forked from wireshark/wireshark
-
Notifications
You must be signed in to change notification settings - Fork 0
/
NEWS
173 lines (123 loc) · 6.6 KB
/
NEWS
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
Wireshark 3.1.1 Release Notes
This is an experimental release intended to test new features for
Wireshark 3.2.
What is Wireshark?
Wireshark is the world’s most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
What’s New
Many improvements have been made. See the “New and Updated Features”
section below for more details.
New and Updated Features
The following features are new (or have been significantly updated)
since version 3.1.0:
• You can once again mark and unmark packets using the middle mouse
button. This feature went missing around 2009 or so.
• The Windows packages are now built using Microsoft Visual Studio
2019.
• IOGraph automatically adds a graph for the selected display
filter if no previous graph exists
• Action buttons for the display filter bar may be aligned left via
the context menu
• Allow extcaps to be loaded from the personal configuration
directory
The following features are new (or have been significantly updated)
since version 3.0.0:
• You can drag and drop a field to a column header to create a
column for that field, or to the display filter input to create a
display filter. If a display filter is applied, the new filter
can be added using the same rules as “Apply Filter”
• You can drag and drop a column entry to the display filter to
create a filter for it.
• You can import profiles from a .zip archive or an existing
directory.
• Dark mode support on macOS and dark theme support on other
platforms has been improved.
• Brotli decompression support in HTTP/HTTP2 (requires the brotli
library).
• The build system now checks for a SpeexDSP system library
installation. The bundled Speex resampler code is still provided
as a fallback.
• WireGuard decryption can now be enabled through keys embedded in
a pcapng in addition to the existing key log preference (Bug
15571[1]).
• A new tap for extracting credentials from the capture file has
been added. It can be accessed through the -z credentials option
in tshark or from the “Tools” menu in Wireshark.
• Editcap can now split files on floating point intervals.
• Windows .msi packages are now signed using SHA-2[2]. .exe
installers are still dual-signed using SHA-1 and SHA-2.
• The “Enabled Protocols” Dialog now only enables, disables and
inverts protocols based on the set filter selection. The protocol
type (standard or heuristic) may also be choosen as a filter
value.
• The “Analyze → Apply as Filter” and “Analyze → Prepare a Filter”
packet list and detail popup menus now show a preview of their
respective filters.
• Protobuf files (*.proto) can now be configured to enable more
precise parsing of serialized Protobuf data (such as gRPC).
• HTTP2 support streaming mode reassembly. To use this feature,
subdissectors can register itself to "streaming_content_type"
dissector table and return pinfo→desegment_len and
pinfo→desegment_offset to tell HTTP2 when to start and how many
additional bytes requires when next called.
• The message of stream gRPC method can now be parsed with
supporting of HTTP2 streaming mode reassembly feature.
New Protocol Support
3GPP BICC MST (BICC-MST), 3GPP log packet (LOG3GPP), 3GPP/GSM Cell
Broadcast Service Protocol (cbsp), Bluetooth Mesh Beacon, Bluetooth
Mesh PB-ADV, Bluetooth Mesh Provisioning PDU, Bluetooth Mesh Proxy,
CableLabs Layer-3 Protocol IEEE EtherType 0xb4e3 (CL3), DCOM
IProvideClassInfo, DCOM ITypeInfo, Diagnostic Log and Trace (DLT),
Distributed Replicated Block Device (DRBD), Dual Channel Wi-Fi
(CL3DCW), EBHSCR Protocol (EBHSCR), EERO Protocol (EERO), evolved
Common Public Radio Interface (eCPRI), File Server Remote VSS
Protocol (FSRVP), FTDI FT USB Bridging Devices (FTDI FT), Graylog
Extended Log Format over UDP (GELF), GSM/3GPP CBSP (Cell Broadcast
Service Protocol), Linux net_dm (network drop monitor) protocol, MIDI
System Exclusive DigiTech (SYSEX DigiTech), Network Controller
Sideband Interface (NCSI), NR Positioning Protocol A (NRPPa) TS
38.455, NVM Express over Fabrics for TCP (nvme-tcp), OsmoTRX Protocol
(GSM Transceiver control and data), and Scalable service-Oriented
MiddlewarE over IP (SOME/IP)
Updated Protocol Support
Too many protocols have been updated to list here.
New and Updated Capture File Support
3gpp phone, Android Logcat Text, Ascend, Candump, Endace ERF,
NetScaler, pcapng, and Savvius *Peek
Getting Wireshark
Wireshark source code and installation packages are available from
https://www.wireshark.org/download.html[3].
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can
be found on the download page[4] on the Wireshark web site.
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
locations vary from platform to platform. You can use About→Folders to
find the default locations on your system.
Getting Help
The User’s Guide, manual pages and various other documentation can be
found at https://www.wireshark.org/docs/[5]
Community support is available on Wireshark’s Q&A site[6] and on the
wireshark-users mailing list. Subscription information and archives
for all of Wireshark’s mailing lists can be found on the web site[7].
Bugs and feature requests can be reported on the bug tracker[8].
Official Wireshark training and certification are available from
Wireshark University[9].
Frequently Asked Questions
A complete FAQ is available on the Wireshark web site[10].
Last updated 2019-11-10 08:08:24 UTC
References
1. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15571
2. https://support.microsoft.com/en-us/help/4472027/2019-sha-2-code-s
igning-support-requirement-for-windows-and-wsus
3. https://www.wireshark.org/download.html
4. https://www.wireshark.org/download.html#thirdparty
5. https://www.wireshark.org/docs/
6. https://ask.wireshark.org/
7. https://www.wireshark.org/lists/
8. https://bugs.wireshark.org/
9. https://www.wiresharktraining.com/
10. https://www.wireshark.org/faq.html