Wireshark-users: [Wireshark-users] Wireshark 2.0.0rc3 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 11 Nov 2015 16:04:25 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 2.0.0rc3.


   This is the third release candidate for Wireshark 2.0.
     __________________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer. It is
   used for troubleshooting, analysis, development and education.
     __________________________________________________________________

What's New

   Wireshark 2.0 features a completely new user interface which should
   provide a smoother, faster user experience. The new interface should be
   familiar to current users of Wireshark but provide a faster workflow
   for many tasks.

   The Windows installer provides the option of installing either the new
   interface ("Wirehsark") or the old interface ("Wireshark Legacy"). Both
   are installed by default. Note that the legacy interface will be
   removed in Wireshark 2.2.

   The OS X installer only provides the new interface. If you need the old
   interface you can install it via Homebrew or MacPorts.

   Wireshark's Debian- and RPM-based package definitions provide the new
   interface in the "wireshark-qt" package and the old interface in the
   "wireshark-gtk" package. It is hoped that downstream distributions will
   follow this convention.

  New and Updated Features

   The following features are new (or have been significantly updated)
   since version 2.0.0rc2:
     * "File->Merge" no longer crashes on Windows. Bug [1]Bug 11684.
     * Icons in the main toolbar obey magnification settings on Windows.
       Bug [2]Bug 11675.
     * The Windows installer does a better job of detecting WinPcap. Bug
       [3]Bug 10867.
     * The main window no longer appears off-screen on Windows. Bug [4]Bug
       11568.

   The following features are new (or have been significantly updated)
   since version 2.0.0rc1:
     * For new installations on UN*X, the directory for user preferences
       is $HOME/.config/wireshark rather than $HOME/.wireshark. If that
       directory is absent, preferences will still be found and stored
       under $HOME/.wireshark.
     * Qt port:
          + The SIP Statistics dialog has been added.
          + You can now create filter expressions from the display filter
            toolbar.
          + Bugs in the UAT preferences dialog has been fixed.
     * Several dissector and Qt UI crash bugs have been fixed.
     * Problems with the OS X application bundle have been fixed.

   The following features are new (or have been significantly updated)
   since version 1.99.9:
     * Qt port:
          + The LTE RLC Graph dialog has been added.
          + The LTE MAC Statistics dialog has been added.
          + The LTE RLC Statistics dialog has been added.
          + The IAX2 Analysis dialog has been added.
          + The Conversation Hash Tables dialog has been added.
          + The Dissector Tables dialog has been added.
          + The Supported Protocols dialog has been added.
          + You can now zoom the I/O and TCP Stream graph X and Y axes
            independently.
          + The RTP Player dialog has been added.
          + Several memory leaks have been fixed.

   The following features are new (or have been significantly updated)
   since version 1.99.8:
     * Qt port:
          + The MTP3 statistics and summary dialogs have been added.
          + The WAP-WSP statistics dialog has been added.
          + The UDP multicast statistics dialog has been added.
          + The WLAN statistics dialog has been added.
          + The display filter macros dialog has been added.
          + The capture file properties dialog now includes packet
            comments.
          + Many more statistics dialogs can be opened from the command
            line via -z ....
          + Most dialogs now have a cancellable progress bar.
          + Many packet list and packet detail context menus items have
            been added.
          + Lua plugins can be reloaded from the Analyze menu.
          + Many bug fixes and improvements.

   The following features are new (or have been significantly updated)
   since version 1.99.7:
     * Qt port:
          + The Enabled Protocols dialog has been added.
          + Many statistics dialogs have been added, including Service
            response time, DHCP/BOOTP, and ANSI.
          + The RTP Analysis dialog has been added.
          + Lua dialog support has been added.
          + You can now manually resolve addresses.
          + The Resolved Addresses dialog has been added.
          + The packet list scrollbar now has a minimap.
          + The capture interfaces dialog has been updated.
          + You can now colorize conversations.
          + Welcome screen behavior has been improved.
          + Plugin support has been improved.
          + Many dialogs should now more correctly minimize and maximize.
          + The reload button has been added back to the toolbar.
          + The "Decode As" dialog no longer saves decoding behavior.
          + You can now stop loading large capture files.
          + The Bluetooth HCI Summary has been added.

   The following features are new (or have been significantly updated)
   since version 1.99.6:
     * Qt port:
          + The Bluetooth Devices dialog has been added.
          + The wireless toolbar has been added.
          + Opening files via drag and drop is now supported.
          + The Capture Filter and Display Filter dialogs have been added.
          + The Display Filter Expression dialog has been added.
          + Conversation Filter menu items have been added.
          + You can change protocol preferences by right clicking on the
            packet list and details.

   The following features are new (or have been significantly updated)
   since version 1.99.4 and 1.99.5:
     * Qt port:
          + Capture restarts are now supported.
          + Menu items for plugins are now supported.
          + Extcap interfaces are now supported.
          + The Expert Information dialog has been added.
          + Display and capture filter completion is now supported.
          + Many bugs have been fixed.
          + Translations have been updated.

   The following features are new (or have been significantly updated)
   since version 1.99.3:
     * Qt port:
          + Several interface bugs have been fixed.
          + Translations have been updated.

   The following features are new (or have been significantly updated)
   since version 1.99.2:
     * Qt port:
          + Several bugs have been fixed.
          + You can now open a packet in a new window.
          + The Bluetooth ATT Server Attributes dialog has been added.
          + The Coloring Rules dialog has been added.
          + Many translations have been updated. Chinese, Italian and
            Polish translations are complete.
          + General user interface and usability improvements.
          + Automatic scrolling during capture now works.
          + The related packet indicator has been updated.

   The following features are new (or have been significantly updated)
   since version 1.99.1:
     * Qt port:
          + The welcome screen layout has been updated.
          + The Preferences dialog no longer crashes on Windows.
          + The packet list header menu has been added.
          + Statistics tree plugins are now supported.
          + The window icon is now displayed properly in the Windows
            taskbar.
          + A packet list an byte view selection bug has been fixed
            ([5]Bug 10896)
          + The RTP Streams dialog has been added.
          + The Protocol Hierarchy Statistics dialog has been added.

   The following features are new (or have been significantly updated)
   since version 1.99.0:
     * Qt port:
          + You can now show and hide toolbars and major widgets using the
            View menu.
          + You can now set the time display format and precision.
          + The byte view widget is much faster, particularly when
            selecting large reassembled packets.
          + The byte view is explorable. Hovering over it highlights the
            corresponding field and shows a description in the status bar.
          + An Italian translation has been added.
          + The Summary dialog has been updated and renamed to Capture
            File Properties.
          + The VoIP Calls and SIP Flows dialogs have been added.
          + Support for HiDPI / Retina displays has been improved in the
            official packages.
     * DNS stats: + A new stats tree has been added to the Statistics
       menu. Now it is possible to collect stats such as qtype/qclass
       distribution, number of resource record per response section, and
       stats data (min, max, avg) for values such as query name length or
       DNS payload.
     * HPFEEDS stats: + A new stats tree has been added to the statistics
       menu. Now it is possible to collect stats per channel (messages
       count and payload size), and opcode distribution.
     * HTTP2 stats: + A new stats tree has been added to the statistics
       menu. Now it is possible to collect stats (type distribution).

   The following features are new (or have been significantly updated)
   since version 1.12.0:
     * The I/O Graph in the Gtk+ UI now supports an unlimited number of
       data points (up from 100k).
     * TShark now resets its state when changing files in ring-buffer
       mode.
     * Expert Info severities can now be configured.
     * Wireshark now supports external capture interfaces. External
       capture interfaces can be anything from a tcpdump-over-ssh pipe to
       a program that captures from proprietary or non-standard hardware.
       This functionality is not available in the Qt UI yet.
     * Qt port:
          + The Qt UI is now the default (program name is wireshark).
          + A Polish translation has been added.
          + The Interfaces dialog has been added.
          + The interface list is now updated when interfaces appear or
            disappear.
          + The Conversations and Endpoints dialogs have been added.
          + A Japanese translation has been added.
          + It is now possible to manage remote capture interfaces.
          + Windows: taskbar progress support has been added.
          + Most toolbar actions are in place and work.
          + More command line options are now supported

  New File Format Decoding Support

   Wireshark is able to display the format of some types of files (rather
   than displaying the contents of those files). This is useful when
   you're curious about, or debugging, a file and its format. To open a
   capture file (such as PCAP) in this mode specify "MIME Files Format" as
   the file's format in the Open File dialog.

   New files that Wireshark can open in this mode include:

   BTSNOOP, PCAP, and PCAPNG

  New Protocol Support

   Aeron, AllJoyn Reliable Datagram Protocol, Android Debug Bridge,
   Android Debug Bridge Service, Android Logcat text, Apache Tribes
   Heartbeat, APT-X Codec, B.A.T.M.A.N. GW, B.A.T.M.A.N. Vis, BGP
   Monitoring Prototol (BMP), Bluetooth Broadcom HCI, Bluetooth GATT
   Attributes (many), Bluetooth OBEX Applications (many), BSSAP2, C15 Call
   History Protocol (C15ch) and others, Celerra VNX, Ceph, Chargen,
   Classical IP, Concise Binary Object Representation (CBOR) (RFC 7049),
   Corosync Totem Single Ring Protocol, Corosync Totemnet, Couchbase, CP
   "Cooper" 2179, CSN.1, dCache, DJI UAV Drone Control Protocol, Dynamic
   Source Routing (RFC 4728), Elasticsearch, ETSI Card Application Toolkit
   - Transport Protocol, eXpressive Internet Protocol (XIP), GDB Remote
   Serial Protocol, Generic Network Virtualization Encapsulation (Geneve),
   Geospatial and Imagery Access Service (GIAS), Gias Dissector Using GIOP
   API, GPRS Tunneling Protocol Prim, GVSP GigE Vision (TM) Streaming
   Protocol, H.225 RAS, Harman HiQnet, HCrt, Hotline Command-Response
   Transaction Protocol, IEEE 802.11 radio information, IP Detail Record
   (IPDR), IPMI Trace, iSER, KNXnetIP, Link Aggregation Control Protocol,
   Link Aggregation Marker Protocol, Link Layer Topology Discovery,
   Link-local Multicast Name Resolution, LISP TCP Control Message,
   Locator/ID Separation Protocol (Reliable Transport), MACsec Key
   Agreement - EAPoL-MKA, MCPE (Minecraft Pocket Edition), Message Queuing
   Telemetry Transport For Sensor Networks (MQTT-SN), Minecraft Pocket
   Edition, MQ Telemetry Transport Protocol for Sensor Networks, Multicast
   Domain Name Service (mDNS), Neighborhood Watch Protocol (NWP), Network
   File System over Remote Direct Memory Access (NFSoRDMA), OAMPDU, OCFS2,
   OptoMMP, Organization Specific Slow Protocol (OSSP), Packet Cable
   Lawful Intercept (8 byte CCCID), Packet Cable Lawful Intercept
   (timestamp), Packet Cable Lawful Intercept (timestamp case ID),
   PacketCable MTA FQDN, Performance Co-Pilot Proxy, QNEX6 (QNET), RakNet
   games library, Remote Shared Virtual Disk (RSVD), Riemann, RPC over
   RDMA (RPCoRDMA), S7 Communication, Secure Socket Tunnel Protocol
   (SSTP), Shared Memory Communications - RDMA (SMCR), Stateless Transport
   Tunneling, Sysdig system call events, TCP based Robot Operating System
   protocol (TCPROS), Thrift, Time Division Multiplexing over Packet
   Network (TDMoP), Video Services over IP (VSIP), Windows Search Protocol
   (MS-WSP), XIP Serval, ZigBee ZCL (many), and ZVT Kassenschnittstelle

  Updated Protocol Support

   Too many protocols have been updated to list here.

  New and Updated Capture File Support

   3GPP TS 32.423 Trace, Android Logcat text files, Colasoft Capsa files,
   Netscaler 3.5, and Symbian OS BTSNOOP File Format

   Additionally, Wireshark now supports nanosecond timestamp resolution in
   PCAP-NG files.

  New and Updated Capture Interfaces support

   Androiddump support now provides interfaces to capture (Logcat,
   Bluetooth and WiFi) from connected Android devices.

  Major API Changes

   The libwireshark API has undergone some major changes:
     * The emem framework (including all ep_ and se_ memory allocation
       routines) has been completely removed in favour of wmem which is
       now fully mature.
     * The (long-since-broken) Python bindings support has been removed.
       If you want to write dissectors in something other than C, use Lua.
     * Plugins can now create GUI menu items.
     * Heuristic dissectors can now be globally enabled/disabled so
       heur_dissector_add() has a few more parameters to make that
       possible
     * proto_tree_add_text has been removed.
     * tvb_length() has been removed in favor of tvb_reported_length() and
       tvb_captured_length().
     * The API for ONC RPC-based dissectors has changed significantly: the
       procedure dissectors no longer take an offset, void-argument
       procedures now need to be declared with a function (use
       dissect_rpc_void()), and rpc_init_prog() now handles procedure
       registration too (it takes additional arguments to handle this;
       rpc_init_proc_table() was removed).
     __________________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available from
   [6]https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can be
   found on the [7]download page on the Wireshark web site.
     __________________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for preference
   files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
   vary from platform to platform. You can use About->Folders to find the
   default locations on your system.
     __________________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([8]Bug 1419)

   The BER dissector might infinitely loop. ([9]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([10]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer works.
   ([11]Bug 2234)

   Resolving ([12]Bug 9044) reopens ([13]Bug 3528) so that Wireshark no
   longer automatically decodes gzip data when following a TCP stream.

   Application crash when changing real-time option. ([14]Bug 4035)

   Hex pane display issue after startup. ([15]Bug 4056)

   Packet list rows are oversized. ([16]Bug 4357)

   Wireshark and TShark will display incorrect delta times in some cases.
   ([17]Bug 4985)

   The 64-bit version of Wireshark will leak memory on Windows when the
   display depth is set to 16 bits ([18]Bug 9914)

   Wireshark should let you work with multiple capture files. ([19]Bug
   10488)
     __________________________________________________________________

Getting Help

   Community support is available on [20]Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and archives for
   all of Wireshark's mailing lists can be found on [21]the web site.

   Official Wireshark training and certification are available from
   [22]Wireshark University.
     __________________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [23]Wireshark web site.
     __________________________________________________________________

   Last updated 2015-11-11 21:07:28 UTC

References

   1. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11684
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11675
   3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10867
   4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11568
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10896
   6. https://www.wireshark.org/download.html
   7. https://www.wireshark.org/download.html#thirdparty
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9914
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
  20. https://ask.wireshark.org/
  21. https://www.wireshark.org/lists/
  22. http://www.wiresharktraining.com/
  23. https://www.wireshark.org/faq.html


Digests

wireshark-2.0.0rc3.tar.bz2: 30951707 bytes
SHA256(wireshark-2.0.0rc3.tar.bz2)=11f46b2d202f923c87a0b8e1a07bd9910bbcc5c265c69de3a23dde82e0f647e3
RIPEMD160(wireshark-2.0.0rc3.tar.bz2)=9d775a6b7e80a55a7a9b09383ff84ee6f1004949
SHA1(wireshark-2.0.0rc3.tar.bz2)=efe6834359560b944b673c57912aa13bf0da32eb
MD5(wireshark-2.0.0rc3.tar.bz2)=bfa5cbe73a9fb730c5ca05ca02240621

Wireshark-win32-2.0.0rc3.exe: 37998696 bytes
SHA256(Wireshark-win32-2.0.0rc3.exe)=1dc521bc224a12c591b477bedecada7a4d0188c9f2958ac2c42a8510c48c169c
RIPEMD160(Wireshark-win32-2.0.0rc3.exe)=6651635f430b0fc62896e003174aba744f63ef34
SHA1(Wireshark-win32-2.0.0rc3.exe)=eca5ab31584b8b2fac112a3bd08918129a18933a
MD5(Wireshark-win32-2.0.0rc3.exe)=ab46846d7c74916e2cfff20b34a07aba

Wireshark-win64-2.0.0rc3.exe: 40834208 bytes
SHA256(Wireshark-win64-2.0.0rc3.exe)=7d4e8b1ffba0591a6b24a9872babb29851b8dcf3e642bba348dda4f4ba9b8ac8
RIPEMD160(Wireshark-win64-2.0.0rc3.exe)=e4ef47b48aa62804c07a6f2d5d2dcb4f2f4424ed
SHA1(Wireshark-win64-2.0.0rc3.exe)=4597a40c997649e6d9b37f38f0473917ae764156
MD5(Wireshark-win64-2.0.0rc3.exe)=215e2e4eac3b31788e763762a41fa373

WiresharkPortable_2.0.0rc3.paf.exe: 42696904 bytes
SHA256(WiresharkPortable_2.0.0rc3.paf.exe)=cd448e209a825a01602371e34cf44eba32ca1b38b19c3b2064793c45b1d432ae
RIPEMD160(WiresharkPortable_2.0.0rc3.paf.exe)=803e87002becd98409623915a18c9ea0b482e391
SHA1(WiresharkPortable_2.0.0rc3.paf.exe)=d22b70faa6eca6a5aea00b1ce3986d23d351c7f0
MD5(WiresharkPortable_2.0.0rc3.paf.exe)=edb437e651691e966eb7f2ce9c780f44

Wireshark 2.0.0rc3 Intel 64.dmg: 31385920 bytes
SHA256(Wireshark 2.0.0rc3 Intel
64.dmg)=6608c3829c212572f0995576fefe3f3d75351ddfa85b2cac02ce5dd4963ccc31
RIPEMD160(Wireshark 2.0.0rc3 Intel
64.dmg)=ee18c30dbdcb1b3134dfc8c145c73be03e06e6f3
SHA1(Wireshark 2.0.0rc3 Intel
64.dmg)=218a19364b14b8bc0cb9b26df06b015905e82a88
MD5(Wireshark 2.0.0rc3 Intel 64.dmg)=a34b87735f66837da8ce56b02615a5fe

Wireshark 2.0.0rc3 Intel 32.dmg: 32286072 bytes
SHA256(Wireshark 2.0.0rc3 Intel
32.dmg)=30d803c7a4a3efe0fcf887b13dd2c0450985d8db41fc8c0f5348cdbf853b4bdf
RIPEMD160(Wireshark 2.0.0rc3 Intel
32.dmg)=bf5d104ac82c1b91a8e144ee03d2169d4afd6aa5
SHA1(Wireshark 2.0.0rc3 Intel
32.dmg)=47e70b9cbc41007013eb65c310cdd5432b9cad7f
MD5(Wireshark 2.0.0rc3 Intel 32.dmg)=3faf59d4f0f879adfbabea0bacf8d5d1
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iEYEARECAAYFAlZD14kACgkQpw8IXSHylJpYdQCdF3KapFDsOqYcsc8T67iBjB6g
zTsAnR+eG1UZIwI/gLNQiXILqDd9hL9W
=mEdF
-----END PGP SIGNATURE-----