public inbox for ipfire-scm@lists.ipfire.org
 help / color / mirror / Atom feed
* [git.ipfire.org] IPFire 2.x development tree branch, next, updated. 717a29e28759062866285b451d8233959e5935f6
@ 2025-10-11 13:05 Michael Tremer
  0 siblings, 0 replies; only message in thread
From: Michael Tremer @ 2025-10-11 13:05 UTC (permalink / raw)
  To: ipfire-scm

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #1: Type: text/plain, Size: 20766 bytes --]

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "IPFire 2.x development tree".

The branch, next has been updated
       via  717a29e28759062866285b451d8233959e5935f6 (commit)
      from  682f135ffad9004011a72bd3dcdeaaeb7d8d0c57 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 717a29e28759062866285b451d8233959e5935f6
Author: Adolf Belka <adolf.belka@ipfire.org>
Date:   Fri Oct 10 17:51:54 2025 +0200

    tshark: Update to version 4.6.0
    
    - Update from ver4sion 4.4.9 to 4.6.0
    - Update of rootfile
    - Changelog
        4.6.0
    	New and Updated Features
    	   The following features are new (or have been significantly updated) since
    	    version 4.6.0rc1:
    		Wireshark can dissect process information, packet metadata, flow IDs,
    		 drop information, and other information provided by tcpdump on macOS.
    	   The following features are either new or have been significantly updated
    	    since version 4.4.0:
    		The Windows installers now ship with Npcap 1.83. They previously
    		 shipped with Npcap 1.79.
    		The Windows and macOS installers now ship with Qt 6.9.3. They
    		 previously shipped with Qt 6.5.3.
    		We now ship universal macOS installers instead of separate packages
    		 for Arm64 and Intel. Issue 17294
    		WinPcap is no longer supported. On Windows, use Npcap instead,
    		 uninstalling WinPcap if necessary. The final release of WinPcap was
    		 version 4.1.3 in 2013. It only supports up to Windows 8, which is no
    		 longer supported by Microsoft or Wireshark.
    		A new “Plots” dialog has been added, which provides scatter plots in
    		 contrast to the “I/O Graphs” dialog, which provides histograms. The
    		 Plots dialog window supports multiple plots, markers, and automatic
    		 scrolling.
    		Live captures can be compressed while writing. (Previously there was
    		 support for compressing when performing multiple file capture, at
    		 file rotation time.) The --compress option in TShark works on live
    		 captures as well. Issue 9311
    		Absolute time fields, regardless of field display in the Packet
    		 Details, are always written in ISO 8601 format in UTC with -T json.
    		 This was already the case for -T ek since version 4.2.0. JSON is
    		 primarily a data interchange format read by software, so a standard
    		 format is desirable.
    		When absolute times field are output with -T fields, the "show" field
    		 of -T pdml, or in custom columns (including CSV output of columns),
    		 the formatting similar to asctime (e.g., Dec 18, 2017
    		 05:28:39.071704055 EST) has been deprecated in favor of ISO 8601. For
    		 backwards compatibility, a preference has been added,
    		 protocols.display_abs_time_ascii, which can be set to continue to
    		 format times as before. This preference can also be set to never use
    		 ASCII time and to use ISO 8601 time formatting in the protocol tree
    		 (Packet Details) as well. It is possible that a future release will
    		 remove the ascitime style formatting entirely.
    		UTC frame time column formats (including "Time (format as specified)"
    		 when a UTC time display format is selected) have a "Z" suffix per
    		 ISO 8601. Local time formats remain unqualified (including if the
    		 local time zone is UTC.) Custom columns displaying FT_ABSOLUTE_TIME
    		 already had time zone indication.
    		The TShark -G option for generating glossary reports does not need to
    		 be the first option given on the command line anymore. In addition,
    		 the reports now are affected by other command line options such as
    		 -o, -d, and --disable-protocol, in addition to the -C option, which
    		 was already supported. (The defaultprefs report remains unaffected by
    		 any other options.) As a part of this change, -G with no argument,
    		 which was previously deprecated, is no longer supported. Use
    		 tshark -G fields to produce the same report. Also, the syntax for
    		 only listing fields with a certain prefix has changed to tshark -G
    		 fields,prefix.
    		The underlying type of EUI-64 fields has been switched to bytes when
    		 packet matching, similar to most other address formats. This means
    		 that EUI-64 addresses can be sliced and compared to other bytes
    		 types, e.g. the filter wpan.src64[:3] == eth.src[:3]. Fields can
    		 still be specified using 64-bit unsigned integer literals, though
    		 arithmetic with other integers is no longer supported.
    		Wireshark can now decrypt NTP packets using NTS (Network Time Security).
    		 To decrypt packets, the NTS-KE (Network Time Security Key
    		 Establishment Protocol) packets need to be present, alongside the TLS
    		 client and exporter secrets. Additionally, the parts of a NTP packet
    		 which can be cryptographically authenticated (from NTP packet header
    		 until the end of the last extension field that precedes the NTS
    		 Authenticator and Encrypted Extension Fields extension field) are
    		 checked for validity.
    		Wireshark’s ability to decrypt MACsec packets has been expanded to
    		 either use the SAK unwrapped by the MKA dissector, or the PSK
    		 configured in the MACsec dissector. To enable the MKA dissector to
    		 unwrap the SAK, the CAK for the applicable CKN can be entered in the
    		 extended CKN/CAK Info UAT in the MKA dissector preferences. The
    		 ability of the MACsec dissector to decrypt packets using a PSK has
    		 been extended to a list of PSKs, which can entered through a new UAT.
    		The TCP Stream Graph axes now use units with SI prefixes. Issue 20197
    		Custom columns have an option to show the values using the same format
    		 as in Packet Details.
    		Custom column complex expressions (e.g., with arithmetic, filter
    		 functions, etc.) that return numeric results are sorted numerically
    		 instead of lexicographically.
    		Display filter functions float and double are added to allow
    		 explicitly converting field types like integers and times to single
    		 and double precision floats. They can be used to perform further
    		 arithmetic operations on fields of different types, including in
    		 custom column definitions.
    		The minimum width of the I/O Graph dialog window has been reduced, so
    		 it should work better on small resolution desktops, especially in
    		 certain languages. To enable this, some checkbox controls were moved
    		 to the graph right-click context menu. Issue 20147
    		X.509 certificates, used in TLS and elsewhere, can be exported via the
    		 File › Export Objects menu in Wireshark (under the name "X509AF")
    		 and --export-objects in TShark (with the protocol name x509af.)
    		Zstandard Content-Encoding is supported in the HTTP and HTTP/2
    		 dissectors.
    		Follow Stream is supported for MPEG 2 Transport Stream PIDs, and for
    		 Packetized Elementary Streams contained within MPEG 2 TS. The latter
    		 can be used to extract audio or video for playback with other tools.
    		DNP 3 (Distributed Network Protocol 3) is now supported in the
    		 Conversations and Endpoints table dialogs.
    		The Lua supplied preloaded libraries bit and rex_pcre2 are loaded in a
    		 way that adds them to the package.loaded table, as though through
    		 require, so that require("bit") and require("rex_pcre2") statements
    		 in Lua dissectors, while usually superfluous, behave as expected.
    		 Issue 20213
    		The packet list (Wireshark) and event list (Stratoshark) no longer
    		 support rows with multiple lines. Issue 14424
    		The ethers file can also contain EUI-64 to name mappings. Issue 15487
    		Wireshark’s "Import from Hex Dump" feature and text2pcap now support
    		 byte groups with 2 to 4 bytes (with an option for little-endian byte
    		 order), and support hexadecimal offsets with a 0x or 0X prefix (as
    		 produced by tcpdump -x, among others). Issue 16193
    		Frame timestamps can be added as preamble to hex dumps in Wireshark
    		 from the "Print" and "Export Packet Dissection" dialogs, and in
    		 TShark with the --hexdump time option. Issue 17132
    		Lua now has a Conversation object, which exposes conversations and
    		 conversation data to Lua. Issue 15396
    		An Edit › Copy › as HTML menu item has been added, along with
    		 associated context menu items and a keyboard shortcut. It provides an
    		 option (via knobs in preferences) to copy plain text with aligned
    		 columns along with an ability to select a copy format to be used when
    		 copied via keyboard shortcut.
    		The "no duplicate keys" version of JSON output that tshark has
    		 supported since 2.6.0 is available through the GUI Export Dissections
    		 Dialog. Note that this format does not necessarily preserve the
    		 ordering of all children in a tree, if sibling with identical keys
    		 are not consecutive.
    		The GUI Export Dissections Dialog can output raw hex bytes of the
    		 frame data for each field with or without exporting the field values,
    		 the same formats as the "-T json -x" and "-T jsonraw" output modes,
    		 respectively, of TShark.
    		The Conversations and Endpoints dialogs have an option to display byte
    		 counts and bit rates in exact counts instead of human-readable
    		 numbers with SI units. The default setting when opening a dialog is
    		 controlled by a Statistics preference, "conv.machine_readable". The
    		 same preference controls whether precise byte counts are used in the
    		 TShark "-z conv" and "-z endpoints" taps.
    		The output format for some TShark statistics taps (those selected with
    		 "-z <tap>,tree", which use the stats_tree system) can be controlled
    		 via a preference "-o statistics.output_format".
    		The color scheme can be set to Light or Dark mode independently of the
    		 current OS default on Windows and macOS, if Wireshark is built with
    		 Qt 6.8 or later as the official installers are. Issue 19328
    		libxml2 is now a required dependency. Note that Wireshark will not
    		 build with libxml2 2.15.0, but other versions should work.
    		The View menu has an option to Redissect Packets manually, which can
    		 be useful when address resolution or decryption secrets have changed.
    		HTTP2 tracking of 3GPP session over 5G Service Based Interfaces is now
    		 optional available. When enabled "Associate IMSI" will be add on
    		 HTTP2 streams which has been found belong to a session.
    		Building the documentation on Windows no longer requires Java.
    		On Linux, capture filters that use BPF extensions like "inbound",
    		 "outbound", and "ifindex" can be used for capturing (and compiled by
    		 the Compiled Filter dialog). Instead of always being rejected by the
    		 syntax checker, they will be marked as unknown.
    	Removed Features and Support
    		Wireshark no longer supports AirPcap and WinPcap.
    		Wireshark no longer supports libnl versions 1 or 2.
    		The ENABLE_STATIC CMake option has been deprecated in favor of
    		 BUILD_SHARED_LIBS
    	New File Format Decoding Support
    		Resource Interchange File Format (RIFF) and TTL File Format
    	New Protocol Support
    		Asymmetric Key Packages (AKP), Binary HTTP, BIST TotalView-ITCH
    		 protocol (BIST-ITCH), BIST TotalView-OUCH protocol (BIST-OUCH),
    		 Bluetooth Android HCI (HCI ANDROID), Bluetooth Intel HCI (HCI INTEL),
    		 BPSec COSE Context, BPSec Default SC, Commsignia Capture Protocol
    		 (C2P), DECT NR+ (DECT-2020 New Radio), DLMS/COSEM, Ephemeral
    		 Diffie-Hellman Over COSE, Identifier-Locator Network Protocol (ILNP),
    		 LDA Neo Device trailer (LDA_NEO_TRAILER), Lenbrook Service Discovery
    		 Protocol (LSDP), LLC V1, Navitrol messaging, Network Time Security
    		 Key Establishment Protocol (NTS-KE), Ouster VLP-16, Private Line
    		 Emulation (PLE), RC V3, RCG, Roughtime, SBAS L5 Navigation Message,
    		 SGP.22 GSMA Remote SIM Provisioning (SGP.22), SGP.32 GSMA Remote SIM
    		 Provisioning (SGP.32), SICK CoLA Ascii and CoLA Binary protocols,
    		 Silabs Debug Channel, Universal Measurement and Calibration Protocol
    		 (XCP), USB Picture Transfer Protocol (USB-PTP), VLP-16 Data and
    		 Position messaging, and vSomeIP Internal Protocol (vSomeIP)
    	Updated Protocol Support
    		Too many protocol updates have been made to list them all here.
    	New and Updated Capture File Support
    		BLF is now improved (including writing to BLF)
    	New and Updated Capture Interfaces support
    		On Windows, etwdump’s user-friendliness has been greatly improved
    		 thanks to various extcap changes. It should also now display the raw
    		 bytes of unknown events.
    	Major API Changes
    		The Lua API now supports Libgcrypt symmetric cipher functions.
    
    Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>

-----------------------------------------------------------------------

Summary of changes:
 config/rootfiles/packages/tshark | 85 ++++++++++++++++++++++------------------
 lfs/tshark                       |  6 +--
 2 files changed, 50 insertions(+), 41 deletions(-)

Difference in files:
diff --git a/config/rootfiles/packages/tshark b/config/rootfiles/packages/tshark
index 1778ebb0b..db7399cb8 100644
--- a/config/rootfiles/packages/tshark
+++ b/config/rootfiles/packages/tshark
@@ -2,7 +2,6 @@
 #usr/bin/captype
 usr/bin/dumpcap
 #usr/bin/editcap
-#usr/bin/idl2wrs
 #usr/bin/mergecap
 #usr/bin/randpkt
 #usr/bin/rawshark
@@ -11,48 +10,51 @@ usr/bin/dumpcap
 #usr/bin/text2pcap
 usr/bin/tshark
 #usr/lib/libwireshark.so
-usr/lib/libwireshark.so.18
-usr/lib/libwireshark.so.18.0.9
+usr/lib/libwireshark.so.19
+usr/lib/libwireshark.so.19.0.0
 #usr/lib/libwiretap.so
-usr/lib/libwiretap.so.15
-usr/lib/libwiretap.so.15.0.9
+usr/lib/libwiretap.so.16
+usr/lib/libwiretap.so.16.0.0
 #usr/lib/libwsutil.so
-usr/lib/libwsutil.so.16
-usr/lib/libwsutil.so.16.0.0
+usr/lib/libwsutil.so.17
+usr/lib/libwsutil.so.17.0.0
 #usr/lib/wireshark
-#usr/lib/wireshark/extcap
-usr/lib/wireshark/extcap/androiddump
-usr/lib/wireshark/extcap/ciscodump
-usr/lib/wireshark/extcap/dpauxmon
-usr/lib/wireshark/extcap/randpktdump
-usr/lib/wireshark/extcap/sshdump
-usr/lib/wireshark/extcap/udpdump
-usr/lib/wireshark/extcap/wifidump
 #usr/lib/wireshark/plugins
-usr/lib/wireshark/plugins/4.4
-usr/lib/wireshark/plugins/4.4/codecs
-usr/lib/wireshark/plugins/4.4/codecs/g711.so
-usr/lib/wireshark/plugins/4.4/codecs/l16mono.so
-usr/lib/wireshark/plugins/4.4/codecs/opus_dec.so
-usr/lib/wireshark/plugins/4.4/epan
-usr/lib/wireshark/plugins/4.4/epan/ethercat.so
-usr/lib/wireshark/plugins/4.4/epan/gryphon.so
-usr/lib/wireshark/plugins/4.4/epan/ipaddr.so
-usr/lib/wireshark/plugins/4.4/epan/irda.so
-usr/lib/wireshark/plugins/4.4/epan/mate.so
-usr/lib/wireshark/plugins/4.4/epan/opcua.so
-usr/lib/wireshark/plugins/4.4/epan/profinet.so
-usr/lib/wireshark/plugins/4.4/epan/stats_tree.so
-usr/lib/wireshark/plugins/4.4/epan/transum.so
-usr/lib/wireshark/plugins/4.4/epan/unistim.so
-usr/lib/wireshark/plugins/4.4/epan/wimax.so
-usr/lib/wireshark/plugins/4.4/epan/wimaxasncp.so
-usr/lib/wireshark/plugins/4.4/epan/wimaxmacphy.so
-usr/lib/wireshark/plugins/4.4/wiretap
-usr/lib/wireshark/plugins/4.4/wiretap/usbdump.so
+usr/lib/wireshark/plugins/4.6
+usr/lib/wireshark/plugins/4.6/codecs
+usr/lib/wireshark/plugins/4.6/codecs/g711.so
+usr/lib/wireshark/plugins/4.6/codecs/l16mono.so
+usr/lib/wireshark/plugins/4.6/codecs/opus_dec.so
+usr/lib/wireshark/plugins/4.6/epan
+usr/lib/wireshark/plugins/4.6/epan/ethercat.so
+usr/lib/wireshark/plugins/4.6/epan/gryphon.so
+usr/lib/wireshark/plugins/4.6/epan/ipaddr.so
+usr/lib/wireshark/plugins/4.6/epan/irda.so
+usr/lib/wireshark/plugins/4.6/epan/mate.so
+usr/lib/wireshark/plugins/4.6/epan/opcua.so
+usr/lib/wireshark/plugins/4.6/epan/profinet.so
+usr/lib/wireshark/plugins/4.6/epan/stats_tree.so
+usr/lib/wireshark/plugins/4.6/epan/transum.so
+usr/lib/wireshark/plugins/4.6/epan/unistim.so
+usr/lib/wireshark/plugins/4.6/epan/wimax.so
+usr/lib/wireshark/plugins/4.6/epan/wimaxasncp.so
+usr/lib/wireshark/plugins/4.6/epan/wimaxmacphy.so
+usr/lib/wireshark/plugins/4.6/wiretap
+usr/lib/wireshark/plugins/4.6/wiretap/usbdump.so
+usr/libexec/wireshark
+usr/libexec/wireshark/extcap
+usr/libexec/wireshark/extcap/androiddump
+usr/libexec/wireshark/extcap/ciscodump
+usr/libexec/wireshark/extcap/dpauxmon
+usr/libexec/wireshark/extcap/randpktdump
+usr/libexec/wireshark/extcap/sshdump
+usr/libexec/wireshark/extcap/udpdump
+usr/libexec/wireshark/extcap/wifidump
 #usr/share/doc/wireshark
 #usr/share/doc/wireshark/COPYING
 #usr/share/doc/wireshark/README.xml-output
+#usr/share/doc/wireshark/Stratoshark Release Notes.html
+#usr/share/doc/wireshark/Wireshark Release Notes.html
 #usr/share/doc/wireshark/androiddump.html
 #usr/share/doc/wireshark/capinfos.html
 #usr/share/doc/wireshark/captype.html
@@ -68,9 +70,11 @@ usr/lib/wireshark/plugins/4.4/wiretap/usbdump.so
 #usr/share/doc/wireshark/randpkt.html
 #usr/share/doc/wireshark/randpktdump.html
 #usr/share/doc/wireshark/rawshark.html
-#usr/share/doc/wireshark/release-notes.html
 #usr/share/doc/wireshark/reordercap.html
+#usr/share/doc/wireshark/sshdig.html
 #usr/share/doc/wireshark/sshdump.html
+#usr/share/doc/wireshark/strato.html
+#usr/share/doc/wireshark/stratoshark.html
 #usr/share/doc/wireshark/text2pcap.html
 #usr/share/doc/wireshark/tshark.html
 #usr/share/doc/wireshark/udpdump.html
@@ -92,7 +96,10 @@ usr/lib/wireshark/plugins/4.4/wiretap/usbdump.so
 #usr/share/man/man1/randpktdump.1
 #usr/share/man/man1/rawshark.1
 #usr/share/man/man1/reordercap.1
+#usr/share/man/man1/sshdig.1
 #usr/share/man/man1/sshdump.1
+#usr/share/man/man1/strato.1
+#usr/share/man/man1/stratoshark.1
 #usr/share/man/man1/text2pcap.1
 #usr/share/man/man1/tshark.1
 #usr/share/man/man1/udpdump.1
@@ -108,7 +115,6 @@ usr/share/wireshark/dfilters
 usr/share/wireshark/diameter/AlcatelLucent.xml
 usr/share/wireshark/diameter/Cisco.xml
 usr/share/wireshark/diameter/CiscoSystems.xml
-usr/share/wireshark/diameter/Custom.xml
 usr/share/wireshark/diameter/Ericsson.xml
 usr/share/wireshark/diameter/HP.xml
 usr/share/wireshark/diameter/Huawei.xml
@@ -129,6 +135,7 @@ usr/share/wireshark/diameter/VerizonWireless.xml
 usr/share/wireshark/diameter/Vodafone.xml
 usr/share/wireshark/diameter/chargecontrol.xml
 usr/share/wireshark/diameter/dictionary.dtd
+usr/share/wireshark/diameter/dictionary.ent
 usr/share/wireshark/diameter/dictionary.xml
 usr/share/wireshark/diameter/eap.xml
 usr/share/wireshark/diameter/etsie2e4.xml
@@ -193,6 +200,7 @@ usr/share/wireshark/radius/dictionary.arista
 usr/share/wireshark/radius/dictionary.aruba
 usr/share/wireshark/radius/dictionary.ascend
 usr/share/wireshark/radius/dictionary.ascend.illegal
+usr/share/wireshark/radius/dictionary.ascend.illegal.extended
 usr/share/wireshark/radius/dictionary.asn
 usr/share/wireshark/radius/dictionary.audiocodes
 usr/share/wireshark/radius/dictionary.avaya
@@ -270,6 +278,7 @@ usr/share/wireshark/radius/dictionary.iea
 usr/share/wireshark/radius/dictionary.infinera
 usr/share/wireshark/radius/dictionary.infoblox
 usr/share/wireshark/radius/dictionary.infonet
+usr/share/wireshark/radius/dictionary.ingate
 usr/share/wireshark/radius/dictionary.ipunplugged
 usr/share/wireshark/radius/dictionary.issanni
 usr/share/wireshark/radius/dictionary.itk
diff --git a/lfs/tshark b/lfs/tshark
index 6f88045c6..5760f94eb 100644
--- a/lfs/tshark
+++ b/lfs/tshark
@@ -26,7 +26,7 @@ include Config
 
 SUMMARY    = A Network Traffic Analyser
 
-VER        = 4.4.9
+VER        = 4.6.0
 
 THISAPP    = wireshark-$(VER)
 DL_FILE    = $(THISAPP).tar.xz
@@ -35,7 +35,7 @@ DIR_APP    = $(DIR_SRC)/$(THISAPP)
 TARGET     = $(DIR_INFO)/$(THISAPP)
 PROG       = tshark
 DEPS       = c-ares
-PAK_VER    = 27
+PAK_VER    = 28
 
 SERVICES   =
 
@@ -47,7 +47,7 @@ objects = $(DL_FILE)
 
 $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
 
-$(DL_FILE)_BLAKE2 = e3a9b959087f720d6ea76205d5a3fc69227a484998ce964ce3c0ecfd0dfb974b7035f7f026830e08c5bed38051a3c977717d3dffcdc2169d5bcaf6022f19e9de
+$(DL_FILE)_BLAKE2 = df4245158422dae95bb6a68d8093cf5d1456290f25a8b8f664e6f9bf7f70661fc881e100c48c616ca077621dbb0ff55a5b14c1e385e8b6d52a7dc2d7fd1acd0a
 
 install : $(TARGET)
 


hooks/post-receive
--
IPFire 2.x development tree


^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2025-10-11 13:05 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2025-10-11 13:05 [git.ipfire.org] IPFire 2.x development tree branch, next, updated. 717a29e28759062866285b451d8233959e5935f6 Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox