[prev in list] [next in list] [prev in thread] [next in thread] 

List:       wireshark-bugs
Subject:    [Wireshark-bugs] [Bug 16360] New: TNS "Service Options" flag bits don't match the descriptions
From:       bugzilla-daemon () wireshark ! org
Date:       2020-01-31 23:06:27
Message-ID: bug-16360-15 () https ! bugs ! wireshark ! org/bugzilla/
[Download RAW message or body]

--15805119870.f9fe5f.18096
Date: Fri, 31 Jan 2020 23:06:27 +0000
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.wireshark.org/bugzilla/
Auto-Submitted: auto-generated

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16360

            Bug ID: 16360
           Summary: TNS "Service Options" flag bits don't match the
                    descriptions
           Product: Wireshark
           Version: 3.0.0
          Hardware: x86-64
                OS: Windows 7
            Status: UNCONFIRMED
          Severity: Minor
          Priority: Low
         Component: Dissection engine (libwireshark)
          Assignee: bugzilla-admin@wireshark.org
          Reporter: bugzilla.wireshark@mailstor.net
  Target Milestone: ---

Build Information:
Version 3.0.0 (v3.0.0-0-g937e33de) 

--
It seems byte-order in the code, and on the packet are not compatible/reversed
(the Short = 16 byte value should be read/processed in Big Endian order).

According to my research bit values are as follows:

0x0001 = 1: Don't care: hf_tns_sopt_flag_dc1 (or hf_tns_sopt_flag_dc2??)
0x0002 = 2: Half Duplex: hf_tns_sopt_flag_hd
0x0004 = 4: Full Duplex: hf_tns_sopt_flag_fd
0x0008 = 8: Header Checksum: hf_tns_sopt_flag_hc
0x0010 = 16: Packet Checksum: hf_tns_sopt_flag_pc
0x0020 = 32: Broken Connect Notify: hf_tns_sopt_flag_bconn

0x0200 = 512: Can Send Attention: hf_tns_sopt_flag_sa
0x0400 = 1024: Can Receive Attention: hf_tns_sopt_flag_ra
0x0800 = 2048: [No?] Attention Processing: hf_tns_sopt_flag_ap
0x1000 = 4096: Direct IO to Transport: hf_tns_sopt_flag_dio


0x2000 = 8192: MLTPLX: Multiplex Sessions
0x4000 = 16384: DHANDOFF: Negotiate IPC addr for DH
0x8000 = 32768: NEVER: For NS testing

-- 
You are receiving this mail because:
You are watching all bug changes.
--15805119870.f9fe5f.18096
Date: Fri, 31 Jan 2020 23:06:27 +0000
MIME-Version: 1.0
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.wireshark.org/bugzilla/
Auto-Submitted: auto-generated

<html>
    <head>
      <base href="https://bugs.wireshark.org/bugzilla/" />
      <style>
        body, th, td {
            font-size: 12px;
            font-family: Arial, Helvetica, sans-serif; }
        p, pre { margin-top: 1em; }
        pre {
            font-family: Bitstream Vera Sans Mono, Consolas, Lucida Console, \
monospace;  white-space: pre-wrap;
	}
        table { border: 0; border-spacing: 0; border-collapse: collapse; }
        th, td {
            padding: 0.25em;
            padding-left: 0.5em;
            padding-right: 0.5em;
        }
        th { background: rgb(240, 240, 240); }
        th.th_top { border-bottom: 1px solid rgb(116, 126, 147); }
        th.th_left { border-right: 1px solid rgb(116, 126, 147); }
        td.removed { background-color: #ffcccc; }
        td.added { background-color: #e4ffc7; }
      </style>
    </head>
    <body><table>
        <tr>
          <th class="th_left">Bug ID</th>
          <td><a class="bz_bug_link 
          bz_status_UNCONFIRMED "
   title="UNCONFIRMED - TNS &quot;Service Options&quot; flag bits don't match the \
descriptions"  href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16360">16360</a>
  </td>
        </tr>

        <tr>
          <th class="th_left">Summary</th>
          <td>TNS &quot;Service Options&quot; flag bits don't match the descriptions
          </td>
        </tr>

        <tr>
          <th class="th_left">Product</th>
          <td>Wireshark
          </td>
        </tr>

        <tr>
          <th class="th_left">Version</th>
          <td>3.0.0
          </td>
        </tr>

        <tr>
          <th class="th_left">Hardware</th>
          <td>x86-64
          </td>
        </tr>

        <tr>
          <th class="th_left">OS</th>
          <td>Windows 7
          </td>
        </tr>

        <tr>
          <th class="th_left">Status</th>
          <td>UNCONFIRMED
          </td>
        </tr>

        <tr>
          <th class="th_left">Severity</th>
          <td>Minor
          </td>
        </tr>

        <tr>
          <th class="th_left">Priority</th>
          <td>Low
          </td>
        </tr>

        <tr>
          <th class="th_left">Component</th>
          <td>Dissection engine (libwireshark)
          </td>
        </tr>

        <tr>
          <th class="th_left">Assignee</th>
          <td>bugzilla-admin&#64;wireshark.org
          </td>
        </tr>

        <tr>
          <th class="th_left">Reporter</th>
          <td>bugzilla.wireshark&#64;mailstor.net
          </td>
        </tr>

        <tr>
          <th class="th_left">Target Milestone</th>
          <td>---
          </td>
        </tr></table>
      <p>
        <div>
        <pre>Build Information:
Version 3.0.0 (<a href="https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=937e33de">v3.0.0-0-g937e33de</a>) \


--
It seems byte-order in the code, and on the packet are not compatible/reversed
(the Short = 16 byte value should be read/processed in Big Endian order).

According to my research bit values are as follows:

0x0001 = 1: Don't care: hf_tns_sopt_flag_dc1 (or hf_tns_sopt_flag_dc2??)
0x0002 = 2: Half Duplex: hf_tns_sopt_flag_hd
0x0004 = 4: Full Duplex: hf_tns_sopt_flag_fd
0x0008 = 8: Header Checksum: hf_tns_sopt_flag_hc
0x0010 = 16: Packet Checksum: hf_tns_sopt_flag_pc
0x0020 = 32: Broken Connect Notify: hf_tns_sopt_flag_bconn

0x0200 = 512: Can Send Attention: hf_tns_sopt_flag_sa
0x0400 = 1024: Can Receive Attention: hf_tns_sopt_flag_ra
0x0800 = 2048: [No?] Attention Processing: hf_tns_sopt_flag_ap
0x1000 = 4096: Direct IO to Transport: hf_tns_sopt_flag_dio


0x2000 = 8192: MLTPLX: Multiplex Sessions
0x4000 = 16384: DHANDOFF: Negotiate IPC addr for DH
0x8000 = 32768: NEVER: For NS testing</pre>
        </div>
      </p>


      <hr>
      <span>You are receiving this mail because:</span>

      <ul>
          <li>You are watching all bug changes.</li>
      </ul>
    </body>
</html>
--15805119870.f9fe5f.18096--


[Attachment #3 (text/plain)]

___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-request@wireshark.org?subject=unsubscribe

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic