Wireshark-announce: [Wireshark-announce] Wireshark 1.6.0rc1 is now available

Date Prev · Date Next · Thread Prev · Thread Next
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Mon, 16 May 2011 16:05:21 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.6.0rc1. This is the
first release candidate of the upcoming 1.6 (stable) branch.

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer.
   It is used for troubleshooting, analysis, development and
   education.

What's New

  Bug Fixes

   The following bugs have been fixed:

     o Wireshark is unresponsive when capturing from named pipes on
       Windows. (Bug 1759)

     o Ring buffers are no longer turned on by default when using
       multiple capture files.

  New and Updated Features

   The following features are new (or have been significantly
   updated) since version 1.4:

     o Wireshark can import text dumps, similar to text2pcap.

     o You can now view Wireshark's dissector tables (for example the
       TCP port to dissector mappings) from the main window.

     o TShark can show a specific occurrence of a field when using
       '-T fields'.

     o Custom columns can show a specific occurrence of a field.

     o You can hide columns in the packet list.

     o Wireshark can now export SMB objects.

     o dftest and randpkt now have manual pages.

     o TShark can now display iSCSI, ICMP and ICMPv6 service response
       times.

     o Dumpcap can now save files with a user-specified group id.

     o Syntax checking is done for capture filters.

     o You can display the compiled BPF code for capture filters in
       the Capture Options dialog.

     o You can now navigate backwards and forwards through TCP and
       UDP sessions using Ctrl+, and Ctrl+. .

     o Packet length is (finally) a default column.

     o TCP window size is now avaiable both scaled and unscaled. A
       TCP window scaling graph is available in the GUI.

     o 802.1q VLAN tags are now shown by the Ethernet II dissector.

     o Various dissectors now display some UTF-16 strings as proper
       Unicode including the DCE/RPC and SMB dissectors.

     o The RTP player now has an option to show the time of day in
       the graph in addition to the seconds since beginning of
       capture.

     o The RTP player now shows why media interruptions occur.

     o Graphs now save as PNG images by default.

     o TShark can read and write host name information from and to
       pcapng-formatted files. Wireshark can read it. TShark can dump
       host name information via

       [-z hosts]

       .

     o The tshark -z option now uses the

       [-z <proto>,srt]

       syntax instead of

       [-z <proto>,rtt]

       for all protocols that support service response time
       statistics. This syntax now matches Wireshark's syntax for
       this option.

  New Protocol Support

   ADwin, ADwin-Config, Apache Etch, Aruba PAPI, Babel Routing
   Protocol, Broadcast/Multicast Control, Constrained Application
   Protocol (COAP), Digium TDMoE, Erlang Distribution Protocol,
   Ether-S-I/O, FastCGI, Fibre Channel over InfiniBand (FCoIB),
   Gopher, Gigamon GMHDR, IDMP, Infiniband Socket Direct Protocol
   (SDP), JSON, LISP Control, LISP Data, LISP, MikroTik MAC-Telnet,
   MRP Multiple Mac Registration Protocol (MMRP) Mongo Wire Protocol,
   MUX27010, Network Monitor 802.11 radio header, OPC UA
   ExtensionObjects, GPPI-GEOLOCATION-GPS, ReLOAD, ReLOAD Framing,
   RObust Header Compression (ROHC), RSIP, SAMETIME, SCoP, SGSAP,
   Tektronix Teklink, USB/AT Commands, uTorrent Transport Protocol,
   WAI authentication, Wi-Fi P2P (Wi-Fi Direct)

  Updated Protocol Support

  New and Updated Capture File Support

   Apple PacketLogger, Catapult DCT2000, Daintree SNA, Endace ERF, HP
   OpenVMS TCPTrace, IPFIX (the file format, not the protocol),
   Lucent/Ascend debug, Microsoft Network Monitor, Network
   Instruments, TamoSoft CommView

Getting Wireshark

   Wireshark source code and installation packages are available from
   http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages.
   You can usually install or upgrade Wireshark using the package
   management system specific to that platform. A list of third-party
   packages can be found on the download page on the Wireshark web
   site.

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About→Folders to find the default locations on your system.

Known Problems

   Wireshark might make your system disassociate from a wireless
   network on OS X 10.4. (Bug 1315)

   Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419)

   The BER dissector might infinitely loop. (Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   (Bug 1814)

   Filtering tshark captures with display filters (-R) no longer
   works. (Bug 2234)

   The 64-bit Windows installer does not ship with libsmi. (Win64
   development page)

   Application crash when changing real-time option. (Bug 4035)

   Hex pane display issue after startup. (Bug 4056)

   Crash when sorting column while capturing. (Bug 4273)

   Packet list rows are oversized. (Bug 4357)

   Summary pane selected frame highlighting not maintained. (Bug
   4445)

   Character echo pauses in Capture Filter field in Capture Options.
   (Bug 5356)

Getting Help

   Community support is available on Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and
   archives for all of Wireshark's mailing lists can be found on the
   web site.

   Training is available from Wireshark University.

Frequently Asked Questions

   A complete FAQ is available on the Wireshark web site.

Digests

wireshark-1.6.0rc1.tar.bz2: 21833197 bytes
MD5(wireshark-1.6.0rc1.tar.bz2)=32f269e61bb69846590b6dc8b1c3edbf
SHA1(wireshark-1.6.0rc1.tar.bz2)=89d374a6607e7afc164da7e330e405b335484720
RIPEMD160(wireshark-1.6.0rc1.tar.bz2)=e3455efe740dd41698b3369afde9673da05789b7

wireshark-win32-1.6.0rc1.exe: 19164747 bytes
MD5(wireshark-win32-1.6.0rc1.exe)=492163623870555d38608f9c627741c5
SHA1(wireshark-win32-1.6.0rc1.exe)=6d7d281b22719efb7eff3e8dd555a81ebddda001
RIPEMD160(wireshark-win32-1.6.0rc1.exe)=12ddbd24e44e903d4a0aac4cbef35a4e79678788

wireshark-win64-1.6.0rc1.exe: 22346188 bytes
MD5(wireshark-win64-1.6.0rc1.exe)=bd0e19dde5b7b218273786b3485b6e7c
SHA1(wireshark-win64-1.6.0rc1.exe)=134b02b32eaba0b7458698a0a486c388b13d8c57
RIPEMD160(wireshark-win64-1.6.0rc1.exe)=25b90e4a5f20481fb96007da7a600ab3b4ceae27

wireshark-1.6.0rc1.u3p: 25600878 bytes
MD5(wireshark-1.6.0rc1.u3p)=ba83e11574c8a7cc228a428aad4f10cc
SHA1(wireshark-1.6.0rc1.u3p)=6545eecb0c20848ada801c6f3aeafda71ebdbdb9
RIPEMD160(wireshark-1.6.0rc1.u3p)=06d6724e4ee715cf1e934bb41fa9bee745d75ba2

WiresharkPortable-1.6.0rc1.paf.exe: 19957048 bytes
MD5(WiresharkPortable-1.6.0rc1.paf.exe)=7287d9e7e5235cb236fcca8f943aeef2
SHA1(WiresharkPortable-1.6.0rc1.paf.exe)=8c55c3d8060dff90cc58c936a5a47d16bc645e20
RIPEMD160(WiresharkPortable-1.6.0rc1.paf.exe)=1391de207c179b1ea9a7f116bf43b74c44dfcfd5

Wireshark 1.6.0rc1 Intel 32.dmg: 20259488 bytes
MD5(Wireshark 1.6.0rc1 Intel 32.dmg)=22ad46d7990400446b6b56ac6312268c
SHA1(Wireshark 1.6.0rc1 Intel
32.dmg)=61ff0b306904e06c9d4cc24065737614414ec652
RIPEMD160(Wireshark 1.6.0rc1 Intel
32.dmg)=132efeb2cd5497c51360962b1ccb25c9133ea940

Wireshark 1.6.0rc1 Intel 64.dmg: 19142380 bytes
MD5(Wireshark 1.6.0rc1 Intel 64.dmg)=5d903cbbb70ceb9f689896aaf7662e0e
SHA1(Wireshark 1.6.0rc1 Intel
64.dmg)=96cee8140c3684b97b2ba618238a3faaaa113a9f
RIPEMD160(Wireshark 1.6.0rc1 Intel
64.dmg)=2dc3465ffc91ebb3726a84cb2892758e4b1e1b62

Wireshark 1.6.0rc1 PPC 32.dmg: 20972793 bytes
MD5(Wireshark 1.6.0rc1 PPC 32.dmg)=638b27ac9c0913fe9a49177eab038a80
SHA1(Wireshark 1.6.0rc1 PPC 32.dmg)=89e88776324c05d3653045d1ff3af4fb025fa5f1
RIPEMD160(Wireshark 1.6.0rc1 PPC
32.dmg)=6c672e8efe020101726880debb1d536cc9ac1cb7
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk3RrbEACgkQpw8IXSHylJpRxACaA8zoj3rDgqcVEGwALFwksiem
jy0AoLv9u4by7zAiqXty+U0hB77FrBef
=WEj0
-----END PGP SIGNATURE-----