+ Wireshark 2.1.1 Release Notes
- Wireshark 1.99.0 Release Notes
-
- This is an experimental release intended to test new features for the
- next stable release.
+ This is a semi-experimental release intended to test new features for
+ Wireshark 2.2.
__________________________________________________________________
What is Wireshark?
What's New
- Bug Fixes
-
- The following bugs have been fixed:
- * "On-the-wire" packet lengths are limited to 65535 bytes. ([1]Bug
- 8808, ws-buglink:9390)
- * "Follow TCP Stream" shows only the first HTTP req+res. ([2]Bug
- 9044)
- * Files with pcap-ng Simple Packet Blocks can't be read. ([3]Bug
- 9200)
- * MPLS-over-PPP isn't recognized. ([4]Bug 9492)
-
New and Updated Features
The following features are new (or have been significantly updated)
- since version 1.12.0:
- * The I/O Graph in the Gtk+ UI now supports an unlimited number of
- data points (up from 100k).
- * tshark now resets its state when changing files in ring-buffer
- mode.
- * Expert Info severities can now be configured.
- * Qt port:
- + A Polish translation has been added.
- + The Interfaces dialog has been added.
- + The interface list is now updated when interfaces appear or
- disappear.
- + The Conversations dialog has been added.
- + A Japanese translation has been added.
- + It is now possible to manage remote capture interfaces.
- + Windows: taskbar progress support has been added.
-
- The following features are new (or have been significantly updated)
- since version 1.11.3:
- * Transport name resolution is now disabled by default.
- * Support has been added for all versions of the DCBx protocol.
- * Cleanup of LLDP code, all dissected fields are now navigable.
+ since version 2.1.0:
+ * Added -d option for Decode As support in Wireshark (mimics TShark
+ functionality)
+ * The Qt UI, GTK+ UI, and TShark can now export packets as JSON.
+ TShark can additionally export packets as Elasticsearch-compatible
+ JSON.
+ * The Qt UI now supports the -j, -J, and -l flags. The -m flag is now
+ deprecated.
+ * The Conversations and Endpoints dialogs are more responsive when
+ viewing large numbers of items.
+ * The RTP player now allows up to 30 minutes of silence frames.
+ * Packet bytes can now be displayed as EBCDIC.
+ * The Qt UI loads captures faster on Windows.
The following features are new (or have been significantly updated)
- since version 1.11.2:
- * Qt port:
- + The About dialog has been added
- + The Capture Interfaces dialog has been added.
- + The Decode As dialog has been added. It managed to swallow up
- the User Specified Decodes dialog as well.
- + The Export PDU dialog has been added.
- + Several SCTP dialogs have been added.
- + The statistics tree (the backend for many Statistics and
- Telephony menu items) dialog has been added.
- + The I/O Graph dialog has been added.
- + French translation has updated.
-
- The following features are new (or have been significantly updated)
- since version 1.11.1:
- * Mac OS X packaging has been improved.
-
- The following features are new (or have been significantly updated)
- since version 1.11.0:
- * Dissector output may be encoded as UTF-8. This includes TShark
- output.
- * Qt port:
- + The Follow Stream dialog now supports packet and TCP stream
- selection.
- + A Flow Graph (sequence diagram) dialog has been added.
- + The main window now respects geometry preferences.
-
- The following features are new (or have been significantly updated)
- since version 1.10:
- * Wireshark now uses the Qt application framework. The new UI should
- provide a significantly better user experience, particularly on Mac
- OS X and Windows.
- * The Windows installer now uninstalls the previous version of
- Wireshark silently. You can still run the uninstaller manually
- beforehand if you wish to run it interactively.
- * Expert information is now filterable when the new API is in use.
- * The "Number" column shows related packets and protocol conversation
- spans (Qt only).
- * When manipulating packets with editcap using the -C <choplen>
- and/or -s <snaplen> options, it is now possible to also adjust the
- original frame length using the -L option.
- * You can now pass the -C <choplen> option to editcap multiple times,
- which allows you to chop bytes from the beginning of a packet as
- well as at the end of a packet in a single step.
- * You can now specify an optional offset to the -C option for
- editcap, which allows you to start chopping from that offset
- instead of from the absolute packet beginning or end.
- * "malformed" display filter has been renamed to "_ws.malformed". A
- handful of other filters have been given the "_ws." prefix to note
- they are Wireshark application specific filters and not dissector
- filters.
- * The Kerberos dissector has been replaced with an auto generated one
- from ASN1 protocol description, changing a lot of filter names.
+ since version 2.0.0:
+ * The intelligent scroll bar now sits to the left of a normal scroll
+ bar and provides a clickable map of nearby packets.
+ * You can now switch between between Capture and File Format
+ dissection of the current capture file via the View menu in the Qt
+ GUI.
+ * You can now show selected packet bytes as ASCII, HTML, Image, ISO
+ 8859-1, Raw, UTF-8, a C array, or YAML.
+ * You can now use regular expressions in Find Packet and in the
+ advanced preferences.
+ * Name resolution for packet capture now supports asynchronous DNS
+ lookups only. Therefore the "concurrent DNS resolution" preference
+ has been deprecated and is a no-op. To enable DNS name resolution
+ some build dependencies must be present (currently c-ares). If that
+ is not the case DNS name resolution will be disabled (but other
+ name resolution mechanisms, such as host files, are still
+ available).
+ * The byte under the mouse in the Packet Bytes pane is now
+ highlighted.
+ * TShark supports exporting PDUs via the -U flag.
+ * The Windows and OS X installers now come with the "sshdump" and
+ "ciscodump" extcap interfaces.
+ * Most dialogs in the Qt UI now save their size and positions.
+ * The Follow Stream dialog now supports UTF-16.
+ * The Firewall ACL Rules dialog has returned.
+ * The Flow (Sequence) Analysis dialog has been improved.
+ * We no longer provide packages for 32-bit versions of OS X.
+ * The Bluetooth Device details dialog has been added.
+
+ New File Format Decoding Support
+
+ Wireshark is able to display the format of some types of files (rather
+ than displaying the contents of those files). This is useful when
+ you're curious about, or debugging, a file and its format. To open a
+ capture file (such as PCAP) in this mode specify "MIME Files Format" as
+ the file's format in the Open File dialog.
+
+ New files that Wireshark can open in this mode include:
New Protocol Support
- ceph, corosync/totemnet, corosync/totemsrp, Generic Network
- Virtualization Encapsulation (Geneve), IPMI Trace, iSER, OptoMMP, and
- Stateless Transport Tunneling
+ Apache Cassandra - CQL version 3.0, Bachmann bluecom Protocol,
+ Bluetooth Pseudoheader for BR/EDR, CISCO ERSPAN3 Marker, Edge Control
+ Protocol (ECP), Ericsson IPOS Kernel Packet Header Dissector Added
+ (IPOS), Extensible Control & Management Protocol (eCMP), FLEXRAY
+ Protocol dissector added (automotive bus), IEEE 802.1BR E-Tag, ISO
+ 8583-1, ISO14443, ITU-T G.7041/Y.1303 Generic Framing Procedure (GFP),
+ LAT protocol (DECNET), Metamako trailers, Network-Based IP Flow
+ Mobility (NBIFOM), Nokia Intelligent Service Interface (ISI), Open
+ Mobile Alliance Lightweight Machine to Machine TLV payload Added (LwM2M
+ TLV), Real Time Location System (RTLS), RTI TCP Transport Layer
+ (RTITCP), STANAG 5602 SIMPLE, USB3 Vision Protocol (USB machine vision
+ cameras), USBIP Protocol, UserLog Protocol, and Zigbee Protocol
+ Clusters Dissectors Added (Closures Lighting General Measurement &
+ Sensing HVAC Security & Safety)
Updated Protocol Support
- Too many protocols have been updated to list here.
+ Bluetooth OBEX dissector (btobex) was renamed to Obex Dissector (obex),
+ allow to DecodeAs it over USB, TCP and UDP.
+
+ A preference was added to TCP dissector for handling IPFIX process
+ information. It has been disabled by default.
New and Updated Capture File Support
- Android logcat text files
+ and Micropross mplog
+
+ New and Updated Capture Interfaces support
+
+ Non-empty section placeholder.
Major API Changes
The libwireshark API has undergone some major changes:
- * Many of the ep_ and se_ memory allocation routines have been
- removed.
- * The (long-since-broken) Python bindings support has been removed
- from Wireshark. If you want to write dissectors in something other
- than C, use Lua.
+ * The address macros (e.g., SET_ADDRESS) have been removed. Use the
+ (lower case) functions of the same names instead.
+ * "old style" dissector functions (that don't return number of bytes
+ used) have been replaced in name with the "new style" dissector
+ functions.
+ * tvb_get_string and tvb_get_stringz have been replaced with
+ tvb_get_string_enc and tvb_get_stringz_enc respectively.
__________________________________________________________________
Getting Wireshark
Wireshark source code and installation packages are available from
- [5]http://www.wireshark.org/download.html.
+ [1]https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
- found on the [6]download page on the Wireshark web site.
+ found on the [2]download page on the Wireshark web site.
__________________________________________________________________
File Locations
Known Problems
- Dumpcap might not quit if Wireshark or TShark crashes. ([7]Bug 1419)
+ Dumpcap might not quit if Wireshark or TShark crashes. ([3]Bug 1419)
- The BER dissector might infinitely loop. ([8]Bug 1516)
+ The BER dissector might infinitely loop. ([4]Bug 1516)
- Capture filters aren't applied when capturing from named pipes.
- (ws-buglink:1814)
+ Capture filters aren't applied when capturing from named pipes. ([5]Bug
+ 1814)
Filtering tshark captures with read filters (-R) no longer works.
- ([9]Bug 2234)
-
- The 64-bit Windows installer does not support Kerberos decryption.
- ([10]Win64 development page)
+ ([6]Bug 2234)
- Resolving ([11]Bug 9044) reopens ([12]Bug 3528) so that Wireshark no
- longer automatically decodes gzip data when following a TCP stream.
+ Application crash when changing real-time option. ([7]Bug 4035)
- Application crash when changing real-time option. ([13]Bug 4035)
-
- Hex pane display issue after startup. ([14]Bug 4056)
-
- Packet list rows are oversized. ([15]Bug 4357)
-
- Summary pane selected frame highlighting not maintained. ([16]Bug 4445)
+ Packet list rows are oversized. ([8]Bug 4357)
Wireshark and TShark will display incorrect delta times in some cases.
- ([17]Bug 4985)
+ ([9]Bug 4985)
+
+ Wireshark should let you work with multiple capture files. ([10]Bug
+ 10488)
- The 64-bit Mac OS X installer doesn't support Mac OS X 10.9 ([18]Bug
- 9242)
+ Dell Backup and Recovery (DBAR) makes many Windows applications crash,
+ including Wireshark. ([11]Bug 12036)
__________________________________________________________________
Getting Help
- Community support is available on [19]Wireshark's Q&A site and on the
+ Community support is available on [12]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
- all of Wireshark's mailing lists can be found on [20]the web site.
+ all of Wireshark's mailing lists can be found on [13]the web site.
Official Wireshark training and certification are available from
- [21]Wireshark University.
+ [14]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
- A complete FAQ is available on the [22]Wireshark web site.
+ A complete FAQ is available on the [15]Wireshark web site.
__________________________________________________________________
- Last updated 2014-08-17 20:04:58 UTC
+ Last updated 2016-07-14 18:05:31 UTC
References
- 1. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8808
- 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
- 3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9200
- 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9492
- 5. http://www.wireshark.org/download.html
- 6. http://www.wireshark.org/download.html#thirdparty
- 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
- 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
- 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
- 10. https://wiki.wireshark.org/Development/Win64
- 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
- 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
- 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
- 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
- 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
- 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445
- 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
- 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9242
- 19. http://ask.wireshark.org/
- 20. http://www.wireshark.org/lists/
- 21. http://www.wiresharktraining.com/
- 22. http://www.wireshark.org/faq.html
+ 1. https://www.wireshark.org/download.html
+ 2. https://www.wireshark.org/download.html#thirdparty
+ 3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
+ 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
+ 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
+ 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
+ 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
+ 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
+ 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
+ 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
+ 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036
+ 12. https://ask.wireshark.org/
+ 13. https://www.wireshark.org/lists/
+ 14. http://www.wiresharktraining.com/
+ 15. https://www.wireshark.org/faq.html