Wireshark-announce: [Wireshark-announce] Wireshark 1.6.0 is now available

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 1.6.0. What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. What's New Bug Fixes The following bugs have been fixed: o Wireshark is unresponsive when capturing from named pipes on Windows. (Bug 1759) o Crash when sorting column while capturing. (Bug 4273) o Ring buffers are no longer turned on by default when using multiple capture files. New and Updated Features The following features are new (or have been significantly updated) since version 1.4: o Wireshark is now distributed as an installation package rather than a drag-installer on OS X. The installer adds a startup item that should make it easier to capture packets. o Large file (greater than 2 GB) support has been improved. o Wireshark and TShark can import text dumps, similar to text2pcap. o You can now view Wireshark's dissector tables (for example the TCP port to dissector mappings) from the main window. o Wireshark can export SSL session keys via File→Export→SSL Session Keys... o TShark can show a specific occurrence of a field when using '-T fields'. o Custom columns can show a specific occurrence of a field. o You can hide columns in the packet list. o Wireshark can now export SMB objects. o dftest and randpkt now have manual pages. o TShark can now display iSCSI, ICMP and ICMPv6 service response times. o Dumpcap can now save files with a user-specified group id. o Syntax checking is done for capture filters. o You can display the compiled BPF code for capture filters in the Capture Options dialog. o You can now navigate backwards and forwards through TCP and UDP sessions using Ctrl+, and Ctrl+. . o Packet length is (finally) a default column. o TCP window size is now avaiable both scaled and unscaled. A TCP window scaling graph is available in the GUI. o 802.1q VLAN tags are now shown in the Ethernet II protocol tree instead of a separate tree. o Various dissectors now display some UTF-16 strings as proper Unicode including the DCE/RPC and SMB dissectors. o The RTP player now has an option to show the time of day in the graph in addition to the seconds since beginning of capture. o The RTP player now shows why media interruptions occur. o Graphs now save as PNG images by default. o TShark can read and write host name information from and to pcapng-formatted files. Wireshark can read it. TShark can dump host name information via [-z hosts] . o TShark's -z option now uses the [-z <proto>,srt] syntax instead of [-z <proto>,rtt] for all protocols that support service response time statistics. This matches Wireshark's syntax for this option. o Wireshark and TShark can now read compressed Windows Sniffer files. New Protocol Support ADwin, ADwin-Config, Apache Etch, Aruba PAPI, Babel Routing Protocol, Broadcast/Multicast Control, Constrained Application Protocol (COAP), Digium TDMoE, Erlang Distribution Protocol, Ether-S-I/O, FastCGI, Fibre Channel over InfiniBand (FCoIB), Gopher, Gigamon GMHDR, IDMP, Infiniband Socket Direct Protocol (SDP), JSON, LISP Control, LISP Data, LISP, MikroTik MAC-Telnet, MRP Multiple Mac Registration Protocol (MMRP) Mongo Wire Protocol, MUX27010, Network Monitor 802.11 radio header, OPC UA ExtensionObjects, openSAFETY, PPI-GEOLOCATION-GPS, ReLOAD, ReLOAD Framing, RObust Header Compression (ROHC), RSIP, SAMETIME, SCoP, SGSAP, Tektronix Teklink, USB/AT Commands, uTorrent Transport Protocol, WAI authentication, Wi-Fi P2P (Wi-Fi Direct) Updated Protocol Support New and Updated Capture File Support Apple PacketLogger, Catapult DCT2000, Daintree SNA, Endace ERF, HP OpenVMS TCPTrace, IPFIX (the file format, not the protocol), Lucent/Ascend debug, Microsoft Network Monitor, Network Instruments, TamoSoft CommView Getting Wireshark Wireshark source code and installation packages are available from http://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About→Folders to find the default locations on your system. Known Problems Wireshark might make your system disassociate from a wireless network on OS X 10.4. (Bug 1315) Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419) The BER dissector might infinitely loop. (Bug 1516) Capture filters aren't applied when capturing from named pipes. (Bug 1814) Filtering tshark captures with display filters (-R) no longer works. (Bug 2234) The 64-bit Windows installer does not ship with libsmi. (Win64 development page) Application crash when changing real-time option. (Bug 4035) Hex pane display issue after startup. (Bug 4056) Packet list rows are oversized. (Bug 4357) Summary pane selected frame highlighting not maintained. (Bug 4445) Wireshark and TShark will display incorrect delta times in some cases. (Bug 4985 and bug 5580) Character echo pauses in Capture Filter field in Capture Options. (Bug 5356) Getting Help Community support is available on Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site. Training is available from Wireshark University. Frequently Asked Questions A complete FAQ is available on the Wireshark web site. Digests wireshark-1.6.0.tar.bz2: 21820220 bytes MD5(wireshark-1.6.0.tar.bz2)=9f9314c89bf1c8b440a7909884838cfd SHA1(wireshark-1.6.0.tar.bz2)=c54ab0d77f6bbe6a2b7329de69ed10614d57aa35 RIPEMD160(wireshark-1.6.0.tar.bz2)=d30ba785f8e8ac6d74b4f3f55f9e797a8bc0dec3 wireshark-win32-1.6.0.exe: 19459172 bytes MD5(wireshark-win32-1.6.0.exe)=b40c224c9055849c395e3256c08505ed SHA1(wireshark-win32-1.6.0.exe)=6b4a731b92e28a7ba3735decbdb1268b9c2577ff RIPEMD160(wireshark-win32-1.6.0.exe)=00ab3be059ae8c5727a2b5541889338add96af7a wireshark-win64-1.6.0.exe: 22640591 bytes MD5(wireshark-win64-1.6.0.exe)=2b97c43cbfb8c11daf9d99dfc7c1c5cf SHA1(wireshark-win64-1.6.0.exe)=03e4f55e7a03bd713b83e3d7d031de8165c44be9 RIPEMD160(wireshark-win64-1.6.0.exe)=f442a322a4a8a7da0ee453deeb88b1f161ba71a0 wireshark-1.6.0.u3p: 25883414 bytes MD5(wireshark-1.6.0.u3p)=93647badc83c1649f2341513cf3f11f2 SHA1(wireshark-1.6.0.u3p)=772a67725788923e0f6a77f9da145bbc0554482a RIPEMD160(wireshark-1.6.0.u3p)=9f90b24db2769c821528d7cced909f35dd9dca5f WiresharkPortable-1.6.0.paf.exe: 20355077 bytes MD5(WiresharkPortable-1.6.0.paf.exe)=f3a724a2ab0198fa8ef9054a4a6ac2ad SHA1(WiresharkPortable-1.6.0.paf.exe)=477d561a57ab957c7370508a31bf3428dfd223f4 RIPEMD160(WiresharkPortable-1.6.0.paf.exe)=9b76f15bd93d0d001c419f1d0bed16339dfdf351 Wireshark 1.6.0 Intel 32.dmg: 20268187 bytes MD5(Wireshark 1.6.0 Intel 32.dmg)=b38077b29417d8328c043ce808267166 SHA1(Wireshark 1.6.0 Intel 32.dmg)=f69faa0d9efa3af4a2c3b45690d56b769031c716 RIPEMD160(Wireshark 1.6.0 Intel 32.dmg)=a09fa455975b98b456b2c65a05d5db25ab3a0418 Wireshark 1.6.0 Intel 64.dmg: 19823788 bytes MD5(Wireshark 1.6.0 Intel 64.dmg)=594a6666df03295c43f3abe84f7f2619 SHA1(Wireshark 1.6.0 Intel 64.dmg)=477858d204233df1f8409ac187c33a1e3ba54904 RIPEMD160(Wireshark 1.6.0 Intel 64.dmg)=7383b8463d6cf1b0e0fe8a867f737cfaf7be48df Wireshark 1.6.0 PPC 32.dmg: 20968068 bytes MD5(Wireshark 1.6.0 PPC 32.dmg)=7546eb927d624274159afa71d9b60b72 SHA1(Wireshark 1.6.0 PPC 32.dmg)=876b90a5c6b88db51c5d5978def173a10fc6b46b RIPEMD160(Wireshark 1.6.0 PPC 32.dmg)=2bd0f1b98a9f165057aee773d437ebe228906deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk3ubqEACgkQpw8IXSHylJoODwCgyQSwaW7jVQzuZZtGpMoJPVfG 518An18G6wMA9Fwn/Xlnedwhqcw0ufrp =kETF -----END PGP SIGNATURE-----