1 include::attributes.adoc[]
4 :copycss: {css_dir}/{stylesheet}
6 = Wireshark {wireshark-version} Release Notes
7 // Asciidoctor Syntax Quick Reference:
8 // https://asciidoctor.org/docs/asciidoc-syntax-quick-reference/
10 This is an experimental release intended to test new features for Wireshark 5.0.
14 Wireshark is the world’s most popular network protocol analyzer.
15 It is used for troubleshooting, analysis, development and education.
19 // Add a summary of **major** changes here.
20 // Add other changes to "New and Updated Features" below.
22 Many other improvements have been made.
23 See the “New and Updated Features” section below for more details.
27 //The following bugs have been fixed:
29 //* wsbuglink:6000[Wireshark bug]
30 //* cveidlink:2014-2486[]
31 //* Wireshark grabs your ID at 3 am, goes to Waffle House, and insults people.
33 === New and Updated Features
35 The following features are either new or have been significantly updated since version 4.4.0:
37 // * The Windows installers now ship with Npcap 1.79.
38 // They previously shipped with Npcap 1.78.
40 //* The Windows installers now ship with Qt 6.5.2.
41 // They previously shipped with Qt 6.2.3.
43 * The default format for absolute times when output with -T fields, -T json,
44 and the "show" field of -T pdml, or when in custom columns (including CSV
45 output of columns) has been changed to ISO 8601. (This was already the case
46 for -T ek.) For backwards compatibility, a preference has been added,
47 protocols.display_abs_time_ascii. This can be set to continue to format
48 times in a manner similar to asctime. (E.g., Dec 18, 2017 05:28:39.071704055 EST.)
49 This preference can also be set to never use ascii time and to use ISO 8601 time
50 in the protocol tree (Packet Details) as well.
52 * The TShark `-G` option for generating glossary reports does not need to be the
53 first option given on the command line anymore. In addition, the reports now
54 are affected by other command line options such as `-o`, `-d`, and
55 `--disable-protocol`, in addition to the `-C` option, which was already supported.
56 (The `defaultprefs` report remains unaffected by any other options.)
57 As a part of this change, `-G` with no argument, which was previously deprecated,
58 is no longer supported. Use `tshark -G fields` to produce the same report.
59 Also, the syntax for only listing fields with a certain prefix has changed to
60 `tshark -G fields,prefix`.
62 * Wireshark can now decrypt NTP packets using NTS (Network Time Security). To decrypt packets,
63 the NTS-KE (Network Time Security Key Establishment Protocol) packets need to be present,
64 alongside the TLS client and exporter secrets. Additionally, the parts of a NTP packet which
65 can be cryptographically authenticated (from NTP packet header until the end of the last
66 extension field that precedes the NTS Authenticator and Encrypted Extension Fields
67 extension field) are checked for validity.
69 * Custom columns have an option to show the values using the same format as
72 * X.509 certificates, used in TLS and elsewhere, can be exported via the
73 File->Export Objects menu in Wireshark (under the name "X509AF") and
74 `--export-objects` in TShark (with the protocol name `x509af`.)
76 * Zstandard Content-Encoding is supported in the HTTP and HTTP/2 dissectors.
78 * The Windows installers now ship with Npcap 1.80.
79 They previously shipped with Npcap 1.79.
81 // === Removed Features and Support
84 // === Removed Dissectors
87 //=== New File Format Decoding Support
93 === New Protocol Support
95 // Add one protocol per line between the -- delimiters in the format
96 // “Full protocol name (Abbreviation)”
97 // git log --oneline --diff-filter=A --stat v4.3.0rc0.. epan/dissectors plugins
100 Lenbrook Service Discovery Protocol (LSDP)
101 Network Time Security Key Establishment Protocol (NTS-KE)
104 === Updated Protocol Support
106 Too many protocol updates have been made to list them all here.
108 //=== New and Updated Capture File Support
110 There is no new or updated capture file support in this release.
111 // Add one file type per line between the -- delimiters.
116 // === New and Updated Capture Interfaces support
121 //=== New and Updated Codec support
123 //_Non-empty section placeholder._
125 // === Major API Changes
130 Wireshark source code and installation packages are available from
131 https://www.wireshark.org/download.html.
133 === Vendor-supplied Packages
135 Most Linux and Unix vendors supply their own Wireshark packages.
136 You can usually install or upgrade Wireshark using the package management system specific to that platform.
137 A list of third-party packages can be found on the
138 https://www.wireshark.org/download.html[download page]
139 on the Wireshark web site.
143 Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
144 These locations vary from platform to platform.
145 You can use menu:Help[About Wireshark,Folders] or `tshark -G folders` to find the default locations on your system.
149 The User’s Guide, manual pages and various other documentation can be found at
150 https://www.wireshark.org/docs/
152 Community support is available on
153 https://ask.wireshark.org/[Wireshark’s Q&A site]
154 and on the wireshark-users mailing list.
155 Subscription information and archives for all of Wireshark’s mailing lists can be found on https://lists.wireshark.org/lists/[the mailing list site].
157 Bugs and feature requests can be reported on
158 https://gitlab.com/wireshark/wireshark/-/issues[the issue tracker].
160 You can learn protocol analysis and meet Wireshark’s developers at
161 https://sharkfest.wireshark.org[SharkFest].
163 // Official Wireshark training and certification are available from
164 // https://www.wiresharktraining.com/[Wireshark University].
168 The Wireshark Foundation helps as many people as possible understand their networks as much as possible.
169 You can find out more and donate at https://wiresharkfoundation.org[wiresharkfoundation.org].
171 == Frequently Asked Questions
173 A complete FAQ is available on the
174 https://www.wireshark.org/faq.html[Wireshark web site].