Wireshark-bugs: [Wireshark-bugs] [Bug 3528] When following an HTTP tcp stream decode gzip data a
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
Jon Kaczynski <jmkacz@xxxxxxxxx> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jmkacz@xxxxxxxxx
--- Comment #1 from Jon Kaczynski <jmkacz@xxxxxxxxx> 2009-08-05 07:29:25 PDT ---
wireshark 1.0.7
Copyright 1998-2009 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GTK+ 2.16.1, with GLib 2.20.1, with libpcap 1.0.0, with libz
1.2.3.3, with POSIX capabilities (Linux), with libpcre 7.8, without SMI, with
ADNS, with Lua 5.1, with GnuTLS 2.4.2, with Gcrypt 1.4.1, with MIT Kerberos,
with PortAudio V19-devel (built Mar 4 2009), without AirPcap.
Running on Linux 2.6.28-13-generic, with libpcap version 1.0.0.
Built using gcc 4.3.3.
--
This issue has been around for a while. My "work around" is to user "Follow TCP
Stream", save the output, delete everything besides the gzip'ed test, and run
it through gunzip.
It would be incredibly useful to just have the data automatically decompressed
in the "Follow TCP Stream" view.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.