Wireshark-bugs: [Wireshark-bugs] [Bug 11965] ICMP error messages wrongly filtered on IP source a
Date: Wed, 06 Jan 2016 13:30:41 +0000

changed bug 11965


What Removed Added
CC   jyoung@gsu.edu

Comment # 1 on bug 11965 from
The ICMP packet in question sent by 91.238.156.142 was elicited because of a
packet sent by 10.16.10.176.   This type of ICMP packet carries as its payload
a section of the original packet that triggered the response.  In this case the
ICMP payload includes the IP header, UDP header and the first 44 bytes of the
UDP payload of the original packet sent by 10.16.10.176.

The ICMP packet in fact contains two different IP headers.  This packet is
displayed because the display filter "ip.src="" is matching the 2nd
level IP header contained within the ICMP payload.


You are receiving this mail because:
  • You are watching all bug changes.