- Wireshark 1.99.1 Release Notes
+ Wireshark 2.1.1 Release Notes
- This is an experimental release intended to test new features for
- Wireshark 2.0.
+ This is a semi-experimental release intended to test new features for
+ Wireshark 2.2.
__________________________________________________________________
What is Wireshark?
New and Updated Features
The following features are new (or have been significantly updated)
- since version 1.99.0:
- * Qt port:
- + You can now show and hide toolbars and major widgets using the
- View menu.
- + You can now set the time display format and precision.
- + The byte view widget is much faster, particularly when
- selecting large reassembled packets.
- + The byte view is explorable. Hovering over it highlights the
- corresponding field and shows a description in the status bar.
- + An Italian translation has been added.
- + The Summary dialog has been updated and renamed to Capture
- File Properties.
- + The VoIP Calls and SIP Flows dialogs have been added.
+ since version 2.1.0:
+ * Added -d option for Decode As support in Wireshark (mimics TShark
+ functionality)
+ * The Qt UI, GTK+ UI, and TShark can now export packets as JSON.
+ TShark can additionally export packets as Elasticsearch-compatible
+ JSON.
+ * The Qt UI now supports the -j, -J, and -l flags. The -m flag is now
+ deprecated.
+ * The Conversations and Endpoints dialogs are more responsive when
+ viewing large numbers of items.
+ * The RTP player now allows up to 30 minutes of silence frames.
+ * Packet bytes can now be displayed as EBCDIC.
+ * The Qt UI loads captures faster on Windows.
The following features are new (or have been significantly updated)
- since version 1.12.0:
- * The I/O Graph in the Gtk+ UI now supports an unlimited number of
- data points (up from 100k).
- * TShark now resets its state when changing files in ring-buffer
- mode.
- * Expert Info severities can now be configured.
- * Wireshark now supports external capture interfaces. External
- capture interfaces can be anything from a tcpdump-over-ssh pipe to
- a program that captures from proprietary or non-standard hardware.
- This functionality is not available in the Qt UI yet.
- * Qt port:
- + The Qt UI is now the default (program name is wireshark).
- + A Polish translation has been added.
- + The Interfaces dialog has been added.
- + The interface list is now updated when interfaces appear or
- disappear.
- + The Conversations and Endpoints dialogs have been added.
- + A Japanese translation has been added.
- + It is now possible to manage remote capture interfaces.
- + Windows: taskbar progress support has been added.
- + Most toolbar actions are in place and work.
- + More command line options are now supported
+ since version 2.0.0:
+ * The intelligent scroll bar now sits to the left of a normal scroll
+ bar and provides a clickable map of nearby packets.
+ * You can now switch between between Capture and File Format
+ dissection of the current capture file via the View menu in the Qt
+ GUI.
+ * You can now show selected packet bytes as ASCII, HTML, Image, ISO
+ 8859-1, Raw, UTF-8, a C array, or YAML.
+ * You can now use regular expressions in Find Packet and in the
+ advanced preferences.
+ * Name resolution for packet capture now supports asynchronous DNS
+ lookups only. Therefore the "concurrent DNS resolution" preference
+ has been deprecated and is a no-op. To enable DNS name resolution
+ some build dependencies must be present (currently c-ares). If that
+ is not the case DNS name resolution will be disabled (but other
+ name resolution mechanisms, such as host files, are still
+ available).
+ * The byte under the mouse in the Packet Bytes pane is now
+ highlighted.
+ * TShark supports exporting PDUs via the -U flag.
+ * The Windows and OS X installers now come with the "sshdump" and
+ "ciscodump" extcap interfaces.
+ * Most dialogs in the Qt UI now save their size and positions.
+ * The Follow Stream dialog now supports UTF-16.
+ * The Firewall ACL Rules dialog has returned.
+ * The Flow (Sequence) Analysis dialog has been improved.
+ * We no longer provide packages for 32-bit versions of OS X.
+ * The Bluetooth Device details dialog has been added.
+
+ New File Format Decoding Support
+
+ Wireshark is able to display the format of some types of files (rather
+ than displaying the contents of those files). This is useful when
+ you're curious about, or debugging, a file and its format. To open a
+ capture file (such as PCAP) in this mode specify "MIME Files Format" as
+ the file's format in the Open File dialog.
+
+ New files that Wireshark can open in this mode include:
New Protocol Support
- (LISP) TCP Control Message, AllJoyn Reliable Datagram Protocol, Android
- ADB, Android Logcat text, ceph, corosync/totemnet, corosync/totemsrp,
- Couchbase, CP "Cooper" 2179, Dynamic Source Routing (RFC 4728),
- Elasticsearch, Generic Network Virtualization Encapsulation (Geneve),
- GVSP, HiQnet, IPMI Trace, iSER, KNXnetIP, MCPE (Minecraft Pocket
- Edition), OptoMMP, RakNet games library, Riemann, S7 Communication,
- Shared Memory Communications - RDMA, and Stateless Transport Tunneling
+ Apache Cassandra - CQL version 3.0, Bachmann bluecom Protocol,
+ Bluetooth Pseudoheader for BR/EDR, CISCO ERSPAN3 Marker, Edge Control
+ Protocol (ECP), Ericsson IPOS Kernel Packet Header Dissector Added
+ (IPOS), Extensible Control & Management Protocol (eCMP), FLEXRAY
+ Protocol dissector added (automotive bus), IEEE 802.1BR E-Tag, ISO
+ 8583-1, ISO14443, ITU-T G.7041/Y.1303 Generic Framing Procedure (GFP),
+ LAT protocol (DECNET), Metamako trailers, Network-Based IP Flow
+ Mobility (NBIFOM), Nokia Intelligent Service Interface (ISI), Open
+ Mobile Alliance Lightweight Machine to Machine TLV payload Added (LwM2M
+ TLV), Real Time Location System (RTLS), RTI TCP Transport Layer
+ (RTITCP), STANAG 5602 SIMPLE, USB3 Vision Protocol (USB machine vision
+ cameras), USBIP Protocol, UserLog Protocol, and Zigbee Protocol
+ Clusters Dissectors Added (Closures Lighting General Measurement &
+ Sensing HVAC Security & Safety)
Updated Protocol Support
- Too many protocols have been updated to list here.
+ Bluetooth OBEX dissector (btobex) was renamed to Obex Dissector (obex),
+ allow to DecodeAs it over USB, TCP and UDP.
+
+ A preference was added to TCP dissector for handling IPFIX process
+ information. It has been disabled by default.
New and Updated Capture File Support
- Android Logcat text files, Colasoft Capsa files, and Wireshark now
- supports nanosecond timestamp resolution in PCAP-NG files.
+ and Micropross mplog
+
+ New and Updated Capture Interfaces support
+
+ Non-empty section placeholder.
Major API Changes
The libwireshark API has undergone some major changes:
- * Many of the ep_ and se_ memory allocation routines have been
- removed.
- * The (long-since-broken) Python bindings support has been removed.
- If you want to write dissectors in something other than C, use Lua.
+ * The address macros (e.g., SET_ADDRESS) have been removed. Use the
+ (lower case) functions of the same names instead.
+ * "old style" dissector functions (that don't return number of bytes
+ used) have been replaced in name with the "new style" dissector
+ functions.
+ * tvb_get_string and tvb_get_stringz have been replaced with
+ tvb_get_string_enc and tvb_get_stringz_enc respectively.
__________________________________________________________________
Getting Wireshark
Filtering tshark captures with read filters (-R) no longer works.
([6]Bug 2234)
- The 64-bit Windows installer does not support Kerberos decryption.
- ([7]Win64 development page)
-
- Resolving ([8]Bug 9044) reopens ([9]Bug 3528) so that Wireshark no
- longer automatically decodes gzip data when following a TCP stream.
+ Application crash when changing real-time option. ([7]Bug 4035)
- Application crash when changing real-time option. ([10]Bug 4035)
-
- Hex pane display issue after startup. ([11]Bug 4056)
-
- Packet list rows are oversized. ([12]Bug 4357)
+ Packet list rows are oversized. ([8]Bug 4357)
Wireshark and TShark will display incorrect delta times in some cases.
- ([13]Bug 4985)
+ ([9]Bug 4985)
+
+ Wireshark should let you work with multiple capture files. ([10]Bug
+ 10488)
- The 64-bit version of Wireshark will leak memory on Windows when the
- display depth is set to 16 bits ([14]Bug 9914)
+ Dell Backup and Recovery (DBAR) makes many Windows applications crash,
+ including Wireshark. ([11]Bug 12036)
__________________________________________________________________
Getting Help
- Community support is available on [15]Wireshark's Q&A site and on the
+ Community support is available on [12]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
- all of Wireshark's mailing lists can be found on [16]the web site.
+ all of Wireshark's mailing lists can be found on [13]the web site.
Official Wireshark training and certification are available from
- [17]Wireshark University.
+ [14]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
- A complete FAQ is available on the [18]Wireshark web site.
+ A complete FAQ is available on the [15]Wireshark web site.
__________________________________________________________________
- Last updated 2014-12-10 17:18:06 UTC
+ Last updated 2016-07-14 18:05:31 UTC
References
4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
- 7. http://wiki.wireshark.org/Development/Win64
- 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
- 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
- 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
- 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
- 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
- 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
- 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9914
- 15. http://ask.wireshark.org/
- 16. https://www.wireshark.org/lists/
- 17. http://www.wiresharktraining.com/
- 18. https://www.wireshark.org/faq.html
+ 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
+ 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
+ 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
+ 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
+ 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036
+ 12. https://ask.wireshark.org/
+ 13. https://www.wireshark.org/lists/
+ 14. http://www.wiresharktraining.com/
+ 15. https://www.wireshark.org/faq.html