On Thu, 12 Dec 2019 at 16:57, Jim LeJeune <jlejeune...@gmail.com> wrote:

> Every time I go to your download page, I get a 404!!!
>
>
That seems to be because the link on the body of the message is:

  Wireshark source code and installation packages are available from
  https://www.wireshark.org/download.html[3].

Note that the link inadvertently includes the "[3]" which is meant to be a
separate link to the item in the footnotes, which is a good link:

     3. https://www.wireshark.org/download.html

So a slight issue with the message generation for all the footnote
references.



> On Wed, Dec 11, 2019 at 4:09 PM Wireshark announcements <
> wireshark-annou...@wireshark.org> wrote:
>
>> I'm proud to announce the release of Wireshark 3.2.0rc2.
>>
>>
>>  This is the second release candidate for Wireshark 3.2.
>>
>>  What is Wireshark?
>>
>>   Wireshark is the world’s most popular network protocol analyzer. It is
>>   used for troubleshooting, analysis, development and education.
>>
>>  What’s New
>>
>>   This is the last release branch with official support for Windows 7
>>   and Windows Server 2008 R2.
>>
>>   Many improvements have been made. See the “New and Updated Features”
>>   section below for more details.
>>
>>   New and Updated Features
>>
>>    The following features are new (or have been significantly updated)
>>    since version 3.2.0rc1:
>>
>>      • Nothing of note.
>>
>>    The following features are new (or have been significantly updated)
>>    since version 3.1.1:
>>
>>      • Miscellaneous UI fixes and updates.
>>
>>      • The macOS installer now ships with Qt 5.12.6. It previously
>>        shipped with Qt 5.12.5.
>>
>>    The following features are new (or have been significantly updated)
>>    since version 3.1.0:
>>
>>      • Automatic updates are supported on macOS.
>>
>>      • You can now select multiple packets in the packet list at the
>>        same time
>>
>>      • They can be exported as Text by “Ctrl+C” or “Cmd+C” and the
>>        corresponding menu in “Edit › Copy › As …”
>>
>>      • They can be marked/unmarked or ignored/unignored at the same time
>>
>>      • They can be exported and printed using the corresponding menu
>>        entries “File › Export Specified Packets”, “File › Export Packet
>>        Dissections” and “File › Print”
>>
>>    You can now follow HTTP/2 and QUIC streams.
>>
>>    You can once again mark and unmark packets using the middle mouse
>>    button. This feature went missing around 2009 or so.
>>
>>    The Windows packages are now built using Microsoft Visual Studio
>>    2019.
>>
>>    IOGraph automatically adds a graph for the selected display filter if
>>    no previous graph exists
>>
>>    Action buttons for the display filter bar may be aligned left via the
>>    context menu
>>
>>      • The "Expression…" toolbar entry has been moved to "Analyze ›
>>        Display filter Expression …" as well as to the context menu of
>>        the display filter toolbar
>>
>>    Allow extcaps to be loaded from the personal configuration directory
>>
>>    The Wireshark 3.1.0 Windows installers ship with Qt 5.12.6. Previous
>>    installers shipped with Qt 5.12.4.
>>
>>    The following features are new (or have been significantly updated)
>>    since version 3.0.0:
>>
>>      • You can drag and drop a field to a column header to create a
>>        column for that field, or to the display filter input to create a
>>        display filter. If a display filter is applied, the new filter
>>        can be added using the same rules as “Apply Filter”
>>
>>      • You can drag and drop a column entry to the display filter to
>>        create a filter for it.
>>
>>      • You can import profiles from a .zip archive or an existing
>>        directory.
>>
>>      • Dark mode support on macOS and dark theme support on other
>>        platforms has been improved.
>>
>>      • Brotli decompression support in HTTP/HTTP2 (requires the brotli
>>        library).
>>
>>      • The build system now checks for a SpeexDSP system library
>>        installation. The bundled Speex resampler code is still provided
>>        as a fallback.
>>
>>      • WireGuard decryption can now be enabled through keys embedded in
>>        a pcapng in addition to the existing key log preference (Bug
>>        15571[1]).
>>
>>      • A new tap for extracting credentials from the capture file has
>>        been added. It can be accessed through the -z credentials option
>>        in tshark or from the “Tools › Credentials” menu in Wireshark.
>>
>>      • Editcap can now split files on floating point intervals.
>>
>>      • Windows .msi packages are now signed using SHA-2[2]. .exe
>>        installers are still dual-signed using SHA-1 and SHA-2.
>>
>>      • The “Enabled Protocols” Dialog now only enables, disables and
>>        inverts protocols based on the set filter selection. The protocol
>>        type (standard or heuristic) may also be choosen as a filter
>>        value.
>>
>>      • Save RTP stream to .au supports any codec with 8000 Hz rate
>>        supported by Wireshark (shown in RTP player). If save of audio is
>>        not possible (unsupported codec or rate), silence of same length
>>        is saved and warning is shown.
>>
>>      • The “Analyze › Apply as Filter” and “Analyze › Prepare a Filter”
>>        packet list and detail popup menus now show a preview of their
>>        respective filters.
>>
>>      • Protobuf files (*.proto) can now be configured to enable more
>>        precise parsing of serialized Protobuf data (such as gRPC).
>>
>>      • HTTP2 support streaming mode reassembly. To use this feature,
>>        subdissectors can register itself to "streaming_content_type"
>>        dissector table and return pinfo→desegment_len and
>>        pinfo→desegment_offset to tell HTTP2 when to start and how many
>>        additional bytes requires when next called.
>>
>>      • The message of stream gRPC method can now be parsed with
>>        supporting of HTTP2 streaming mode reassembly feature.
>>
>>      • The Wireshark 3.1.0 Windows installers ship with Qt 5.12.4.
>>        Previous installers shipped with Qt 5.12.1.
>>
>>   New Protocol Support
>>
>>    3GPP BICC MST (BICC-MST), 3GPP log packet (LOG3GPP), 3GPP/GSM Cell
>>    Broadcast Service Protocol (cbsp), Asynchronous Management Protocol
>>    (AMP), Bluetooth Mesh Beacon, Bluetooth Mesh PB-ADV, Bluetooth Mesh
>>    Provisioning PDU, Bluetooth Mesh Proxy, CableLabs Layer-3 Protocol
>>    IEEE EtherType 0xb4e3 (CL3), DCOM IProvideClassInfo, DCOM ITypeInfo,
>>    Diagnostic Log and Trace (DLT), Distributed Replicated Block Device
>>    (DRBD), Dual Channel Wi-Fi (CL3DCW), EBHSCR Protocol (EBHSCR), EERO
>>    Protocol (EERO), evolved Common Public Radio Interface (eCPRI), File
>>    Server Remote VSS Protocol (FSRVP), FTDI FT USB Bridging Devices
>>    (FTDI FT), Graylog Extended Log Format over UDP (GELF), GSM/3GPP CBSP
>>    (Cell Broadcast Service Protocol), ITS message - CAMv1, ITS message -
>>    DENMv1, Linux net_dm (network drop monitor) protocol, MIDI System
>>    Exclusive DigiTech (SYSEX DigiTech), Network Controller Sideband
>>    Interface (NCSI), NR Positioning Protocol A (NRPPa) TS 38.455, NVM
>>    Express over Fabrics for TCP (nvme-tcp), OsmoTRX Protocol (GSM
>>    Transceiver control and data), Scalable service-Oriented MiddlewarE
>>    over IP (SOME/IP), USB 2.0 Link Layer (USBLL), and Wi-Fi Neighbour
>>    Awareness Networking (NAN)
>>
>>   Updated Protocol Support
>>
>>    Too many protocols have been updated to list here.
>>
>>   New and Updated Capture File Support
>>
>>    3gpp phone, Android Logcat Text, Ascend, Busmaster log file, Candump,
>>    Endace ERF, NetScaler, pcapng, and Savvius *Peek
>>
>>  Getting Wireshark
>>
>>   Wireshark source code and installation packages are available from
>>   https://www.wireshark.org/download.html[3].
>>
>>   Vendor-supplied Packages
>>
>>    Most Linux and Unix vendors supply their own Wireshark packages. You
>>    can usually install or upgrade Wireshark using the package management
>>    system specific to that platform. A list of third-party packages can
>>    be found on the download page[4] on the Wireshark web site.
>>
>>  File Locations
>>
>>   Wireshark and TShark look in several different locations for
>>   preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
>>   locations vary from platform to platform. You can use About→Folders to
>>   find the default locations on your system.
>>
>>  Getting Help
>>
>>   The User’s Guide, manual pages and various other documentation can be
>>   found at https://www.wireshark.org/docs/[5]
>>
>>   Community support is available on Wireshark’s Q&A site[6] and on the
>>   wireshark-users mailing list. Subscription information and archives
>>   for all of Wireshark’s mailing lists can be found on the web site[7].
>>
>>   Bugs and feature requests can be reported on the bug tracker[8].
>>
>>   Official Wireshark training and certification are available from
>>   Wireshark University[9].
>>
>>  Frequently Asked Questions
>>
>>   A complete FAQ is available on the Wireshark web site[10].
>>
>>   Last updated 2019-12-11 20:23:10 UTC
>>
>>  References
>>
>>    1. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15571
>>    2. https://support.microsoft.com/en-us/help/4472027/2019-sha-2-code-s
>>   igning-support-requirement-for-windows-and-wsus
>>    3. https://www.wireshark.org/download.html
>>    4. https://www.wireshark.org/download.html#thirdparty
>>    5. https://www.wireshark.org/docs/
>>    6. https://ask.wireshark.org/
>>    7. https://www.wireshark.org/lists/
>>    8. https://bugs.wireshark.org/
>>    9. https://www.wiresharktraining.com/
>>   10. https://www.wireshark.org/faq.html
>>
>>
>> Digests
>>
>> wireshark-3.2.0rc2.tar.xz: 31454312 bytes
>>
>> SHA256(wireshark-3.2.0rc2.tar.xz)=fc9f39da16a5708dff76bd0df78b244699f4a1f4a13ceb75777000e87ee57e46
>>
>> RIPEMD160(wireshark-3.2.0rc2.tar.xz)=cba58cfb02de7abb7d2b6067a83a590e1431b7f0
>> SHA1(wireshark-3.2.0rc2.tar.xz)=cfd217336c613ef3376588da412ecc6acfca164e
>>
>> Wireshark-win64-3.2.0rc2.exe: 69031872 bytes
>>
>> SHA256(Wireshark-win64-3.2.0rc2.exe)=cf41ea689f9cbb9cf66166e5a2287aafef56d0161be642834f44620365ed085e
>>
>> RIPEMD160(Wireshark-win64-3.2.0rc2.exe)=7498d1115e1a8a08559f8d7d6f0d623a932fc1bb
>>
>> SHA1(Wireshark-win64-3.2.0rc2.exe)=5eced01a12390b58bfb8bf85203f4629bab6be36
>>
>> Wireshark-win32-3.2.0rc2.exe: 63814144 bytes
>>
>> SHA256(Wireshark-win32-3.2.0rc2.exe)=7f979ce1f05823e1068bfd7ccc7deba9b65ad46b774a875b0e7f25b3a19c0169
>>
>> RIPEMD160(Wireshark-win32-3.2.0rc2.exe)=006de7e13a3a3e534eda51965a851b50785e0ca4
>>
>> SHA1(Wireshark-win32-3.2.0rc2.exe)=871c2e68d3df493a160cc1d1b807b07c6cb32976
>>
>> Wireshark-win64-3.2.0rc2.msi: 48218112 bytes
>>
>> SHA256(Wireshark-win64-3.2.0rc2.msi)=dd35ad5470ef9fb233e9fefb5d9ea55e366052f9a0a7c8a8668183f1a2184a63
>>
>> RIPEMD160(Wireshark-win64-3.2.0rc2.msi)=31743d6db25058c09bd1fd4ae4726d417cea0396
>>
>> SHA1(Wireshark-win64-3.2.0rc2.msi)=b72870a936935c70fe7558cf7abeaec09ce21ba1
>>
>> Wireshark-win32-3.2.0rc2.msi: 42913792 bytes
>>
>> SHA256(Wireshark-win32-3.2.0rc2.msi)=87395c9aa1e16d45ec3af7e2f8e98f5ec91ce834f0d489a66f6656f0b4783a2f
>>
>> RIPEMD160(Wireshark-win32-3.2.0rc2.msi)=d37f21ee7d4e26112885ba5522921f2a3b4d12c8
>>
>> SHA1(Wireshark-win32-3.2.0rc2.msi)=99999020c98b619ada0a10f77dfbac18a23ebc64
>>
>> WiresharkPortable_3.2.0rc2.paf.exe: 36514584 bytes
>>
>> SHA256(WiresharkPortable_3.2.0rc2.paf.exe)=682432a14b3630a08516a3c9a2363dd605355324003247cfe71f859365797b64
>>
>> RIPEMD160(WiresharkPortable_3.2.0rc2.paf.exe)=4bf7bfc8150cc3168a5a4d37ba10e34b4faa7328
>>
>> SHA1(WiresharkPortable_3.2.0rc2.paf.exe)=c1946d592ddb6af2ec86f321ff3a834d5d538eea
>>
>> Wireshark 3.2.0rc2 Intel 64.dmg: 96363813 bytes
>> SHA256(Wireshark 3.2.0rc2 Intel
>> 64.dmg)=f3aa6aea51b85a73f0c240a6cc5eeb542038b09b24a8c7dad6b8a2b419190985
>> RIPEMD160(Wireshark 3.2.0rc2 Intel
>> 64.dmg)=c664eccdef2c9185e4857bb55e24431559859775
>> SHA1(Wireshark 3.2.0rc2 Intel
>> 64.dmg)=edab72aba192df513bfcfa8db616ba779fdf3621
>>
>> You can validate these hashes using the following commands (among others):
>>
>>     Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
>>     Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
>>     macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg"
>>     Other: openssl sha256 wireshark-x.y.z.tar.xz
>>
>>
-- 
Graham Bloice
___________________________________________________________________________
Sent via:    Wireshark-users mailing list <wireshark-users@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-users
             mailto:wireshark-users-requ...@wireshark.org?subject=unsubscribe

Reply via email to