- Update from ver4sion 4.4.9 to 4.6.0
- Update of rootfile
- Changelog
4.6.0
New and Updated Features
The following features are new (or have been significantly updated)
since
version 4.6.0rc1:
Wireshark can dissect process information, packet metadata,
flow IDs,
drop information, and other information provided by tcpdump on
macOS.
The following features are either new or have been significantly
updated
since version 4.4.0:
The Windows installers now ship with Npcap 1.83. They previously
shipped with Npcap 1.79.
The Windows and macOS installers now ship with Qt 6.9.3. They
previously shipped with Qt 6.5.3.
We now ship universal macOS installers instead of separate
packages
for Arm64 and Intel. Issue 17294
WinPcap is no longer supported. On Windows, use Npcap instead,
uninstalling WinPcap if necessary. The final release of
WinPcap was
version 4.1.3 in 2013. It only supports up to Windows 8, which
is no
longer supported by Microsoft or Wireshark.
A new “Plots” dialog has been added, which provides scatter
plots in
contrast to the “I/O Graphs” dialog, which provides
histograms. The
Plots dialog window supports multiple plots, markers, and
automatic
scrolling.
Live captures can be compressed while writing. (Previously
there was
support for compressing when performing multiple file capture,
at
file rotation time.) The --compress option in TShark works on
live
captures as well. Issue 9311
Absolute time fields, regardless of field display in the Packet
Details, are always written in ISO 8601 format in UTC with -T
json.
This was already the case for -T ek since version 4.2.0. JSON
is
primarily a data interchange format read by software, so a
standard
format is desirable.
When absolute times field are output with -T fields, the "show"
field
of -T pdml, or in custom columns (including CSV output of
columns),
the formatting similar to asctime (e.g., Dec 18, 2017
05:28:39.071704055 EST) has been deprecated in favor of ISO
8601. For
backwards compatibility, a preference has been added,
protocols.display_abs_time_ascii, which can be set to continue
to
format times as before. This preference can also be set to
never use
ASCII time and to use ISO 8601 time formatting in the protocol
tree
(Packet Details) as well. It is possible that a future release
will
remove the ascitime style formatting entirely.
UTC frame time column formats (including "Time (format as
specified)"
when a UTC time display format is selected) have a "Z" suffix
per
ISO 8601. Local time formats remain unqualified (including if
the
local time zone is UTC.) Custom columns displaying
FT_ABSOLUTE_TIME
already had time zone indication.
The TShark -G option for generating glossary reports does not
need to
be the first option given on the command line anymore. In
addition,
the reports now are affected by other command line options
such as
-o, -d, and --disable-protocol, in addition to the -C option,
which
was already supported. (The defaultprefs report remains
unaffected by
any other options.) As a part of this change, -G with no
argument,
which was previously deprecated, is no longer supported. Use
tshark -G fields to produce the same report. Also, the syntax
for
only listing fields with a certain prefix has changed to
tshark -G
fields,prefix.
The underlying type of EUI-64 fields has been switched to bytes
when
packet matching, similar to most other address formats. This
means
that EUI-64 addresses can be sliced and compared to other bytes
types, e.g. the filter wpan.src64[:3] == eth.src[:3]. Fields
can
still be specified using 64-bit unsigned integer literals,
though
arithmetic with other integers is no longer supported.
Wireshark can now decrypt NTP packets using NTS (Network Time
Security).
To decrypt packets, the NTS-KE (Network Time Security Key
Establishment Protocol) packets need to be present, alongside
the TLS
client and exporter secrets. Additionally, the parts of a NTP
packet
which can be cryptographically authenticated (from NTP packet
header
until the end of the last extension field that precedes the NTS
Authenticator and Encrypted Extension Fields extension field)
are
checked for validity.
Wireshark’s ability to decrypt MACsec packets has been expanded
to
either use the SAK unwrapped by the MKA dissector, or the PSK
configured in the MACsec dissector. To enable the MKA
dissector to
unwrap the SAK, the CAK for the applicable CKN can be entered
in the
extended CKN/CAK Info UAT in the MKA dissector preferences. The
ability of the MACsec dissector to decrypt packets using a PSK
has
been extended to a list of PSKs, which can entered through a
new UAT.
The TCP Stream Graph axes now use units with SI prefixes. Issue
20197
Custom columns have an option to show the values using the same
format
as in Packet Details.
Custom column complex expressions (e.g., with arithmetic, filter
functions, etc.) that return numeric results are sorted
numerically
instead of lexicographically.
Display filter functions float and double are added to allow
explicitly converting field types like integers and times to
single
and double precision floats. They can be used to perform
further
arithmetic operations on fields of different types, including
in
custom column definitions.
The minimum width of the I/O Graph dialog window has been
reduced, so
it should work better on small resolution desktops, especially
in
certain languages. To enable this, some checkbox controls were
moved
to the graph right-click context menu. Issue 20147
X.509 certificates, used in TLS and elsewhere, can be exported
via the
File › Export Objects menu in Wireshark (under the name
"X509AF")
and --export-objects in TShark (with the protocol name x509af.)
Zstandard Content-Encoding is supported in the HTTP and HTTP/2
dissectors.
Follow Stream is supported for MPEG 2 Transport Stream PIDs,
and for
Packetized Elementary Streams contained within MPEG 2 TS. The
latter
can be used to extract audio or video for playback with other
tools.
DNP 3 (Distributed Network Protocol 3) is now supported in the
Conversations and Endpoints table dialogs.
The Lua supplied preloaded libraries bit and rex_pcre2 are
loaded in a
way that adds them to the package.loaded table, as though
through
require, so that require("bit") and require("rex_pcre2")
statements
in Lua dissectors, while usually superfluous, behave as
expected.
Issue 20213
The packet list (Wireshark) and event list (Stratoshark) no
longer
support rows with multiple lines. Issue 14424
The ethers file can also contain EUI-64 to name mappings. Issue
15487
Wireshark’s "Import from Hex Dump" feature and text2pcap now
support
byte groups with 2 to 4 bytes (with an option for
little-endian byte
order), and support hexadecimal offsets with a 0x or 0X prefix
(as
produced by tcpdump -x, among others). Issue 16193
Frame timestamps can be added as preamble to hex dumps in
Wireshark
from the "Print" and "Export Packet Dissection" dialogs, and in
TShark with the --hexdump time option. Issue 17132
Lua now has a Conversation object, which exposes conversations
and
conversation data to Lua. Issue 15396
An Edit › Copy › as HTML menu item has been added, along with
associated context menu items and a keyboard shortcut. It
provides an
option (via knobs in preferences) to copy plain text with
aligned
columns along with an ability to select a copy format to be
used when
copied via keyboard shortcut.
The "no duplicate keys" version of JSON output that tshark has
supported since 2.6.0 is available through the GUI Export
Dissections
Dialog. Note that this format does not necessarily preserve the
ordering of all children in a tree, if sibling with identical
keys
are not consecutive.
The GUI Export Dissections Dialog can output raw hex bytes of
the
frame data for each field with or without exporting the field
values,
the same formats as the "-T json -x" and "-T jsonraw" output
modes,
respectively, of TShark.
The Conversations and Endpoints dialogs have an option to
display byte
counts and bit rates in exact counts instead of human-readable
numbers with SI units. The default setting when opening a
dialog is
controlled by a Statistics preference,
"conv.machine_readable". The
same preference controls whether precise byte counts are used
in the
TShark "-z conv" and "-z endpoints" taps.
The output format for some TShark statistics taps (those
selected with
"-z <tap>,tree", which use the stats_tree system) can be
controlled
via a preference "-o statistics.output_format".
The color scheme can be set to Light or Dark mode independently
of the
current OS default on Windows and macOS, if Wireshark is built
with
Qt 6.8 or later as the official installers are. Issue 19328
libxml2 is now a required dependency. Note that Wireshark will
not
build with libxml2 2.15.0, but other versions should work.
The View menu has an option to Redissect Packets manually,
which can
be useful when address resolution or decryption secrets have
changed.
HTTP2 tracking of 3GPP session over 5G Service Based Interfaces
is now
optional available. When enabled "Associate IMSI" will be add
on
HTTP2 streams which has been found belong to a session.
Building the documentation on Windows no longer requires Java.
On Linux, capture filters that use BPF extensions like
"inbound",
"outbound", and "ifindex" can be used for capturing (and
compiled by
the Compiled Filter dialog). Instead of always being rejected
by the
syntax checker, they will be marked as unknown.
Removed Features and Support
Wireshark no longer supports AirPcap and WinPcap.
Wireshark no longer supports libnl versions 1 or 2.
The ENABLE_STATIC CMake option has been deprecated in favor of
BUILD_SHARED_LIBS
New File Format Decoding Support
Resource Interchange File Format (RIFF) and TTL File Format
New Protocol Support
Asymmetric Key Packages (AKP), Binary HTTP, BIST TotalView-ITCH
protocol (BIST-ITCH), BIST TotalView-OUCH protocol (BIST-OUCH),
Bluetooth Android HCI (HCI ANDROID), Bluetooth Intel HCI (HCI
INTEL),
BPSec COSE Context, BPSec Default SC, Commsignia Capture
Protocol
(C2P), DECT NR+ (DECT-2020 New Radio), DLMS/COSEM, Ephemeral
Diffie-Hellman Over COSE, Identifier-Locator Network Protocol
(ILNP),
LDA Neo Device trailer (LDA_NEO_TRAILER), Lenbrook Service
Discovery
Protocol (LSDP), LLC V1, Navitrol messaging, Network Time
Security
Key Establishment Protocol (NTS-KE), Ouster VLP-16, Private
Line
Emulation (PLE), RC V3, RCG, Roughtime, SBAS L5 Navigation
Message,
SGP.22 GSMA Remote SIM Provisioning (SGP.22), SGP.32 GSMA
Remote SIM
Provisioning (SGP.32), SICK CoLA Ascii and CoLA Binary
protocols,
Silabs Debug Channel, Universal Measurement and Calibration
Protocol
(XCP), USB Picture Transfer Protocol (USB-PTP), VLP-16 Data and
Position messaging, and vSomeIP Internal Protocol (vSomeIP)
Updated Protocol Support
Too many protocol updates have been made to list them all here.
New and Updated Capture File Support
BLF is now improved (including writing to BLF)
New and Updated Capture Interfaces support
On Windows, etwdump’s user-friendliness has been greatly
improved
thanks to various extcap changes. It should also now display
the raw
bytes of unknown events.
Major API Changes
The Lua API now supports Libgcrypt symmetric cipher functions.
Signed-off-by: Adolf Belka <[email protected]>
---
config/rootfiles/packages/tshark | 85 ++++++++++++++++++--------------
lfs/tshark | 6 +--
2 files changed, 50 insertions(+), 41 deletions(-)
diff --git a/config/rootfiles/packages/tshark b/config/rootfiles/packages/tshark
index 1778ebb0b..db7399cb8 100644
--- a/config/rootfiles/packages/tshark
+++ b/config/rootfiles/packages/tshark
@@ -2,7 +2,6 @@
#usr/bin/captype
usr/bin/dumpcap
#usr/bin/editcap
-#usr/bin/idl2wrs
#usr/bin/mergecap
#usr/bin/randpkt
#usr/bin/rawshark
@@ -11,48 +10,51 @@ usr/bin/dumpcap
#usr/bin/text2pcap
usr/bin/tshark
#usr/lib/libwireshark.so
-usr/lib/libwireshark.so.18
-usr/lib/libwireshark.so.18.0.9
+usr/lib/libwireshark.so.19
+usr/lib/libwireshark.so.19.0.0
#usr/lib/libwiretap.so
-usr/lib/libwiretap.so.15
-usr/lib/libwiretap.so.15.0.9
+usr/lib/libwiretap.so.16
+usr/lib/libwiretap.so.16.0.0
#usr/lib/libwsutil.so
-usr/lib/libwsutil.so.16
-usr/lib/libwsutil.so.16.0.0
+usr/lib/libwsutil.so.17
+usr/lib/libwsutil.so.17.0.0
#usr/lib/wireshark
-#usr/lib/wireshark/extcap
-usr/lib/wireshark/extcap/androiddump
-usr/lib/wireshark/extcap/ciscodump
-usr/lib/wireshark/extcap/dpauxmon
-usr/lib/wireshark/extcap/randpktdump
-usr/lib/wireshark/extcap/sshdump
-usr/lib/wireshark/extcap/udpdump
-usr/lib/wireshark/extcap/wifidump
#usr/lib/wireshark/plugins
-usr/lib/wireshark/plugins/4.4
-usr/lib/wireshark/plugins/4.4/codecs
-usr/lib/wireshark/plugins/4.4/codecs/g711.so
-usr/lib/wireshark/plugins/4.4/codecs/l16mono.so
-usr/lib/wireshark/plugins/4.4/codecs/opus_dec.so
-usr/lib/wireshark/plugins/4.4/epan
-usr/lib/wireshark/plugins/4.4/epan/ethercat.so
-usr/lib/wireshark/plugins/4.4/epan/gryphon.so
-usr/lib/wireshark/plugins/4.4/epan/ipaddr.so
-usr/lib/wireshark/plugins/4.4/epan/irda.so
-usr/lib/wireshark/plugins/4.4/epan/mate.so
-usr/lib/wireshark/plugins/4.4/epan/opcua.so
-usr/lib/wireshark/plugins/4.4/epan/profinet.so
-usr/lib/wireshark/plugins/4.4/epan/stats_tree.so
-usr/lib/wireshark/plugins/4.4/epan/transum.so
-usr/lib/wireshark/plugins/4.4/epan/unistim.so
-usr/lib/wireshark/plugins/4.4/epan/wimax.so
-usr/lib/wireshark/plugins/4.4/epan/wimaxasncp.so
-usr/lib/wireshark/plugins/4.4/epan/wimaxmacphy.so
-usr/lib/wireshark/plugins/4.4/wiretap
-usr/lib/wireshark/plugins/4.4/wiretap/usbdump.so
+usr/lib/wireshark/plugins/4.6
+usr/lib/wireshark/plugins/4.6/codecs
+usr/lib/wireshark/plugins/4.6/codecs/g711.so
+usr/lib/wireshark/plugins/4.6/codecs/l16mono.so
+usr/lib/wireshark/plugins/4.6/codecs/opus_dec.so
+usr/lib/wireshark/plugins/4.6/epan
+usr/lib/wireshark/plugins/4.6/epan/ethercat.so
+usr/lib/wireshark/plugins/4.6/epan/gryphon.so
+usr/lib/wireshark/plugins/4.6/epan/ipaddr.so
+usr/lib/wireshark/plugins/4.6/epan/irda.so
+usr/lib/wireshark/plugins/4.6/epan/mate.so
+usr/lib/wireshark/plugins/4.6/epan/opcua.so
+usr/lib/wireshark/plugins/4.6/epan/profinet.so
+usr/lib/wireshark/plugins/4.6/epan/stats_tree.so
+usr/lib/wireshark/plugins/4.6/epan/transum.so
+usr/lib/wireshark/plugins/4.6/epan/unistim.so
+usr/lib/wireshark/plugins/4.6/epan/wimax.so
+usr/lib/wireshark/plugins/4.6/epan/wimaxasncp.so
+usr/lib/wireshark/plugins/4.6/epan/wimaxmacphy.so
+usr/lib/wireshark/plugins/4.6/wiretap
+usr/lib/wireshark/plugins/4.6/wiretap/usbdump.so
+usr/libexec/wireshark
+usr/libexec/wireshark/extcap
+usr/libexec/wireshark/extcap/androiddump
+usr/libexec/wireshark/extcap/ciscodump
+usr/libexec/wireshark/extcap/dpauxmon
+usr/libexec/wireshark/extcap/randpktdump
+usr/libexec/wireshark/extcap/sshdump
+usr/libexec/wireshark/extcap/udpdump
+usr/libexec/wireshark/extcap/wifidump
#usr/share/doc/wireshark
#usr/share/doc/wireshark/COPYING
#usr/share/doc/wireshark/README.xml-output
+#usr/share/doc/wireshark/Stratoshark Release Notes.html
+#usr/share/doc/wireshark/Wireshark Release Notes.html
#usr/share/doc/wireshark/androiddump.html
#usr/share/doc/wireshark/capinfos.html
#usr/share/doc/wireshark/captype.html
@@ -68,9 +70,11 @@ usr/lib/wireshark/plugins/4.4/wiretap/usbdump.so
#usr/share/doc/wireshark/randpkt.html
#usr/share/doc/wireshark/randpktdump.html
#usr/share/doc/wireshark/rawshark.html
-#usr/share/doc/wireshark/release-notes.html
#usr/share/doc/wireshark/reordercap.html
+#usr/share/doc/wireshark/sshdig.html
#usr/share/doc/wireshark/sshdump.html
+#usr/share/doc/wireshark/strato.html
+#usr/share/doc/wireshark/stratoshark.html
#usr/share/doc/wireshark/text2pcap.html
#usr/share/doc/wireshark/tshark.html
#usr/share/doc/wireshark/udpdump.html
@@ -92,7 +96,10 @@ usr/lib/wireshark/plugins/4.4/wiretap/usbdump.so
#usr/share/man/man1/randpktdump.1
#usr/share/man/man1/rawshark.1
#usr/share/man/man1/reordercap.1
+#usr/share/man/man1/sshdig.1
#usr/share/man/man1/sshdump.1
+#usr/share/man/man1/strato.1
+#usr/share/man/man1/stratoshark.1
#usr/share/man/man1/text2pcap.1
#usr/share/man/man1/tshark.1
#usr/share/man/man1/udpdump.1
@@ -108,7 +115,6 @@ usr/share/wireshark/dfilters
usr/share/wireshark/diameter/AlcatelLucent.xml
usr/share/wireshark/diameter/Cisco.xml
usr/share/wireshark/diameter/CiscoSystems.xml
-usr/share/wireshark/diameter/Custom.xml
usr/share/wireshark/diameter/Ericsson.xml
usr/share/wireshark/diameter/HP.xml
usr/share/wireshark/diameter/Huawei.xml
@@ -129,6 +135,7 @@ usr/share/wireshark/diameter/VerizonWireless.xml
usr/share/wireshark/diameter/Vodafone.xml
usr/share/wireshark/diameter/chargecontrol.xml
usr/share/wireshark/diameter/dictionary.dtd
+usr/share/wireshark/diameter/dictionary.ent
usr/share/wireshark/diameter/dictionary.xml
usr/share/wireshark/diameter/eap.xml
usr/share/wireshark/diameter/etsie2e4.xml
@@ -193,6 +200,7 @@ usr/share/wireshark/radius/dictionary.arista
usr/share/wireshark/radius/dictionary.aruba
usr/share/wireshark/radius/dictionary.ascend
usr/share/wireshark/radius/dictionary.ascend.illegal
+usr/share/wireshark/radius/dictionary.ascend.illegal.extended
usr/share/wireshark/radius/dictionary.asn
usr/share/wireshark/radius/dictionary.audiocodes
usr/share/wireshark/radius/dictionary.avaya
@@ -270,6 +278,7 @@ usr/share/wireshark/radius/dictionary.iea
usr/share/wireshark/radius/dictionary.infinera
usr/share/wireshark/radius/dictionary.infoblox
usr/share/wireshark/radius/dictionary.infonet
+usr/share/wireshark/radius/dictionary.ingate
usr/share/wireshark/radius/dictionary.ipunplugged
usr/share/wireshark/radius/dictionary.issanni
usr/share/wireshark/radius/dictionary.itk
diff --git a/lfs/tshark b/lfs/tshark
index 6f88045c6..5760f94eb 100644
--- a/lfs/tshark
+++ b/lfs/tshark
@@ -26,7 +26,7 @@ include Config
SUMMARY = A Network Traffic Analyser
-VER = 4.4.9
+VER = 4.6.0
THISAPP = wireshark-$(VER)
DL_FILE = $(THISAPP).tar.xz
@@ -35,7 +35,7 @@ DIR_APP = $(DIR_SRC)/$(THISAPP)
TARGET = $(DIR_INFO)/$(THISAPP)
PROG = tshark
DEPS = c-ares
-PAK_VER = 27
+PAK_VER = 28
SERVICES =
@@ -47,7 +47,7 @@ objects = $(DL_FILE)
$(DL_FILE) = $(DL_FROM)/$(DL_FILE)
-$(DL_FILE)_BLAKE2 =
e3a9b959087f720d6ea76205d5a3fc69227a484998ce964ce3c0ecfd0dfb974b7035f7f026830e08c5bed38051a3c977717d3dffcdc2169d5bcaf6022f19e9de
+$(DL_FILE)_BLAKE2 =
df4245158422dae95bb6a68d8093cf5d1456290f25a8b8f664e6f9bf7f70661fc881e100c48c616ca077621dbb0ff55a5b14c1e385e8b6d52a7dc2d7fd1acd0a
install : $(TARGET)
--
2.51.0