Copyright 1998-2019 Gerald Combs <gerald@wireshark.org> and contributors. License GPLv2+: GNU GPL version 2 or later <http://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with Qt 5.12.1, with libpcap, without POSIX capabilities, with GLib 2.37.6, with zlib 1.2.8, with SMI 0.4.8, with c-ares 1.15.0, with Lua 5.2.4, with GnuTLS 3.4.17, with Gcrypt 1.7.7, with MIT Kerberos, with MaxMind DB resolver, with nghttp2 1.21.0, with LZ4, with Snappy, with libxml2 2.9.9, with QtMultimedia, with SBC, with SpanDSP, with bcg729.
Running on Mac OS X 10.14.3, build 18D109 (Darwin 18.2.0), with Intel(R) Core(TM) i7-7920HQ CPU @ 3.10GHz (with SSE4.2), with 16384 MB of physical memory, with locale C, with libpcap version 1.8.1 -- Apple version 79.200.4, with GnuTLS 3.4.17, with Gcrypt 1.7.7, with zlib 1.2.11, binary plugins supported (14 loaded). Built using clang 4.2.1 Compatible Apple LLVM 10.0.0 (clang-1000.11.45.5).
Wireshark is Open Source Software released under the GNU General Public License.
Trying to run Wireshark 3.0.0 on MacOS Mojave with a 3rd parts binary plugin located at ~/.local/lib/wireshark/plugins/3-0/epan/ results in a dialog displaying the following message. The plugin is not loaded.Couldn't load plugin 'customdissector.so': dlopen(/Users/jcohen/.local/lib/wireshark/plugins/3-0/epan/customdissector.so, 2): no suitable image found. Did find: /Users/jcohen/.local/lib/wireshark/plugins/3-0/epan/customdissector.so: code signature in (/Users/jcohen/.local/lib/wireshark/plugins/3-0/epan/customdissector.so) not valid for use in process using Library Validation: mapped file has no cdhash, completely unsigned? Code has to be at least ad-hoc signed.This is due to library validation being enofrced in sdk 10.14 (Mojave) and Wireshark 3.0.0 being signed with options=runtime (hardened) in osx-app.shThis was added in https://code.wireshark.org/review/32032The com.apple.security.cs.disable-library-validation entitlement is needed to enable loading a 3rd party library not signed by a key with the same Team ID the app bundle.
(In reply to Gerrit Code Review from comment #4) > Change 32704 merged by Gerald Combs: > osx app bundle: add entitlement to allow loading 3rd party plugns > > https://code.wireshark.org/review/32704 Packages with your change applied should appear shortly in https://www.wireshark.org/download/automated/osx/.