This is our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

I'm doing a capture using the NORM protocol dissector and CMD CC packets don't look right. I'm expecting a packet size around 78 bytes and instead I'm getting a packet size of 2074 bytes. 2004 of those bytes are labeled Payload and they are all zeros. Is there any way to fix the way that Wireshark is padding these packets?

I am using the packet-rmt-norm.c code off of Wireshark-1.8.6

Unfortunately due to the network I'm using I cannot post a sample capture

Thank you in advance for your help!

asked 20 Sep '13, 05:55

Torbett's gravatar image

Torbett
11334
accept rate: 0%

closed 20 Sep '13, 06:48

Kurt%20Knochner's gravatar image

Kurt Knochner ♦
24.8k1039237

The question has been closed for the following reason "Duplicate Question: http://ask.wireshark.org/questions/24577/malformed-norm-packets" by Kurt Knochner 20 Sep '13, 06:48

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here

By RSS:

Answers

Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:

×58
×16
×15
×5
×3

question asked: 20 Sep '13, 05:55

question was seen: 1,198 times

last updated: 20 Sep '13, 06:48

p​o​w​e​r​e​d by O​S​Q​A