Software-update: Wireshark 3.6.0

Wireshark logo (79 pix) Versie 3.6.0 van de opensource-protocol-analyzer en -packetsniffer Wireshark is uitgekomen, een ontwikkelversie. Met dit programma kunnen verschillende datapakketten en netwerkprotocollen op het netwerk worden geanalyseerd. Ook kan het programma eerder opgeslagen dataverkeer als invoer gebruiken. Wireshark is geschikt voor Windows, Linux en macOS, met aparte downloads voor 32bit- en 64bit-uitvoeringen van de besturingssystemen. De changelog voor deze uitgave laat de volgende veranderingen en verbeteringen zien:

New and Updated Features
  • The macOS Intel packages now ship with Qt 5.15.3 and require macOS 10.13 or later.
  • Display filter set elements must now be comma-separated. See below for more details.
  • The display filter expression “a != b” now has the same meaning as “!(a == b)”.
  • Several changes have been made to the display filter syntax:
    • The expression “a != b” now always has the same meaning as “!(a == b)”. In particular this means filter expressions with multi-value fields like “ip.addr !=” will work as expected (the result is the same as typing “ip.src != and ip.dst !=”). This avoids the contradiction (a == b and a != b) being true.
    • It is possible to use the syntax “a ~= b” or “a any_ne b” to recover the previous (inconsistent with "==") logic for not equal.
    • Literal strings can now be specified using raw string syntax, identical to raw strings in the Python programming language. This can be used to avoid the complexity of using two levels of character escapes with regular expressions.
    • Set elements must now be separated using a comma. A filter such as http.request.method in {"GET" "HEAD"} must be written as …​ in {"GET", "HEAD"}. Whitespace is not significant. The previous use of whitespace as separator is deprecated and will be removed in a future version.
    • Support for the syntax "a not in b" with the same meaning as "not a in b" has been added.
  • Packaging updates:
    • A macOS Arm 64 (Apple Silicon) package is now available.
    • The macOS Intel packages now ship with Qt 5.15.3 and require macOS 10.13 or later.
    • The Windows installers now ship with Npcap 1.55.
    • A 64-bit Windows PortableApps package is now available.
  • TCP conversations now support a completeness criteria, which facilitates the identification of TCP streams having any of opening or closing handshakes, a payload, in any combination. It can be accessed with the new tcp.completeness filter.
  • Protobuf fields that are not serialized on the wire or otherwise missing in capture files can now be displayed with default values by setting the new “add_default_value” preference. The default values might be explicitly declared in “proto2” files, or false for bools, first value for enums, zero for numeric types.
  • Wireshark now supports reading Event Tracing for Windows (ETW). A new extcap named ETW reader is created that now can open an etl file, convert all events in the file to DLT_ETW packets and write to a specified FIFO destination. Also, a new packet_etw dissector is created to dissect DLT_ETW packets so Wireshark can display the DLT_ETW packet header, its message and packet_etw dissector calls packet_mbim sub_dissector if its provider matches the MBIM provider GUID.
  • “Follow DCCP stream” feature to filter for and extract the contents of DCCP streams.
  • Wireshark now supports dissecting RTP packets with OPUS payloads.
  • Importing captures from text files based on regular expressions is now possible. By specifying a regex capturing a single packet including capturing groups for relevant fields a textfile can be converted to a libpcap capture file. Supported data encodings are plain-hexadecimal, -octal, -binary and base64. Also the timestamp format now allows the second-fractions to be placed anywhere in the timestamp and it will be stored with nanosecond instead of microsecond precision.
  • The RTP Player has been significatnly redesigned and improved. See Playing VoIP Calls and RTP Player Window in the User’s Guide for more details.
    • The RTP Player can play many streams in row.
    • The UI is more responsive.
    • The RTP Player maintains playlist and other tools can add and remove streams to and from it.
    • Every stream can be muted or routed to the left or right channel for replay.
    • The option to save audio has been moved from the RTP Analysis dialog to the RTP Player. The RTP Player also saves what was played, and it can save in multichannel .au or .wav.
    • The RTP Player is now accessible from the Telephony › RTP › RTP Player menu.
  • The VoIP dialogs (VoIP Calls, RTP Streams, RTP Analysis, RTP Player, SIP Flows) are non-modal and can stay opened on background.
    • The same tools are provided across all dialogs (Prepare Filter, Analyse, RTP Player …​)
  • The “Follow Stream” dialog is now able to follow SIP calls based on their Call-ID value.
  • The “Follow Stream” dialog’s YAML output format has been updated to add timestamps and peers information For more details see Following Protocol Streams in the User’s Guide.
  • IP fragments between public IPv4 addresses are now reassembled even if they have different VLAN IDs. Reassembly of IP fragments where one endpoint is a private (RFC 1918 section 3) or link-local (RFC 3927) IPv4 address continues to take the VLAN ID into account, as those addresses can be reused. To revert to the previous behavior and not reassemble fragments with different VLAN IDs, turn on the “Enable stricter conversation tracking heuristics” top level protocol preference.
  • USB Link Layer reassembly has been added, which allows hardware captures to be analyzed at the same level as software captures.
  • TShark can now export TLS session keys with the --export-tls-session-keys option.
  • Wireshark participated in the Google Season of Docs 2020 and the User’s Guide has been extensively updated.
  • The “RTP Stream Analysis” dialog CSV export format was slightly changed. The first line of the export contains column titles as in other CSV exports.
  • Wireshark now supports the Turkish language.
  • The settings in the “Import from Hex Dump” dialog is now stored in a profile import_hexdump.json file.
  • Analyze › Reload Lua Plugins has been improved to properly support FileHandler.
  • The “RTP Stream Analysis” and “IAX2 Stream Analysis” dialogs now show correct calculation mean jitter calculations.
  • RTP streams are now created based on Skinny protocol messages in addition to other types of messages.
  • The “VoIP Calls Flow Sequence” window shows more information about various Skinny messages.
  • Initial support for building Wireshark on Windows using GCC and MinGW-w64 has been added. See README.msys2 in the sources for more information.
New File Format Decoding Support
  • Vector Informatik Binary Log File (BLF)
New Protocol Support
  • 5G Lawful Interception (5GLI)
  • Bluetooth Link Manager Protocol (BT LMP)
  • Bundle Protocol version 7 (BPv7)
  • Bundle Protocol version 7 Security (BPSec)
  • CBOR Object Signing and Encryption (COSE)
  • E2 Application Protocol (E2AP)
  • Event Tracing for Windows (ETW)
  • EXtreme extra Eth Header (EXEH)
  • High-Performance Connectivity Tracer (HiPerConTracer)
  • ISO 10681
  • Kerberos SPAKE
  • Linux psample protocol
  • Local Interconnect Network (LIN)
  • Microsoft Task Scheduler Service
  • O-RAN E2AP
  • O-RAN fronthaul UC-plane (O-RAN)
  • Opus Interactive Audio Codec (OPUS)
  • PDU Transport Protocol
  • R09.x (R09)
  • RDP Dynamic Channel Protocol (DRDYNVC)
  • RDP Graphic pipeline channel Protocol (EGFX)
  • RDP Multi-transport (RDPMT)
  • Real-Time Publish-Subscribe Virtual Transport (RTPS-VT)
  • Real-Time Publish-Subscribe Wire Protocol (processed) (RTPS-PROC)
  • Shared Memory Communications (SMC)
  • Signal PDU
  • SparkplugB
  • State Synchronization Protocol (SSyncP)
  • Tagged Image File Format (TIFF)
  • TP-Link Smart Home Protocol
  • UDP Remote Desktop Protocol (RDPUDP)
  • Van Jacobson PPP compression (VJC)
  • World of Warcraft World (WOWW)
  • X2 xIRI payload (xIRI)
Updated Protocol Support
  • Too many protocols have been updated to list here.

De volgende downloads zijn beschikbaar:
*Wireshark 3.6.0 voor Windows (32bit)
*Wireshark 3.6.0 voor Windows (64bit)
*Wireshark 3.6.0 voor PortableApps
*Wireshark 3.6.0 voor macOS 10.12 en hoger (64bit)
*Wireshark 3.6.0 broncode voor onder andere Linux, Solaris en *BSD

Wireshark 3.6.0

Versienummer 3.6.0
Releasestatus Final
Besturingssystemen Windows 7, Linux, BSD, macOS, Windows Server 2012, Windows 8, Windows 10, Windows Server 2016, Windows Server 2019, Windows 11
Website Wireshark Foundation
Bestandsgrootte 73,69MB
Licentietype Voorwaarden (GNU/BSD/etc.)

Door Bart van Klaveren

Downloads en Best Buy Guide

23-11-2021 • 19:01

3 Linkedin

Bron: Wireshark Foundation


Reacties (3)

Wijzig sortering
Major updates to Apple Arm 64 Silicon update & The 64-bit Windows PortableApps installers, both vendors in one go.

And an interesting New File Format for Decoding Support: Vector Informatik Binary Log File (BLF) while supporting plenty new Protocols.

Had wel versie Wireshark 4, opensource-protocol-analyzer en -packetsniffer Wireshark, kunnen heetten.

[Reactie gewijzigd door Bulkzooi op 24 november 2021 01:38]

Na het installeren van deze update (en update npcap) heeft Bitdefender 20 applicaties geblokkeerd en verwijderd van mijn systeem ivm malware. o.a. conhost.exe en powershell.exe zijn ook verwijderd. Was/is de server wellicht geïnfecteerd? Of komt het door de update van npcap dat Bitdefender van slag is geraakt?
Versie 3.6.0 is volgens mij geen ontwikkelversie; dat was versie 3.5.0.
Waarschijnlijk een copy / paste foutje?

Op dit item kan niet meer gereageerd worden.

Tweakers maakt gebruik van cookies

Tweakers plaatst functionele en analytische cookies voor het functioneren van de website en het verbeteren van de website-ervaring. Deze cookies zijn noodzakelijk. Om op Tweakers relevantere advertenties te tonen en om ingesloten content van derden te tonen (bijvoorbeeld video's), vragen we je toestemming. Via ingesloten content kunnen derde partijen diensten leveren en verbeteren, bezoekersstatistieken bijhouden, gepersonaliseerde content tonen, gerichte advertenties tonen en gebruikersprofielen opbouwen. Hiervoor worden apparaatgegevens, IP-adres, geolocatie en surfgedrag vastgelegd.

Meer informatie vind je in ons cookiebeleid.


Toestemming beheren

Hieronder kun je per doeleinde of partij toestemming geven of intrekken. Meer informatie vind je in ons cookiebeleid.

Functioneel en analytisch

Deze cookies zijn noodzakelijk voor het functioneren van de website en het verbeteren van de website-ervaring. Klik op het informatie-icoon voor meer informatie. Meer details


    Relevantere advertenties

    Dit beperkt het aantal keer dat dezelfde advertentie getoond wordt (frequency capping) en maakt het mogelijk om binnen Tweakers contextuele advertenties te tonen op basis van pagina's die je hebt bezocht. Meer details

    Tweakers genereert een willekeurige unieke code als identifier. Deze data wordt niet gedeeld met adverteerders of andere derde partijen en je kunt niet buiten Tweakers gevolgd worden. Indien je bent ingelogd, wordt deze identifier gekoppeld aan je account. Indien je niet bent ingelogd, wordt deze identifier gekoppeld aan je sessie die maximaal 4 maanden actief blijft. Je kunt deze toestemming te allen tijde intrekken.

    Ingesloten content van derden

    Deze cookies kunnen door derde partijen geplaatst worden via ingesloten content. Klik op het informatie-icoon voor meer informatie over de verwerkingsdoeleinden. Meer details