[prev in list] [next in list] [prev in thread] [next in thread]
List: wireshark-bugs
Subject: [Wireshark-bugs] [Bug 3799] display filter "tcp.flags.reset" not
From: bugzilla-daemon () wireshark ! org
Date: 2009-07-31 14:46:39
Message-ID: 20090731144639.0F1BD17638 () mail ! wireshark ! org
[Download RAW message or body]
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3799
--- Comment #3 from Jim Young <jyoung@gsu.edu> 2009-07-31 07:46:38 PDT ---
This is not a bug.
The filter "tcp.flags.reset" can be thought of as a presence filter:
"Does the packet have a tcp.flags.reset field?"
The tcp.flags.reset bit, whether it is set or not, is present in the TCP
header.
A presence filter doesn't care what the actual value that field contains, just
that it has one.
In comment #2 you used probably the most direct way to find a TCP packet with
the RST bit set. There are other ways as well (like the filter you used in
comment #1).
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
___________________________________________________________________________
Sent via: Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives: http://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://wireshark.org/mailman/options/wireshark-bugs
mailto:wireshark-bugs-request@wireshark.org?subject=unsubscribe
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic