: When following an HTTP tcp stream decode gzip d
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
Summary: When following an HTTP tcp stream decode gzip data
automatically
Product: Wireshark
Version: 1.3.x (Experimental)
Platform: Other
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: ta.bu.shi.da.yu@xxxxxxxxx
Build Information:
wireshark 1.0.7
Copyright 1998-2009 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GTK+ 2.16.1, with GLib 2.20.1, with libpcap 1.0.0, with libz
1.2.3.3, with POSIX capabilities (Linux), with libpcre 7.8, without SMI, with
ADNS, with Lua 5.1, with GnuTLS 2.4.2, with Gcrypt 1.4.1, with MIT Kerberos,
with PortAudio V19-devel (built Mar 4 2009), without AirPcap.
Running on Linux 2.6.28-11-generic, with libpcap version 1.0.0.
Built using gcc 4.3.3.
--
When following an HTTP tcp stream I've noticed that Wireshark doesn't currently
decode gzip or deflate encoded data automatically.
This would be a very useful feature!
Apologies if this has been asked before, I did a search but I didn't see any
Enhancements logged so I thought I'd log it myself.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.