[IPP] Fwd: [Wireshark-dev] Wireshark 2.4.0 is now available
Kennedy, Smith (Wireless Architect)
smith.kennedy at hp.com
Wed Jul 19 18:44:38 UTC 2017
Greetings,
I wanted to call out this release to the IPP community. This release includes a significant update to the IPP dissector contributed last year by Mike Sweet from Apple . Thanks Mike for your contributions! This should greatly improve the IPP diagnosis experience.
Cheers,
Smith
/**
Smith Kennedy
Wireless Architect - Client Software - IPG-PPS
Standards - IEEE ISTO PWG / Bluetooth SIG / Wi-Fi Alliance / NFC Forum / USB IF
Chair, IEEE ISTO Printer Working Group
HP Inc.
*/
> Begin forwarded message:
>
> From: Gerald Combs <gerald at wireshark.org>
> Subject: [Wireshark-dev] Wireshark 2.4.0 is now available
> Date: July 19, 2017 at 12:26:23 PM MDT
> To: <wireshark-announce at wireshark.org>, Community support list for Wireshark <wireshark-users at wireshark.org>, Developer support list for Wireshark <wireshark-dev at wireshark.org>
> Resent-From: Content-filter at cloude.spamtitan.com <virusalert at spamtitan.com>
> Resent-To: <wireshark-dev at wireshark.org>
> Reply-To: Developer support list for Wireshark <wireshark-dev at wireshark.org>
>
> I'm proud to announce the release of Wireshark 2.4.0.
>
> __________________________________________________________________
>
> What is Wireshark?
>
> Wireshark is the world's most popular network protocol analyzer. It is
> used for troubleshooting, analysis, development and education.
> __________________________________________________________________
>
> What's New
>
> New and Updated Features
>
> The following features are new (or have been significantly updated)
> since version 2.2.0:
> * Experimental 32-bit and 64-bit Windows Installer (.msi) packages
> are available. It is recommended that you use these independently
> of the NSIS (.exe) installers. That is, you should make sure the
> NSIS package is completely uninstalled before installing the
> Windows Installer package and vice-versa.
> * Source packages are now compressed using xz instead of bzip2.
> * The legacy (GTK+) UI is disabled by default in the Windows
> installers.
> * The legacy (GTK+) UI is disabled by default in the development
> environment (Autotools and CMake).
> * SS7 Point Codes can now be resolved into names with a hosts-like
> file.
> * Wireshark can now go fullscreen to have more room for packets.
> * TShark can now export objects like the other GUI interfaces.
> * Support for G.722 and G.726 codecs in the RTP Player (via the
> SpanDSP library).
> * You can now choose the output device when playing RTP streams.
> * Added support for dissectors to include a unit name natively in
> their hf field. A field can now automatically append "seconds" or
> "ms" to its value without additional printf-style APIs.
> * The Default profile can now be reset to default values.
> * You can move back and forth in the selection history in the Qt UI.
> * IEEE 802.15.4 dissector now uses an UAT for decryption keys. The
> original decryption key preference has been obsoleted.
> * Extcap utilities can now provide configuration for a GUI interface
> toolbar to control the extcap utility while capturing.
> * Extcap utilities can now validate the capture filter.
> * Display filter function len() can now be used on all string and
> byte fields.
> * Added an experimental timeline view for 802.11 wireless packet data
> which can be enabled via the "802.11 radio information"
> preferences.
> * Added TLS 1.3 (draft 21) dissection and decryption support ([1]Bug
> 12779).
> * The (D)TLS Application Layer protocol (e.g. HTTP or CoAP) can now
> be changed via the Decode As dialog.
> * The RSA keys dialog for SSL keys has improved feedback for invalid
> settings and no longer requires the IP address, Port or Protocol
> fields to be set in addition to the Key File.
> * TCP Analysis will detect and flag more spurious retransmissions.
>
> New Protocol Support
>
> Bluetooth HCI Vendor Intel, CAN FD, Citrix NetScaler Metric Exchange
> Protocol, Citrix NetScaler RPC Protocol, DirectPlay 8 protocol,
> Ericsson A-bis P-GSL, Ericsson A-bis TFP (Traffic Forwarding Protocol),
> Facebook Zero, Fc00/cjdns Protocol, Generic Netlink (genl), GSM Osmux,
> GSMTAP based logging, Health Level 7 (HL7), High-speed SECS message
> service (HSMS), HomePNA, IndigoCare iCall protocol, IndigoCare Netrix
> protocol, iPerf2, ISO 15765, Linux 802.11 Netlink (nl80211), Local
> Service Discovery (LSD), M2 Application Protocol, Mesh Link
> Establishment (MLE), MUDURL, Netgear Ensemble Protocol, NetScaler HA
> Protocol, NetScaler Metric Exchange Protocol, NetScaler RPC Protocol,
> NM protocol, Nordic BLE Sniffer, NVMe, NVMe Fabrics RDMA, OBD-II PIDs,
> OpenThread simulator, RFTap Protocol, SCTE-35 Digital Program Insertion
> Messages, Snort Post-dissector, Thread CoAP, UDP based FTP w/ multicast
> (UFTP and UFTP4), Unified Diagnostic Services (UDS), vSocket, Windows
> Cluster Management API (clusapi), and X-Rite i1 Display Pro (and
> derivatives) USB protocol
>
> Updated Protocol Support
>
> Too many protocols have been updated to list here.
>
> New and Updated Capture File Support
>
> ERF, IxVeriWave, Libpcap, and Pcap-ng
>
> Major API Changes
>
> IEEE802.11: wlan_mgt display filter element got renamed to wlan.
>
> Libgcrypt is now a required dependency.
> __________________________________________________________________
>
> Getting Wireshark
>
> Wireshark source code and installation packages are available from
> [2]https://www.wireshark.org/download.html.
>
> Vendor-supplied Packages
>
> Most Linux and Unix vendors supply their own Wireshark packages. You
> can usually install or upgrade Wireshark using the package management
> system specific to that platform. A list of third-party packages can be
> found on the [3]download page on the Wireshark web site.
> __________________________________________________________________
>
> File Locations
>
> Wireshark and TShark look in several different locations for preference
> files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
> vary from platform to platform. You can use About->Folders to find the
> default locations on your system.
> __________________________________________________________________
>
> Known Problems
>
> Dumpcap might not quit if Wireshark or TShark crashes. ([4]Bug 1419)
>
> The BER dissector might infinitely loop. ([5]Bug 1516)
>
> Capture filters aren't applied when capturing from named pipes. ([6]Bug
> 1814)
>
> Filtering tshark captures with read filters (-R) no longer works.
> ([7]Bug 2234)
>
> Application crash when changing real-time option. ([8]Bug 4035)
>
> Wireshark and TShark will display incorrect delta times in some cases.
> ([9]Bug 4985)
>
> Wireshark should let you work with multiple capture files. ([10]Bug
> 10488)
> __________________________________________________________________
>
> Getting Help
>
> Community support is available on [11]Wireshark's Q&A site and on the
> wireshark-users mailing list. Subscription information and archives for
> all of Wireshark's mailing lists can be found on [12]the web site.
>
> Official Wireshark training and certification are available from
> [13]Wireshark University.
> __________________________________________________________________
>
> Frequently Asked Questions
>
> A complete FAQ is available on the [14]Wireshark web site.
> __________________________________________________________________
>
> Last updated 2017-07-19 17:49:40 UTC
>
> References
>
> 1. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12779
> 2. https://www.wireshark.org/download.html
> 3. https://www.wireshark.org/download.html#thirdparty
> 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
> 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
> 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
> 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
> 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
> 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
> 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
> 11. https://ask.wireshark.org/
> 12. https://www.wireshark.org/lists/
> 13. http://www.wiresharktraining.com/
> 14. https://www.wireshark.org/faq.html
>
>
> Digests
>
> wireshark-2.4.0.tar.xz: 28755596 bytes
> SHA256(wireshark-2.4.0.tar.xz)=890bb41b826ff04e98fb089446ab37e5871e16205278bfeffc2a7c7364de3b04
> RIPEMD160(wireshark-2.4.0.tar.xz)=277b417c0e52f7e5ad9278c63a7d5ac74e552518
> SHA1(wireshark-2.4.0.tar.xz)=aa8f53300f60956553902ccc755c0dfe86f768fc
> MD5(wireshark-2.4.0.tar.xz)=655106f8cf3bb8f521336d3a8ab5b10b
>
> Wireshark-win64-2.4.0.exe: 59110928 bytes
> SHA256(Wireshark-win64-2.4.0.exe)=341f97b1d8fc25b4e149fb20b718451aa8646856faa0576071037e60ed47f8b0
> RIPEMD160(Wireshark-win64-2.4.0.exe)=57c5eca5d4efcb1c2b8c80cd79e6cb4d505e9c03
> SHA1(Wireshark-win64-2.4.0.exe)=0452d3aa7ad1cc1240c0cdd9457159de244ca8be
> MD5(Wireshark-win64-2.4.0.exe)=f611afe4a6d59f7ad18fd573232e30fe
>
> Wireshark-win32-2.4.0.exe: 53570224 bytes
> SHA256(Wireshark-win32-2.4.0.exe)=971e6021d6ba214aa938ff43436b70525efc8f5286e556066dfa4863603e7c5e
> RIPEMD160(Wireshark-win32-2.4.0.exe)=04cd96b19aff8375fe1217c1829a850d1a3753ca
> SHA1(Wireshark-win32-2.4.0.exe)=6e8351cb2aba06173aabc907922338edbcda63d2
> MD5(Wireshark-win32-2.4.0.exe)=d96a10a99ca06e36528a0e6c662c17e5
>
> Wireshark-win32-2.4.0.msi: 43032576 bytes
> SHA256(Wireshark-win32-2.4.0.msi)=b730430387efab0bc3b01e5f10a2e708672d75157663c251fcb20431d6649a9f
> RIPEMD160(Wireshark-win32-2.4.0.msi)=d726fbb03f9fdf64771620955ec6ae1924b23fbf
> SHA1(Wireshark-win32-2.4.0.msi)=fe3cb12f5efa30e0619e81ba81271b334e4cd053
> MD5(Wireshark-win32-2.4.0.msi)=5cd3e1b7ed315c3f5e928c9c8001dbf9
>
> Wireshark-win64-2.4.0.msi: 48455680 bytes
> SHA256(Wireshark-win64-2.4.0.msi)=609262ab1ecdda6fd3ed3a5ccddfb5b8d939b7a28616c5dacddcb1528c2b02d9
> RIPEMD160(Wireshark-win64-2.4.0.msi)=e74ec7c8892a9413074cb1474d9fa335829c05be
> SHA1(Wireshark-win64-2.4.0.msi)=1f4437025097362c8e76841a7569bb72da6cd036
> MD5(Wireshark-win64-2.4.0.msi)=6fb4c41eb8a5300e0b0200ea7c1d56a4
>
> WiresharkPortable_2.4.0.paf.exe: 46243888 bytes
> SHA256(WiresharkPortable_2.4.0.paf.exe)=76dfafd12ad82a19fffe0d99b48e9ba5dd1b77ce9c566dcf19cdf32fffb40f22
> RIPEMD160(WiresharkPortable_2.4.0.paf.exe)=65cbdfca286976a652a931c8e0c989c4e431efbe
> SHA1(WiresharkPortable_2.4.0.paf.exe)=8c84ecf4455f34f7624ae1056f1af568a02bd2e0
> MD5(WiresharkPortable_2.4.0.paf.exe)=8544747f6a4a89ee88d965953a1ff8b1
>
> Wireshark 2.4.0 Intel 64.dmg: 35144406 bytes
> SHA256(Wireshark 2.4.0 Intel
> 64.dmg)=20c2e5fa8ec302fc47100ad42f8d2020e629a72b75a7343929206d3274bd08b2
> RIPEMD160(Wireshark 2.4.0 Intel
> 64.dmg)=978eab476a2ab3dcae2080902dc3d8f223f21aed
> SHA1(Wireshark 2.4.0 Intel 64.dmg)=5aecbddef5a762a0a4c36c9312b727bf671c0992
> MD5(Wireshark 2.4.0 Intel 64.dmg)=2cf632f801dc810c5f0378fa983fc9e9
>
> ___________________________________________________________________________
> Sent via: Wireshark-dev mailing list <wireshark-dev at wireshark.org>
> Archives: https://www.wireshark.org/lists/wireshark-dev
> Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev
> mailto:wireshark-dev-request at wireshark.org?subject=unsubscribe
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.pwg.org/pipermail/ipp/attachments/20170719/83b65adb/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4241 bytes
Desc: not available
URL: <http://www.pwg.org/pipermail/ipp/attachments/20170719/83b65adb/attachment.p7s>
More information about the ipp
mailing list