mirror of
https://github.com/zeek/zeek.git
synced 2025-10-09 18:18:19 +00:00
![]() Teredo bubble packets (IPv6 w/ No Next Header and zero Payload Length) with data extending past the inner IPv6 header (the outer IPv4 header's Total Length and UDP header's Length indicate this) now only raises a "Teredo_payload_len_mismatch" weird instead of causing a ProtocolViolation(). This also fixes a crash in NetSessions::ParseIPPacket() that occurred when the packet length didn't match the payload length field. |
||
---|---|---|
.. | ||
4in4.pcap | ||
4in6.pcap | ||
6in4.pcap | ||
6in6-tunnel-change.pcap | ||
6in6.pcap | ||
6in6in6.pcap | ||
ayiya3.trace | ||
false-teredo.pcap | ||
ping6-in-ipv4.pcap | ||
socks.pcap | ||
Teredo.pcap | ||
teredo_bubble_with_payload.pcap |