[prev in list] [next in list] [prev in thread] [next in thread] 

List:       wireshark-bugs
Subject:    [Wireshark-bugs] [Bug 15953] New: [Feature Request] Limit to filter on the 'Follow TCP Stream' dialo
From:       bugzilla-daemon () wireshark ! org
Date:       2019-07-29 14:46:43
Message-ID: bug-15953-15 () https ! bugs ! wireshark ! org/bugzilla/
[Download RAW message or body]

--15644116031.f0Ff3A.26235
Date: Mon, 29 Jul 2019 14:46:43 +0000
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.wireshark.org/bugzilla/
Auto-Submitted: auto-generated

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15953

            Bug ID: 15953
           Summary: [Feature Request] Limit to filter on the 'Follow TCP
                    Stream' dialog
           Product: Wireshark
           Version: unspecified
          Hardware: x86
                OS: Windows 10
            Status: UNCONFIRMED
          Severity: Major
          Priority: Low
         Component: GTK+ UI
          Assignee: bugzilla-admin@wireshark.org
          Reporter: benswf@gmail.com
  Target Milestone: ---

Build Information:
Version 3.0.3 (v3.0.3-0-g6130b92b0ec6) 
Copyright 1998-2019 Gerald Combs <gerald@wireshark.org> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software;
see the source for copying conditions. There is NO warranty; not even for
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
Compiled (64-bit) with Qt 5.12.4, with WinPcap SDK (WpdPack) 4.1.2, with GLib
2.52.2, with zlib 1.2.11, with SMI 0.4.8, with c-ares 1.14.0, with Lua 5.2.4,
with GnuTLS 3.6.3 and PKCS #11 support, with Gcrypt 1.8.3, with MIT Kerberos,
with MaxMind DB resolver, with nghttp2 1.14.0, with LZ4, with Snappy, with
libxml2 2.9.9, with QtMultimedia, with AirPcap, with SBC, with SpanDSP, with
bcg729. 
Running on 64-bit Windows 10 (1809), build 17763, with Intel(R) Core(TM)
i7-8650U CPU @ 1.90GHz (with SSE4.2), with 16244 MB of physical memory, with
locale English_Israel.1252, with Npcap version 0.995, based on libpcap version
1.9.1-PRE-GIT, with GnuTLS 3.6.3, with Gcrypt 1.8.3, without AirPcap, binary
plugins supported (14 loaded). Built using Microsoft Visual Studio 2017 (VC++
14.16, build 27030). 
--
Would have been very helpful if we could browse TCP/UDP streams that have
packets that obey a filter.

For instance, if I'm looking at a capture file for a device that utilizes
multiple protocols I'll likely apply a filter for the wanted protocol(/ related
port) as such:
udp.port == 514
Now looking at streams can be meaningful but I only want the streams that obey
this filter. As of now, clicking the arrows to browse streams will also provide
me streams that are unrelated to the filter 'udp.port == 514'. If there was a
filter textbox in the 'Follow (TCP/UDP) Stream' dialog boxes that would allow
me to show only relevant streams that would be awesome.
If a stream has at least one packet that obeys this filter than it should be
included in a "Relevant Streams List".

-- 
You are receiving this mail because:
You are watching all bug changes.
--15644116031.f0Ff3A.26235
Date: Mon, 29 Jul 2019 14:46:43 +0000
MIME-Version: 1.0
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.wireshark.org/bugzilla/
Auto-Submitted: auto-generated

<html>
    <head>
      <base href="https://bugs.wireshark.org/bugzilla/" />
      <style>
        body, th, td {
            font-size: 12px;
            font-family: Arial, Helvetica, sans-serif; }
        p, pre { margin-top: 1em; }
        pre {
            font-family: Bitstream Vera Sans Mono, Consolas, Lucida Console, \
monospace;  white-space: pre-wrap;
	}
        table { border: 0; border-spacing: 0; border-collapse: collapse; }
        th, td {
            padding: 0.25em;
            padding-left: 0.5em;
            padding-right: 0.5em;
        }
        th { background: rgb(240, 240, 240); }
        th.th_top { border-bottom: 1px solid rgb(116, 126, 147); }
        th.th_left { border-right: 1px solid rgb(116, 126, 147); }
        td.removed { background-color: #ffcccc; }
        td.added { background-color: #e4ffc7; }
      </style>
    </head>
    <body><table>
        <tr>
          <th class="th_left">Bug ID</th>
          <td><a class="bz_bug_link 
          bz_status_UNCONFIRMED "
   title="UNCONFIRMED - [Feature Request] Limit to filter on the 'Follow TCP Stream' \
dialog"  href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15953">15953</a>
          </td>
        </tr>

        <tr>
          <th class="th_left">Summary</th>
          <td>[Feature Request] Limit to filter on the 'Follow TCP Stream' dialog
          </td>
        </tr>

        <tr>
          <th class="th_left">Product</th>
          <td>Wireshark
          </td>
        </tr>

        <tr>
          <th class="th_left">Version</th>
          <td>unspecified
          </td>
        </tr>

        <tr>
          <th class="th_left">Hardware</th>
          <td>x86
          </td>
        </tr>

        <tr>
          <th class="th_left">OS</th>
          <td>Windows 10
          </td>
        </tr>

        <tr>
          <th class="th_left">Status</th>
          <td>UNCONFIRMED
          </td>
        </tr>

        <tr>
          <th class="th_left">Severity</th>
          <td>Major
          </td>
        </tr>

        <tr>
          <th class="th_left">Priority</th>
          <td>Low
          </td>
        </tr>

        <tr>
          <th class="th_left">Component</th>
          <td>GTK+ UI
          </td>
        </tr>

        <tr>
          <th class="th_left">Assignee</th>
          <td>bugzilla-admin&#64;wireshark.org
          </td>
        </tr>

        <tr>
          <th class="th_left">Reporter</th>
          <td>benswf&#64;gmail.com
          </td>
        </tr>

        <tr>
          <th class="th_left">Target Milestone</th>
          <td>---
          </td>
        </tr></table>
      <p>
        <div>
        <pre>Build Information:
Version 3.0.3 (<a href="https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=6130b92b0ec6">v3.0.3-0-g6130b92b0ec6</a>) \
 Copyright 1998-2019 Gerald Combs &lt;<a \
href="mailto:gerald&#64;wireshark.org">gerald&#64;wireshark.org</a>&gt; and \
contributors. License GPLv2+: GNU GPL version 2 or later
&lt;<a href="http://www.gnu.org/licenses/old-licenses/gpl-2.0.html">http://www.gnu.org/licenses/old-licenses/gpl-2.0.html</a>&gt; \
This is free software; see the source for copying conditions. There is NO warranty; \
not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
Compiled (64-bit) with Qt 5.12.4, with WinPcap SDK (WpdPack) 4.1.2, with GLib
2.52.2, with zlib 1.2.11, with SMI 0.4.8, with c-ares 1.14.0, with Lua 5.2.4,
with GnuTLS 3.6.3 and PKCS #11 support, with Gcrypt 1.8.3, with MIT Kerberos,
with MaxMind DB resolver, with nghttp2 1.14.0, with LZ4, with Snappy, with
libxml2 2.9.9, with QtMultimedia, with AirPcap, with SBC, with SpanDSP, with
bcg729. 
Running on 64-bit Windows 10 (1809), build 17763, with Intel(R) Core(TM)
i7-8650U CPU &#64; 1.90GHz (with SSE4.2), with 16244 MB of physical memory, with
locale English_Israel.1252, with Npcap version 0.995, based on libpcap version
1.9.1-PRE-GIT, with GnuTLS 3.6.3, with Gcrypt 1.8.3, without AirPcap, binary
plugins supported (14 loaded). Built using Microsoft Visual Studio 2017 (VC++
14.16, build 27030). 
--
Would have been very helpful if we could browse TCP/UDP streams that have
packets that obey a filter.

For instance, if I'm looking at a capture file for a device that utilizes
multiple protocols I'll likely apply a filter for the wanted protocol(/ related
port) as such:
udp.port == 514
Now looking at streams can be meaningful but I only want the streams that obey
this filter. As of now, clicking the arrows to browse streams will also provide
me streams that are unrelated to the filter 'udp.port == 514'. If there was a
filter textbox in the 'Follow (TCP/UDP) Stream' dialog boxes that would allow
me to show only relevant streams that would be awesome.
If a stream has at least one packet that obeys this filter than it should be
included in a &quot;Relevant Streams List&quot;.</pre>
        </div>
      </p>


      <hr>
      <span>You are receiving this mail because:</span>

      <ul>
          <li>You are watching all bug changes.</li>
      </ul>
    </body>
</html>
--15644116031.f0Ff3A.26235--


[Attachment #3 (text/plain)]

___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-request@wireshark.org?subject=unsubscribe

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic