I'm proud to announce the release of Wireshark 2.9.0.

 This is an experimental release intended to test new features for
 Wireshark 3.0.

 What is Wireshark?

  Wireshark is the world’s most popular network protocol analyzer. It is
  used for troubleshooting, analysis, development and education.

 What’s New

  Many user interface improvements have been made. See the “New and
  Updated Features” section below for more details.

  Bug Fixes

   The following bugs have been fixed:

   Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419[1])

  New and Updated Features

   The following features are new (or have been significantly updated)
   since version 2.6.0:

     • The Windows .exe installers now ship with Npcap instead of

     • Conversation timestamps are supported for UDP/UDP-Lite protocols

     • TShark now supports the -G elastic-mapping option which generates
       an ElasticSearch mapping file.

     • The “Capture Information” dialog has been added back (Bug

     • The Ethernet and IEEE 802.11 dissectors no longer validate the
       frame check sequence (checksum) by default.

     • The TCP dissector gained a new “Reassemble out-of-order segments”
       preference to fix dissection and decryption issues in case TCP
       segments are received out-of-order. See the User’s Guide, chapter
       TCP Reassembly for details.

     • Decryption support for the new WireGuard dissector (Bug 15011[3],
       requires Libgcrypt 1.8).

     • The BOOTP dissector has been renamed to DHCP. With the exception
       of “bootp.dhcp”, the old “bootp.*” display filter fields are
       still supported but may be removed in a future release.

     • The SSL dissector has been renamed to TLS. As with BOOTP the old
       “ssl.*” display filter fields are supported but may be removed in
       a future release.

     • Coloring rules, IO graphs, Filter Buttons and protocol preference
       tables can now be copied from other profiles using a button in
       the corresponding configuration dialogs.

     • APT-X has been renamed to aptX.

     • When importing from hex dump, it’s now possible to add an
       ExportPDU header with a payload name. This calls the specific
       dissector directly without lower protocols.

     • The sshdump and ciscodump extcap interfaces can now use a proxy
       for the SSH connection.

     • Dumpcap now supports the -a packets:NUM and -b packets:NUM

     • Wireshark now includes a “No Reassembly” configuration profile.

     • Wireshark now supports the Russian language.

     • The build system now supports AppImage packages.

     • The Windows installers now ship with Qt 5.12.0. Previously they
       shipped with Qt 5.9.7.

  Removed Features and Support

     • The legacy (GTK+) user interface has been removed and is no
       longer supported.

     • Wireshark requires Qt 5.2 or later. Qt 4 is no longer supported.

     • Wireshark requires GLib 2.32 or later.

     • Building Wireshark requires CMake. Autotools is no longer

     • TShark’s -z compare option was removed.

  New File Format Decoding Support

   Ruby Marshal format

  New Protocol Support

   Apple Wireless Direct Link (AWDL), BLIP Couchbase Mobile (BLIP), CDMA
   2000, Cisco Meraki Discovery Protocol (MDP), Distributed Ruby (DRb),
   DXL, E1AP (5G), EVS (3GPP TS 26.445 A.2 EVS RTP), Exablaze trailers,
   General Circuit Services Notification Application Protocol (GCSNA),
   GLOW Lawo Emberplus Data format, GSM-R (User-to-User Information
   Element usage), HI3CCLinkData, ISO 13400-2 Diagnostic communication
   over Internet Protocol (DoIP), ITU-t X.696 Octet Encoding Rules
   (OER), Local Number Portability Database Query Protocol (ANSI),
   MsgPack, NGAP (5G), NR (5G) PDCP, Osmocom Generic Subscriber Update
   Protocol (GSUP), PKCS#10 (RFC2986 Certification Request Syntax),
   PROXY (v2), S101 Lawo Emberplus transport frame, Secure Reliable
   Transport Protocol (SRT), Spirent Test Center Signature decoding for
   Ethernet and FibreChannel (STCSIG, disabled by default),
   Sybase-specific portions of TDS, systemd Journal Export, TeamSpeak 3
   DNS, TPM 2.0, Ubiquiti Discovery Protocol (UBDP), WireGuard, and XnAP

  Updated Protocol Support

   Too many protocols have been updated to list here.

  New and Updated Capture File Support

   RFC 7468 (PEM), Ruby marshal object files, systemd Journal Export,
   and Unigraf DPA-400 DisplayPort AUX channel monitor

  New and Updated Capture Interfaces support

   dpauxmon, an external capture interface (extcap) that captures
   DisplayPort AUX channel data from linux kernel drivers.

   sdjournal, an extcap that captures systemd journal entries.

  Major API Changes

     • Lua: the various logging functions (debug, info, message, warn
       and critical) have been removed. Use the print function instead
       for debugging purposes.

 Getting Wireshark

  Wireshark source code and installation packages are available from

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can
   be found on the download page[5] on the Wireshark web site.

 File Locations

  Wireshark and TShark look in several different locations for
  preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
  locations vary from platform to platform. You can use About→Folders to
  find the default locations on your system.

 Getting Help

  The User’s Guide, manual pages and various other documentation can be
  found at https://www.wireshark.org/docs/[6]

  Community support is available on Wireshark’s Q&A site[7] and on the
  wireshark-users mailing list. Subscription information and archives
  for all of Wireshark’s mailing lists can be found on the web site[8].

  Bugs and feature requests can be reported on the bug tracker[9].

  Official Wireshark training and certification are available from
  Wireshark University[10].

 Frequently Asked Questions

  A complete FAQ is available on the Wireshark web site[11].

  Last updated 2018-12-12 23:05:55 UTC


   1. 1
   2. 2
   3. 3
   4. 4
   5. 5
   6. 6
   7. 7
   8. 8
   9. 9
  10. 10
  11. 11


wireshark-2.9.0.tar.xz: 29438416 bytes

Wireshark-win64-2.9.0.exe: 57572488 bytes

Wireshark-win32-2.9.0.exe: 52338360 bytes

Wireshark-win64-2.9.0.msi: 46362624 bytes

Wireshark-win32-2.9.0.msi: 41279488 bytes

WiresharkPortable_2.9.0.paf.exe: 35237664 bytes

Wireshark 2.9.0 Intel 64.dmg: 177641795 bytes
SHA256(Wireshark 2.9.0 Intel
RIPEMD160(Wireshark 2.9.0 Intel
SHA1(Wireshark 2.9.0 Intel 64.dmg)=2abe373f2bdbdf17869589ed2dcab5140e8c3635

You can validate these hashes using the following commands (among others):

    Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
    Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
    macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg"
    Other: openssl sha256 wireshark-x.y.z.tar.xz

Attachment: signature.asc
Description: OpenPGP digital signature

Sent via:    Wireshark-announce mailing list <wireshark-announce@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-announce
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-announce

Reply via email to