[prev in list] [next in list] [prev in thread] [next in thread]
List: wireshark-bugs
Subject: [Wireshark-bugs] [Bug 16360] New: TNS "Service Options" flag bits don't match the descriptions
From: bugzilla-daemon () wireshark ! org
Date: 2020-01-31 23:06:27
Message-ID: bug-16360-15 () https ! bugs ! wireshark ! org/bugzilla/
[Download RAW message or body]
--15805119870.f9fe5f.18096
Date: Fri, 31 Jan 2020 23:06:27 +0000
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.wireshark.org/bugzilla/
Auto-Submitted: auto-generated
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16360
Bug ID: 16360
Summary: TNS "Service Options" flag bits don't match the
descriptions
Product: Wireshark
Version: 3.0.0
Hardware: x86-64
OS: Windows 7
Status: UNCONFIRMED
Severity: Minor
Priority: Low
Component: Dissection engine (libwireshark)
Assignee: bugzilla-admin@wireshark.org
Reporter: bugzilla.wireshark@mailstor.net
Target Milestone: ---
Build Information:
Version 3.0.0 (v3.0.0-0-g937e33de)
--
It seems byte-order in the code, and on the packet are not compatible/reversed
(the Short = 16 byte value should be read/processed in Big Endian order).
According to my research bit values are as follows:
0x0001 = 1: Don't care: hf_tns_sopt_flag_dc1 (or hf_tns_sopt_flag_dc2??)
0x0002 = 2: Half Duplex: hf_tns_sopt_flag_hd
0x0004 = 4: Full Duplex: hf_tns_sopt_flag_fd
0x0008 = 8: Header Checksum: hf_tns_sopt_flag_hc
0x0010 = 16: Packet Checksum: hf_tns_sopt_flag_pc
0x0020 = 32: Broken Connect Notify: hf_tns_sopt_flag_bconn
0x0200 = 512: Can Send Attention: hf_tns_sopt_flag_sa
0x0400 = 1024: Can Receive Attention: hf_tns_sopt_flag_ra
0x0800 = 2048: [No?] Attention Processing: hf_tns_sopt_flag_ap
0x1000 = 4096: Direct IO to Transport: hf_tns_sopt_flag_dio
0x2000 = 8192: MLTPLX: Multiplex Sessions
0x4000 = 16384: DHANDOFF: Negotiate IPC addr for DH
0x8000 = 32768: NEVER: For NS testing
--
You are receiving this mail because:
You are watching all bug changes.
--15805119870.f9fe5f.18096
Date: Fri, 31 Jan 2020 23:06:27 +0000
MIME-Version: 1.0
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.wireshark.org/bugzilla/
Auto-Submitted: auto-generated
<html>
<head>
<base href="https://bugs.wireshark.org/bugzilla/" />
<style>
body, th, td {
font-size: 12px;
font-family: Arial, Helvetica, sans-serif; }
p, pre { margin-top: 1em; }
pre {
font-family: Bitstream Vera Sans Mono, Consolas, Lucida Console, \
monospace; white-space: pre-wrap;
}
table { border: 0; border-spacing: 0; border-collapse: collapse; }
th, td {
padding: 0.25em;
padding-left: 0.5em;
padding-right: 0.5em;
}
th { background: rgb(240, 240, 240); }
th.th_top { border-bottom: 1px solid rgb(116, 126, 147); }
th.th_left { border-right: 1px solid rgb(116, 126, 147); }
td.removed { background-color: #ffcccc; }
td.added { background-color: #e4ffc7; }
</style>
</head>
<body><table>
<tr>
<th class="th_left">Bug ID</th>
<td><a class="bz_bug_link
bz_status_UNCONFIRMED "
title="UNCONFIRMED - TNS "Service Options" flag bits don't match the \
descriptions" href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16360">16360</a>
</td>
</tr>
<tr>
<th class="th_left">Summary</th>
<td>TNS "Service Options" flag bits don't match the descriptions
</td>
</tr>
<tr>
<th class="th_left">Product</th>
<td>Wireshark
</td>
</tr>
<tr>
<th class="th_left">Version</th>
<td>3.0.0
</td>
</tr>
<tr>
<th class="th_left">Hardware</th>
<td>x86-64
</td>
</tr>
<tr>
<th class="th_left">OS</th>
<td>Windows 7
</td>
</tr>
<tr>
<th class="th_left">Status</th>
<td>UNCONFIRMED
</td>
</tr>
<tr>
<th class="th_left">Severity</th>
<td>Minor
</td>
</tr>
<tr>
<th class="th_left">Priority</th>
<td>Low
</td>
</tr>
<tr>
<th class="th_left">Component</th>
<td>Dissection engine (libwireshark)
</td>
</tr>
<tr>
<th class="th_left">Assignee</th>
<td>bugzilla-admin@wireshark.org
</td>
</tr>
<tr>
<th class="th_left">Reporter</th>
<td>bugzilla.wireshark@mailstor.net
</td>
</tr>
<tr>
<th class="th_left">Target Milestone</th>
<td>---
</td>
</tr></table>
<p>
<div>
<pre>Build Information:
Version 3.0.0 (<a href="https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=937e33de">v3.0.0-0-g937e33de</a>) \
--
It seems byte-order in the code, and on the packet are not compatible/reversed
(the Short = 16 byte value should be read/processed in Big Endian order).
According to my research bit values are as follows:
0x0001 = 1: Don't care: hf_tns_sopt_flag_dc1 (or hf_tns_sopt_flag_dc2??)
0x0002 = 2: Half Duplex: hf_tns_sopt_flag_hd
0x0004 = 4: Full Duplex: hf_tns_sopt_flag_fd
0x0008 = 8: Header Checksum: hf_tns_sopt_flag_hc
0x0010 = 16: Packet Checksum: hf_tns_sopt_flag_pc
0x0020 = 32: Broken Connect Notify: hf_tns_sopt_flag_bconn
0x0200 = 512: Can Send Attention: hf_tns_sopt_flag_sa
0x0400 = 1024: Can Receive Attention: hf_tns_sopt_flag_ra
0x0800 = 2048: [No?] Attention Processing: hf_tns_sopt_flag_ap
0x1000 = 4096: Direct IO to Transport: hf_tns_sopt_flag_dio
0x2000 = 8192: MLTPLX: Multiplex Sessions
0x4000 = 16384: DHANDOFF: Negotiate IPC addr for DH
0x8000 = 32768: NEVER: For NS testing</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>
--15805119870.f9fe5f.18096--
[Attachment #3 (text/plain)]
___________________________________________________________________________
Sent via: Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives: https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
mailto:wireshark-bugs-request@wireshark.org?subject=unsubscribe
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic