attachment

<html><head><meta http-equiv="Content-Type" content="text/html charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class="">Greetings,<div class=""><br class=""></div><div class="">I wanted to call out this release to the IPP community. This release includes a significant update to the IPP dissector contributed last year by Mike Sweet from Apple . Thanks Mike for your contributions! This should greatly improve the IPP diagnosis experience.</div><div class=""><br class=""></div><div class="">Cheers,</div><div class=""><br class=""><div class="">
Smith<br class=""><br class="">/**<br class="">    Smith Kennedy<br class="">    Wireless Architect - Client Software - IPG-PPS<br class="">    Standards - IEEE ISTO PWG / Bluetooth SIG / Wi-Fi Alliance / NFC Forum / USB IF<br class="">    Chair, IEEE ISTO Printer Working Group<br class="">    HP Inc.<br class="">*/<br class=""><br class=""><br class="">

</div>

<div><br class=""><blockquote type="cite" class=""><div class="">Begin forwarded message:</div><br class="Apple-interchange-newline"><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px;" class=""><span style="font-family: -webkit-system-font, Helvetica Neue, Helvetica, sans-serif; color:rgba(0, 0, 0, 1.0);" class=""><b class="">From: </b></span><span style="font-family: -webkit-system-font, Helvetica Neue, Helvetica, sans-serif;" class="">Gerald Combs <<a href="mailto:gerald@wireshark.org" class="">gerald@wireshark.org</a>><br class=""></span></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px;" class=""><span style="font-family: -webkit-system-font, Helvetica Neue, Helvetica, sans-serif; color:rgba(0, 0, 0, 1.0);" class=""><b class="">Subject: </b></span><span style="font-family: -webkit-system-font, Helvetica Neue, Helvetica, sans-serif;" class=""><b class="">[Wireshark-dev] Wireshark 2.4.0 is now available</b><br class=""></span></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px;" class=""><span style="font-family: -webkit-system-font, Helvetica Neue, Helvetica, sans-serif; color:rgba(0, 0, 0, 1.0);" class=""><b class="">Date: </b></span><span style="font-family: -webkit-system-font, Helvetica Neue, Helvetica, sans-serif;" class="">July 19, 2017 at 12:26:23 PM MDT<br class=""></span></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px;" class=""><span style="font-family: -webkit-system-font, Helvetica Neue, Helvetica, sans-serif; color:rgba(0, 0, 0, 1.0);" class=""><b class="">To: </b></span><span style="font-family: -webkit-system-font, Helvetica Neue, Helvetica, sans-serif;" class=""><<a href="mailto:wireshark-announce@wireshark.org" class="">wireshark-announce@wireshark.org</a>>, Community support list for Wireshark <<a href="mailto:wireshark-users@wireshark.org" class="">wireshark-users@wireshark.org</a>>, Developer support list for Wireshark <<a href="mailto:wireshark-dev@wireshark.org" class="">wireshark-dev@wireshark.org</a>><br class=""></span></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px;" class=""><span style="font-family: -webkit-system-font, Helvetica Neue, Helvetica, sans-serif; color:rgba(0, 0, 0, 1.0);" class=""><b class="">Resent-From: </b></span><span style="font-family: -webkit-system-font, Helvetica Neue, Helvetica, sans-serif;" class="">Content-filter at <a href="http://cloude.spamtitan.com" class="">cloude.spamtitan.com</a> <<a href="mailto:virusalert@spamtitan.com" class="">virusalert@spamtitan.com</a>><br class=""></span></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px;" class=""><span style="font-family: -webkit-system-font, Helvetica Neue, Helvetica, sans-serif; color:rgba(0, 0, 0, 1.0);" class=""><b class="">Resent-To: </b></span><span style="font-family: -webkit-system-font, Helvetica Neue, Helvetica, sans-serif;" class=""><<a href="mailto:wireshark-dev@wireshark.org" class="">wireshark-dev@wireshark.org</a>><br class=""></span></div><div style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px;" class=""><span style="font-family: -webkit-system-font, Helvetica Neue, Helvetica, sans-serif; color:rgba(0, 0, 0, 1.0);" class=""><b class="">Reply-To: </b></span><span style="font-family: -webkit-system-font, Helvetica Neue, Helvetica, sans-serif;" class="">Developer support list for Wireshark <<a href="mailto:wireshark-dev@wireshark.org" class="">wireshark-dev@wireshark.org</a>><br class=""></span></div><br class=""><div class=""><div class="">I'm proud to announce the release of Wireshark 2.4.0.<br class=""><br class="">     __________________________________________________________________<br class=""><br class="">What is Wireshark?<br class=""><br class="">   Wireshark is the world's most popular network protocol analyzer. It is<br class="">   used for troubleshooting, analysis, development and education.<br class="">     __________________________________________________________________<br class=""><br class="">What's New<br class=""><br class="">  New and Updated Features<br class=""><br class="">   The following features are new (or have been significantly updated)<br class="">   since version 2.2.0:<br class="">     * Experimental 32-bit and 64-bit Windows Installer (.msi) packages<br class="">       are available. It is recommended that you use these independently<br class="">       of the NSIS (.exe) installers. That is, you should make sure the<br class="">       NSIS package is completely uninstalled before installing the<br class="">       Windows Installer package and vice-versa.<br class="">     * Source packages are now compressed using xz instead of bzip2.<br class="">     * The legacy (GTK+) UI is disabled by default in the Windows<br class="">       installers.<br class="">     * The legacy (GTK+) UI is disabled by default in the development<br class="">       environment (Autotools and CMake).<br class="">     * SS7 Point Codes can now be resolved into names with a hosts-like<br class="">       file.<br class="">     * Wireshark can now go fullscreen to have more room for packets.<br class="">     * TShark can now export objects like the other GUI interfaces.<br class="">     * Support for G.722 and G.726 codecs in the RTP Player (via the<br class="">       SpanDSP library).<br class="">     * You can now choose the output device when playing RTP streams.<br class="">     * Added support for dissectors to include a unit name natively in<br class="">       their hf field. A field can now automatically append "seconds" or<br class="">       "ms" to its value without additional printf-style APIs.<br class="">     * The Default profile can now be reset to default values.<br class="">     * You can move back and forth in the selection history in the Qt UI.<br class="">     * IEEE 802.15.4 dissector now uses an UAT for decryption keys. The<br class="">       original decryption key preference has been obsoleted.<br class="">     * Extcap utilities can now provide configuration for a GUI interface<br class="">       toolbar to control the extcap utility while capturing.<br class="">     * Extcap utilities can now validate the capture filter.<br class="">     * Display filter function len() can now be used on all string and<br class="">       byte fields.<br class="">     * Added an experimental timeline view for 802.11 wireless packet data<br class="">       which can be enabled via the "802.11 radio information"<br class="">       preferences.<br class="">     * Added TLS 1.3 (draft 21) dissection and decryption support ([1]Bug<br class="">       12779).<br class="">     * The (D)TLS Application Layer protocol (e.g. HTTP or CoAP) can now<br class="">       be changed via the Decode As dialog.<br class="">     * The RSA keys dialog for SSL keys has improved feedback for invalid<br class="">       settings and no longer requires the IP address, Port or Protocol<br class="">       fields to be set in addition to the Key File.<br class="">     * TCP Analysis will detect and flag more spurious retransmissions.<br class=""><br class="">  New Protocol Support<br class=""><br class="">   Bluetooth HCI Vendor Intel, CAN FD, Citrix NetScaler Metric Exchange<br class="">   Protocol, Citrix NetScaler RPC Protocol, DirectPlay 8 protocol,<br class="">   Ericsson A-bis P-GSL, Ericsson A-bis TFP (Traffic Forwarding Protocol),<br class="">   Facebook Zero, Fc00/cjdns Protocol, Generic Netlink (genl), GSM Osmux,<br class="">   GSMTAP based logging, Health Level 7 (HL7), High-speed SECS message<br class="">   service (HSMS), HomePNA, IndigoCare iCall protocol, IndigoCare Netrix<br class="">   protocol, iPerf2, ISO 15765, Linux 802.11 Netlink (nl80211), Local<br class="">   Service Discovery (LSD), M2 Application Protocol, Mesh Link<br class="">   Establishment (MLE), MUDURL, Netgear Ensemble Protocol, NetScaler HA<br class="">   Protocol, NetScaler Metric Exchange Protocol, NetScaler RPC Protocol,<br class="">   NM protocol, Nordic BLE Sniffer, NVMe, NVMe Fabrics RDMA, OBD-II PIDs,<br class="">   OpenThread simulator, RFTap Protocol, SCTE-35 Digital Program Insertion<br class="">   Messages, Snort Post-dissector, Thread CoAP, UDP based FTP w/ multicast<br class="">   (UFTP and UFTP4), Unified Diagnostic Services (UDS), vSocket, Windows<br class="">   Cluster Management API (clusapi), and X-Rite i1 Display Pro (and<br class="">   derivatives) USB protocol<br class=""><br class="">  Updated Protocol Support<br class=""><br class="">   Too many protocols have been updated to list here.<br class=""><br class="">  New and Updated Capture File Support<br class=""><br class="">   ERF, IxVeriWave, Libpcap, and Pcap-ng<br class=""><br class="">  Major API Changes<br class=""><br class="">   IEEE802.11: wlan_mgt display filter element got renamed to wlan.<br class=""><br class="">   Libgcrypt is now a required dependency.<br class="">     __________________________________________________________________<br class=""><br class="">Getting Wireshark<br class=""><br class="">   Wireshark source code and installation packages are available from<br class="">   [2]<a href="https://www.wireshark.org/download.html" class="">https://www.wireshark.org/download.html</a>.<br class=""><br class="">  Vendor-supplied Packages<br class=""><br class="">   Most Linux and Unix vendors supply their own Wireshark packages. You<br class="">   can usually install or upgrade Wireshark using the package management<br class="">   system specific to that platform. A list of third-party packages can be<br class="">   found on the [3]download page on the Wireshark web site.<br class="">     __________________________________________________________________<br class=""><br class="">File Locations<br class=""><br class="">   Wireshark and TShark look in several different locations for preference<br class="">   files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations<br class="">   vary from platform to platform. You can use About->Folders to find the<br class="">   default locations on your system.<br class="">     __________________________________________________________________<br class=""><br class="">Known Problems<br class=""><br class="">   Dumpcap might not quit if Wireshark or TShark crashes. ([4]Bug 1419)<br class=""><br class="">   The BER dissector might infinitely loop. ([5]Bug 1516)<br class=""><br class="">   Capture filters aren't applied when capturing from named pipes. ([6]Bug<br class="">   1814)<br class=""><br class="">   Filtering tshark captures with read filters (-R) no longer works.<br class="">   ([7]Bug 2234)<br class=""><br class="">   Application crash when changing real-time option. ([8]Bug 4035)<br class=""><br class="">   Wireshark and TShark will display incorrect delta times in some cases.<br class="">   ([9]Bug 4985)<br class=""><br class="">   Wireshark should let you work with multiple capture files. ([10]Bug<br class="">   10488)<br class="">     __________________________________________________________________<br class=""><br class="">Getting Help<br class=""><br class="">   Community support is available on [11]Wireshark's Q&A site and on the<br class="">   wireshark-users mailing list. Subscription information and archives for<br class="">   all of Wireshark's mailing lists can be found on [12]the web site.<br class=""><br class="">   Official Wireshark training and certification are available from<br class="">   [13]Wireshark University.<br class="">     __________________________________________________________________<br class=""><br class="">Frequently Asked Questions<br class=""><br class="">   A complete FAQ is available on the [14]Wireshark web site.<br class="">     __________________________________________________________________<br class=""><br class="">   Last updated 2017-07-19 17:49:40 UTC<br class=""><br class="">References<br class=""><br class="">   1. <a href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12779" class="">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12779</a><br class="">   2. <a href="https://www.wireshark.org/download.html" class="">https://www.wireshark.org/download.html</a><br class="">   3. <a href="https://www.wireshark.org/download.html#thirdparty" class="">https://www.wireshark.org/download.html#thirdparty</a><br class="">   4. <a href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419" class="">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419</a><br class="">   5. <a href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516" class="">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516</a><br class="">   6. <a href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814" class="">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814</a><br class="">   7. <a href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234" class="">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234</a><br class="">   8. <a href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035" class="">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035</a><br class="">   9. <a href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985" class="">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985</a><br class="">  10. <a href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488" class="">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488</a><br class="">  11. <a href="https://ask.wireshark.org/" class="">https://ask.wireshark.org/</a><br class="">  12. <a href="https://www.wireshark.org/lists/" class="">https://www.wireshark.org/lists/</a><br class="">  13. <a href="http://www.wiresharktraining.com/" class="">http://www.wiresharktraining.com/</a><br class="">  14. <a href="https://www.wireshark.org/faq.html" class="">https://www.wireshark.org/faq.html</a><br class=""><br class=""><br class="">Digests<br class=""><br class="">wireshark-2.4.0.tar.xz: 28755596 bytes<br class="">SHA256(wireshark-2.4.0.tar.xz)=890bb41b826ff04e98fb089446ab37e5871e16205278bfeffc2a7c7364de3b04<br class="">RIPEMD160(wireshark-2.4.0.tar.xz)=277b417c0e52f7e5ad9278c63a7d5ac74e552518<br class="">SHA1(wireshark-2.4.0.tar.xz)=aa8f53300f60956553902ccc755c0dfe86f768fc<br class="">MD5(wireshark-2.4.0.tar.xz)=655106f8cf3bb8f521336d3a8ab5b10b<br class=""><br class="">Wireshark-win64-2.4.0.exe: 59110928 bytes<br class="">SHA256(Wireshark-win64-2.4.0.exe)=341f97b1d8fc25b4e149fb20b718451aa8646856faa0576071037e60ed47f8b0<br class="">RIPEMD160(Wireshark-win64-2.4.0.exe)=57c5eca5d4efcb1c2b8c80cd79e6cb4d505e9c03<br class="">SHA1(Wireshark-win64-2.4.0.exe)=0452d3aa7ad1cc1240c0cdd9457159de244ca8be<br class="">MD5(Wireshark-win64-2.4.0.exe)=f611afe4a6d59f7ad18fd573232e30fe<br class=""><br class="">Wireshark-win32-2.4.0.exe: 53570224 bytes<br class="">SHA256(Wireshark-win32-2.4.0.exe)=971e6021d6ba214aa938ff43436b70525efc8f5286e556066dfa4863603e7c5e<br class="">RIPEMD160(Wireshark-win32-2.4.0.exe)=04cd96b19aff8375fe1217c1829a850d1a3753ca<br class="">SHA1(Wireshark-win32-2.4.0.exe)=6e8351cb2aba06173aabc907922338edbcda63d2<br class="">MD5(Wireshark-win32-2.4.0.exe)=d96a10a99ca06e36528a0e6c662c17e5<br class=""><br class="">Wireshark-win32-2.4.0.msi: 43032576 bytes<br class="">SHA256(Wireshark-win32-2.4.0.msi)=b730430387efab0bc3b01e5f10a2e708672d75157663c251fcb20431d6649a9f<br class="">RIPEMD160(Wireshark-win32-2.4.0.msi)=d726fbb03f9fdf64771620955ec6ae1924b23fbf<br class="">SHA1(Wireshark-win32-2.4.0.msi)=fe3cb12f5efa30e0619e81ba81271b334e4cd053<br class="">MD5(Wireshark-win32-2.4.0.msi)=5cd3e1b7ed315c3f5e928c9c8001dbf9<br class=""><br class="">Wireshark-win64-2.4.0.msi: 48455680 bytes<br class="">SHA256(Wireshark-win64-2.4.0.msi)=609262ab1ecdda6fd3ed3a5ccddfb5b8d939b7a28616c5dacddcb1528c2b02d9<br class="">RIPEMD160(Wireshark-win64-2.4.0.msi)=e74ec7c8892a9413074cb1474d9fa335829c05be<br class="">SHA1(Wireshark-win64-2.4.0.msi)=1f4437025097362c8e76841a7569bb72da6cd036<br class="">MD5(Wireshark-win64-2.4.0.msi)=6fb4c41eb8a5300e0b0200ea7c1d56a4<br class=""><br class="">WiresharkPortable_2.4.0.paf.exe: 46243888 bytes<br class="">SHA256(WiresharkPortable_2.4.0.paf.exe)=76dfafd12ad82a19fffe0d99b48e9ba5dd1b77ce9c566dcf19cdf32fffb40f22<br class="">RIPEMD160(WiresharkPortable_2.4.0.paf.exe)=65cbdfca286976a652a931c8e0c989c4e431efbe<br class="">SHA1(WiresharkPortable_2.4.0.paf.exe)=8c84ecf4455f34f7624ae1056f1af568a02bd2e0<br class="">MD5(WiresharkPortable_2.4.0.paf.exe)=8544747f6a4a89ee88d965953a1ff8b1<br class=""><br class="">Wireshark 2.4.0 Intel 64.dmg: 35144406 bytes<br class="">SHA256(Wireshark 2.4.0 Intel<br class="">64.dmg)=20c2e5fa8ec302fc47100ad42f8d2020e629a72b75a7343929206d3274bd08b2<br class="">RIPEMD160(Wireshark 2.4.0 Intel<br class="">64.dmg)=978eab476a2ab3dcae2080902dc3d8f223f21aed<br class="">SHA1(Wireshark 2.4.0 Intel 64.dmg)=5aecbddef5a762a0a4c36c9312b727bf671c0992<br class="">MD5(Wireshark 2.4.0 Intel 64.dmg)=2cf632f801dc810c5f0378fa983fc9e9<br class=""><br class="">___________________________________________________________________________<br class="">Sent via:    Wireshark-dev mailing list <<a href="mailto:wireshark-dev@wireshark.org" class="">wireshark-dev@wireshark.org</a>><br class="">Archives:    <a href="https://www.wireshark.org/lists/wireshark-dev" class="">https://www.wireshark.org/lists/wireshark-dev</a><br class="">Unsubscribe: <a href="https://www.wireshark.org/mailman/options/wireshark-dev" class="">https://www.wireshark.org/mailman/options/wireshark-dev</a><br class="">             <a href="mailto:wireshark-dev-request@wireshark.org?subject=unsubscribe" class="">mailto:wireshark-dev-request@wireshark.org?subject=unsubscribe</a></div></div></blockquote></div><br class=""></div></body></html>