Wireshark-dev: [Wireshark-dev] Wireshark 1.6.0rc2 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Thu, 02 Jun 2011 16:08:41 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 1.6.0rc2. This is the second release candidate of the upcoming 1.6 (stable) branch. What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. What's New Bug Fixes The following bugs have been fixed: o Wireshark is unresponsive when capturing from named pipes on Windows. (Bug 1759) o Crash when sorting column while capturing. (Bug 4273) o Ring buffers are no longer turned on by default when using multiple capture files. New and Updated Features The following features are new (or have been significantly updated) since version 1.4: o Wireshark is now distributed as an installation package rather than a drag-installer on OS X. The installer adds a startup item that should make it easier to capture packets. o Large file (greater than 2 GB) support has been improved. o Wireshark and TShark can import text dumps, similar to text2pcap. o You can now view Wireshark's dissector tables (for example the TCP port to dissector mappings) from the main window. o Wireshark can export SSL session keys via File→Export→SSL Session Keys... o TShark can show a specific occurrence of a field when using '-T fields'. o Custom columns can show a specific occurrence of a field. o You can hide columns in the packet list. o Wireshark can now export SMB objects. o dftest and randpkt now have manual pages. o TShark can now display iSCSI, ICMP and ICMPv6 service response times. o Dumpcap can now save files with a user-specified group id. o Syntax checking is done for capture filters. o You can display the compiled BPF code for capture filters in the Capture Options dialog. o You can now navigate backwards and forwards through TCP and UDP sessions using Ctrl+, and Ctrl+. . o Packet length is (finally) a default column. o TCP window size is now avaiable both scaled and unscaled. A TCP window scaling graph is available in the GUI. o 802.1q VLAN tags are now shown in the Ethernet II protocol tree instead of a separate tree. o Various dissectors now display some UTF-16 strings as proper Unicode including the DCE/RPC and SMB dissectors. o The RTP player now has an option to show the time of day in the graph in addition to the seconds since beginning of capture. o The RTP player now shows why media interruptions occur. o Graphs now save as PNG images by default. o TShark can read and write host name information from and to pcapng-formatted files. Wireshark can read it. TShark can dump host name information via [-z hosts] . o TShark's -z option now uses the [-z <proto>,srt] syntax instead of [-z <proto>,rtt] for all protocols that support service response time statistics. This matches Wireshark's syntax for this option. o Wireshark and TShark can now read compressed Windows Sniffer files. New Protocol Support ADwin, ADwin-Config, Apache Etch, Aruba PAPI, Babel Routing Protocol, Broadcast/Multicast Control, Constrained Application Protocol (COAP), Digium TDMoE, Erlang Distribution Protocol, Ether-S-I/O, FastCGI, Fibre Channel over InfiniBand (FCoIB), Gopher, Gigamon GMHDR, IDMP, Infiniband Socket Direct Protocol (SDP), JSON, LISP Control, LISP Data, LISP, MikroTik MAC-Telnet, MRP Multiple Mac Registration Protocol (MMRP) Mongo Wire Protocol, MUX27010, Network Monitor 802.11 radio header, OPC UA ExtensionObjects, openSAFETY, PPI-GEOLOCATION-GPS, ReLOAD, ReLOAD Framing, RObust Header Compression (ROHC), RSIP, SAMETIME, SCoP, SGSAP, Tektronix Teklink, USB/AT Commands, uTorrent Transport Protocol, WAI authentication, Wi-Fi P2P (Wi-Fi Direct) Updated Protocol Support New and Updated Capture File Support Apple PacketLogger, Catapult DCT2000, Daintree SNA, Endace ERF, HP OpenVMS TCPTrace, IPFIX (the file format, not the protocol), Lucent/Ascend debug, Microsoft Network Monitor, Network Instruments, TamoSoft CommView Getting Wireshark Wireshark source code and installation packages are available from http://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About→Folders to find the default locations on your system. Known Problems Wireshark might make your system disassociate from a wireless network on OS X 10.4. (Bug 1315) Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419) The BER dissector might infinitely loop. (Bug 1516) Capture filters aren't applied when capturing from named pipes. (Bug 1814) Filtering tshark captures with display filters (-R) no longer works. (Bug 2234) The 64-bit Windows installer does not ship with libsmi. (Win64 development page) Application crash when changing real-time option. (Bug 4035) Hex pane display issue after startup. (Bug 4056) Packet list rows are oversized. (Bug 4357) Summary pane selected frame highlighting not maintained. (Bug 4445) Wireshark and TShark will display incorrect delta times in some cases. (Bug 4985 and bug 5580) Character echo pauses in Capture Filter field in Capture Options. (Bug 5356) Getting Help Community support is available on Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site. Training is available from Wireshark University. Frequently Asked Questions A complete FAQ is available on the Wireshark web site. Digests wireshark-1.6.0rc2.tar.bz2: 21824421 bytes MD5(wireshark-1.6.0rc2.tar.bz2)=2d7feda1298263d661b8f6f661614652 SHA1(wireshark-1.6.0rc2.tar.bz2)=014a87dd8c840612acb0de33a8400586157dbb0f RIPEMD160(wireshark-1.6.0rc2.tar.bz2)=e67dddd9946585e510ea04ccddea74fe0c59d5a8 wireshark-win32-1.6.0rc2.exe: 19461108 bytes MD5(wireshark-win32-1.6.0rc2.exe)=11cb2b9e51f9e16d31bddb89dc25b194 SHA1(wireshark-win32-1.6.0rc2.exe)=f533f2e06daff086334a16a7618774d8bbe62c12 RIPEMD160(wireshark-win32-1.6.0rc2.exe)=07b48578e277f7bac009bb2358d6ac2b68b09f5b wireshark-win64-1.6.0rc2.exe: 22637671 bytes MD5(wireshark-win64-1.6.0rc2.exe)=63c0a2f1ee4512b68125b1ed154f55b3 SHA1(wireshark-win64-1.6.0rc2.exe)=1881fd3dd4728ffd51e66a1cec436f6407c2b84a RIPEMD160(wireshark-win64-1.6.0rc2.exe)=793a3875dec1ea08cd89a1622e92d38611941c1e wireshark-1.6.0rc2.u3p: 25879703 bytes MD5(wireshark-1.6.0rc2.u3p)=c04864c350cf26288440cb00e451dec5 SHA1(wireshark-1.6.0rc2.u3p)=1dbfd97c8914185a7eecbd8fb2bfada4e9effb58 RIPEMD160(wireshark-1.6.0rc2.u3p)=0acb91f23135a62d12ada61c38b9eb68de335e5b WiresharkPortable-1.6.0rc2.paf.exe: 20356891 bytes MD5(WiresharkPortable-1.6.0rc2.paf.exe)=639f3f26c3085567918a4528801998a4 SHA1(WiresharkPortable-1.6.0rc2.paf.exe)=8b51a2fdabe6a4b7312e25ff2c800359f08ffaff RIPEMD160(WiresharkPortable-1.6.0rc2.paf.exe)=d62dc455508f0d383da7aa34da785169ce08c2d6 Wireshark 1.6.0rc2 Intel 32.dmg: 20267333 bytes MD5(Wireshark 1.6.0rc2 Intel 32.dmg)=6182920b7fda0719e87002051e80edd5 SHA1(Wireshark 1.6.0rc2 Intel 32.dmg)=598fbc41fbbd23e77b1866cee7968315c646eee2 RIPEMD160(Wireshark 1.6.0rc2 Intel 32.dmg)=e0adc4c7ec0c165f83f873bf94fb8acf9dcff525 Wireshark 1.6.0rc2 Intel 64.dmg: 19148359 bytes MD5(Wireshark 1.6.0rc2 Intel 64.dmg)=3e62f036d7b3f2d9b23caf842664de49 SHA1(Wireshark 1.6.0rc2 Intel 64.dmg)=95b992e04982b36ac5d3b460179b4b4c25d5c68f RIPEMD160(Wireshark 1.6.0rc2 Intel 64.dmg)=a9a16465d31708ec4aa688b8ca4db26c805cf27d Wireshark 1.6.0rc2 PPC 32.dmg: 20968613 bytes MD5(Wireshark 1.6.0rc2 PPC 32.dmg)=7ec07fe61359b11e495bc079fa10aa47 SHA1(Wireshark 1.6.0rc2 PPC 32.dmg)=a45392d56cb0d401f010ed1ad26734ef7cc5c926 RIPEMD160(Wireshark 1.6.0rc2 PPC 32.dmg)=c7b9fc06abbfa59ab9474d2d337fd49878301f3d -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk3oF/gACgkQpw8IXSHylJpTKQCfSk2YXDRWD6KRDPWvVwoE26yK 5cUAn3yo2ofOq02F88u+D8SCvQwPxhGL =owz2 -----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-dev] buildbot failure in Wireshark (development) on Visual-Studio-Code-Analysis
- Next by Date: [Wireshark-dev] buildbot failure in Wireshark (development) on Windows-7-x64
- Previous by thread: [Wireshark-dev] buildbot failure in Wireshark (development) on Windows-XP-x86
- Next by thread: [Wireshark-dev] buildbot failure in Wireshark (development) on Clang-Code-Analysis
- Index(es):