Wireshark-bugs: [Wireshark-bugs] [Bug 12012] New: Bogus IPv4 version
Date: Fri, 15 Jan 2016 04:02:45 +0000
Bug ID 12012
Summary Bogus IPv4 version
Product Wireshark
Version 2.0.1
Hardware x86-64
OS Windows 10
Status CONFIRMED
Severity Major
Priority Low
Component Dissection engine (libwireshark)
Assignee bugzilla-admin@wireshark.org
Reporter hquest@gmail.com

Build Information:
Version 2.0.1 (v2.0.1-0-g59ea380 from master-2.0)

Copyright 1998-2015 Gerald Combs <gerald@wireshark.org> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with Qt 5.3.2, with WinPcap (4_1_3), with libz 1.2.8, with
GLib 2.42.0, with SMI 0.4.8, with c-ares 1.9.1, with Lua 5.2, with GnuTLS
3.2.15, with Gcrypt 1.6.2, with MIT Kerberos, with GeoIP, with QtMultimedia,
with AirPcap.

Running on 64-bit Windows 10, build 10586, with locale C, with WinPcap version
4.1.3 (packet.dll version 4.1.0.2980), based on libpcap version 1.0 branch
1_0_rel0b (20091008), with GnuTLS 3.2.15, with Gcrypt 1.6.2, without AirPcap.
        Intel(R) Core(TM) i5-3570 CPU @ 3.40GHz (with SSE4.2), with 32636MB of
physical memory.


Built using Microsoft Visual C++ 12.0 build 31101

Wireshark is Open Source Software released under the GNU General Public
License.

Check the man page and http://www.wireshark.org for more information.
--
https://ask.wireshark.org/questions/49231/bogus-ipv4-version

 I am trying to export traffic from a Cisco router and interestingly, while
packets going out the router interface are correctly interpreted by Wireshark,
all incoming packets fail as bogus ipv4 version.

>From what I found, the "Support packet capture from TSO-enabled hardware"
should have been fixing this years ago, however it is not doing me any good.

Now, if I capture the traffic on the router, and export the capture file to be
open by Wireshark, it decodes on both directions - exactly as it should.

The details, if they do any good: The router interface I'm trying to capture is
a Dialer interface, receiving PPPoE data. The just updated Wireshark 2.0.1 (and
previous v2.0.0) x64 runs on a Windows 10 x64. NIC is a Qualcomm Atheros
AR-8161 (not a KillerNIC).


You are receiving this mail because:
  • You are watching all bug changes.