THIS IS A TEST INSTANCE. Feel free to ask and answer questions, but take care to avoid triggering too many notifications.

Revision history  [back]

Force dissection with "Analyze TCP sequence numbers" enabled

I developed a dissector for a custom protocol and it works pretty well.

When used with a TCP stream, it doesn't seem to dissect any packet that isn't valid in the stream.

  • Continuation to #XXX
  • TCP Spurious Retransmission
  • TCP Retransmission

I can see the length and the payload are correct and for debugging, I'd like to also dissect all these packets individually as if they don't need to be reassembled to be parsed.

How can I do that?

I already disabled allow dissector to reassemble and reassemble out-of-order segments.

It seems to do it when I disable Analyze TCP sequence numbers but I loose the information of the retransmissions.

Thank you!