How to auto-select TCP conversations the old way?
Recently, Wireshark's function for setting a display filter on a conversation has changed. When I right-click on a packet, select Conversation Filter and select TCP, I now get "tcp.stream eq 12". In previous versions, I would instead get the more complicated filter limiting the IP address and TCP port numbers selected.
While this is not a problem for doing quick trace analysis using a single capture file, this is completely unsuitable when working with multiple simultaneous traces, where one was taken at the workstation side, another was taken at the server side, and a third was taken at the core switch using port mirroring. Using the old format, once you found an "interesting" conversation on the client side, you could easily jump to the server-side trace, paste in the same filter expression, and see the same trace data on the server side, thus seeing the flip side of the conversation (and if any packets were lost or mangled across the wire). With this "new" solution, if you first filter in one trace and get "tcp.stream eq 12", you cannot just paste the filter text into the other two trace files -- you have to actually go and find at least ONE of the packets from the desired trace and then select a new conversation filter there, which will be completely different.
Yes, I know that I can type it all in manually, but I try to use my time efficiently, and typing in numeric address and port data is simply not my idea of using my time effectively, especially with my fat fingers.
I tried delving into the Preferences, but came up empty. I then started digging through Advanced settings, searching on "convers", "filter", "display" and even "TCP", but couldn't find anything there, either. The only thing I DID find was that if I went to the Statistics/Conversations screen and THEN right-clicked on the TCP stream 12, and then selected Prepare as filter/Selected/A<->B, then this DID use the old format, giving me the data I needed of "ip.addr==192.168.11.148 && tcp.port==50130 && ip.addr==192.168.10.33 && tcp.port==3351". However, that's an awful lot of steps when it was working so easily before.
Any idea how to change the operation back to the old/useful way?
There's a discussion here, but the only suggested method is using the Conversations dialog as you mention: https://gitlab.com/wireshark/wireshar...
I am not sure what you call recently. It took me a moment to fugure out how long ago I have gotten used to the follow stream.
The Conversations dialog is really not helpful, as when you have 100+ conversations in a trace file, you end up having to scroll through the list to find the right one. Sometimes this is easy, but in some cases, the first packet seen in a conversation is from the server (due to timing), so it flips the A and B sides, making the sorting on the conversation list somewhat useless.
As for "recently", I don't know exactly when it changed. In many cases, I am working with one trace at a time and it's not a big deal. However, I'm currently working with a client where packets are getting lost or damaged over the wire. I can easily see the conversation on the client side, but just copying the tcp.stream filter to the server-side trace doesn't work.