-
Notifications
You must be signed in to change notification settings - Fork 238
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Data corruption due to packets with padding (1.6.1) #261
Comments
That is great! Can you please submit this as a pull request? Even better, do you have a PCAP file that demonstrates this problem? If so, please submit that too, so that we can add a unit test for it. |
Thanks for your quick response! I'm upload archive (~800Mbytes) contain PCAP file, that demonstrates the problem. |
I can make a pull request. Can you make a smaller PCAP file? Ideally 10-100kb? |
Short TCP4 packets with Ethernet padding and no stream data (window manipulation, etc.) may corrupt output files, because of incorrect length using.
Also, tcpflow creates 2-3 unwanted files, contain only two zero bytes.
In my case, I get regular one corrupted byte, every ~350Mbytes.
Attached patch fix both problems.
patch-tcpdemux-cpp.txt
The text was updated successfully, but these errors were encountered: