[prev in list] [next in list] [prev in thread] [next in thread] 

List:       wireshark-bugs
Subject:    [Wireshark-bugs] [Bug 3799] display filter "tcp.flags.reset" not
From:       bugzilla-daemon () wireshark ! org
Date:       2009-07-31 14:46:39
Message-ID: 20090731144639.0F1BD17638 () mail ! wireshark ! org
[Download RAW message or body]

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3799





--- Comment #3 from Jim Young <jyoung@gsu.edu>  2009-07-31 07:46:38 PDT ---
This is not a bug.

The filter "tcp.flags.reset" can be thought of as a presence filter: 
   "Does the packet have a tcp.flags.reset field?"  

The tcp.flags.reset bit, whether it is set or not, is present in the TCP
header.  

A presence filter doesn't care what the actual value that field contains, just
that it has one.

In comment #2 you used probably the most direct way to find a TCP packet with
the RST bit set.  There are other ways as well (like the filter you used in
comment #1).


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    http://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-request@wireshark.org?subject=unsubscribe
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic