Sipp Reference Documentation by Richard GAYRAUD [Initial Code], Olivier JACQUES [Code/Documentation], Many Contributors [Code] Table of Contents

Total Page:16

File Type:pdf, Size:1020Kb

Sipp Reference Documentation by Richard GAYRAUD [Initial Code], Olivier JACQUES [Code/Documentation], Many Contributors [Code] Table of Contents SIPp SIPp reference documentation by Richard GAYRAUD [initial code], Olivier JACQUES [code/documentation], Many contributors [code] Table of contents 1 Foreword................................................................................................................................................................................................................................................. 4 2 Installation............................................................................................................................................................................................................................................... 5 2.1 Getting SIPp........................................................................................................................................................................................................................................6 2.2 Stable release...................................................................................................................................................................................................................................... 6 2.3 Unstable release.................................................................................................................................................................................................................................. 6 2.4 Available platforms.............................................................................................................................................................................................................................6 2.5 Installing SIPp.....................................................................................................................................................................................................................................7 2.6 Increasing File Descriptors Limit....................................................................................................................................................................................................... 8 3 Using SIPp...............................................................................................................................................................................................................................................9 3.1 Main features...................................................................................................................................................................................................................................... 9 3.2 Integrated scenarios............................................................................................................................................................................................................................ 9 3.2.1 UAC................................................................................................................................................................................................................................................9 3.2.2 UAC with media...........................................................................................................................................................................................................................10 3.2.3 UAS.............................................................................................................................................................................................................................................. 10 3.2.4 regexp........................................................................................................................................................................................................................................... 11 3.2.5 branch........................................................................................................................................................................................................................................... 11 Copyright © 2004,2005,2006 The authors All rights reserved. SIPp 3.2.6 3PCC............................................................................................................................................................................................................................................ 12 3.3 3PCC Extended.................................................................................................................................................................................................................................14 3.4 Traffic control................................................................................................................................................................................................................................... 15 3.5 Remote control..................................................................................................................................................................................................................................16 3.6 Running SIPp in background............................................................................................................................................................................................................17 3.7 Create your own XML scenarios...................................................................................................................................................................................................... 17 3.7.1 Structure of client (UAC like) XML scenarios............................................................................................................................................................................ 27 3.7.2 Structure of server (UAS like) XML scenarios............................................................................................................................................................................34 3.7.3 Actions..........................................................................................................................................................................................................................................34 3.7.4 Injecting values from an external CSV during calls.....................................................................................................................................................................39 3.7.5 Conditional branching.................................................................................................................................................................................................................. 40 3.7.6 SIP authentication.........................................................................................................................................................................................................................44 3.8 Screens.............................................................................................................................................................................................................................................. 46 3.9 Transport modes................................................................................................................................................................................................................................50 3.9.1 UDP mono socket.........................................................................................................................................................................................................................50 3.9.2 UDP multi socket......................................................................................................................................................................................................................... 51 3.9.3 UDP with one socket per IP address............................................................................................................................................................................................ 51 3.9.4 TCP mono socket......................................................................................................................................................................................................................... 52 3.9.5 TCP multi socket.......................................................................................................................................................................................................................... 52 3.9.6 TCP reconnections....................................................................................................................................................................................................................... 53 3.9.7 TLS mono socket..........................................................................................................................................................................................................................53 3.9.8 TLS multi socket.......................................................................................................................................................................................................................... 53 3.9.9 IPv6 support................................................................................................................................................................................................................................
Recommended publications
  • GNU Emacs Manual
    GNU Emacs Manual GNU Emacs Manual Sixteenth Edition, Updated for Emacs Version 22.1. Richard Stallman This is the Sixteenth edition of the GNU Emacs Manual, updated for Emacs version 22.1. Copyright c 1985, 1986, 1987, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with the Invariant Sections being \The GNU Manifesto," \Distribution" and \GNU GENERAL PUBLIC LICENSE," with the Front-Cover texts being \A GNU Manual," and with the Back-Cover Texts as in (a) below. A copy of the license is included in the section entitled \GNU Free Documentation License." (a) The FSF's Back-Cover Text is: \You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development." Published by the Free Software Foundation 51 Franklin Street, Fifth Floor Boston, MA 02110-1301 USA ISBN 1-882114-86-8 Cover art by Etienne Suvasa. i Short Contents Preface ::::::::::::::::::::::::::::::::::::::::::::::::: 1 Distribution ::::::::::::::::::::::::::::::::::::::::::::: 2 Introduction ::::::::::::::::::::::::::::::::::::::::::::: 5 1 The Organization of the Screen :::::::::::::::::::::::::: 6 2 Characters, Keys and Commands ::::::::::::::::::::::: 11 3 Entering and Exiting Emacs ::::::::::::::::::::::::::: 15 4 Basic Editing
    [Show full text]
  • Absolute BSD—The Ultimate Guide to Freebsd Table of Contents Absolute BSD—The Ultimate Guide to Freebsd
    Absolute BSD—The Ultimate Guide to FreeBSD Table of Contents Absolute BSD—The Ultimate Guide to FreeBSD............................................................................1 Dedication..........................................................................................................................................3 Foreword............................................................................................................................................4 Introduction........................................................................................................................................5 What Is FreeBSD?...................................................................................................................5 How Did FreeBSD Get Here?..................................................................................................5 The BSD License: BSD Goes Public.......................................................................................6 The Birth of Modern FreeBSD.................................................................................................6 FreeBSD Development............................................................................................................7 Committers.........................................................................................................................7 Contributors........................................................................................................................8 Users..................................................................................................................................8
    [Show full text]
  • 1 What Is Gimp? 3 2 Default Short Cuts and Dynamic Keybinding 9
    GUM The Gimp User Manual version 1.0.0 Karin Kylander & Olof S Kylander legalities Legalities The Gimp user manual may be reproduced and distributed, subject to the fol- lowing conditions: Copyright © 1997 1998 by Karin Kylander Copyright © 1998 by Olof S Kylander E-mail: [email protected] (summer 98 [email protected]) The Gimp User Manual is an open document; you may reproduce it under the terms of the Graphic Documentation Project Copying Licence (aka GDPL) as published by Frozenriver. This document is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANT- ABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Graphic Documentation Project Copying License for more details. GRAPHIC DOCUMENTATION PROJECT COPYING LICENSE The following copyright license applies to all works by the Graphic Docu- mentation Project. Please read the license carefully---it is similar to the GNU General Public License, but there are several conditions in it that differ from what you may be used to. The Graphic Documentation Project manuals may be reproduced and distrib- uted in whole, subject to the following conditions: The Gimp User Manual Page i Legalities All Graphic Documentation Project manuals are copyrighted by their respective authors. THEY ARE NOT IN THE PUBLIC DOMAIN. • The copyright notice above and this permission notice must be preserved complete. • All work done under the Graphic Documentation Project Copying License must be available in source code for anyone who wants to obtain it. The source code for a work means the preferred form of the work for making modifications to it.
    [Show full text]
  • Evil Twin Attack Android Apk
    Evil twin attack android apk Continue Evil double attack on android (alk99) root requered @abderrahaman this attack is similar to the stream and linset, but in another plate form video tuto'gt; alk99 csploit iptables binary termux android webserver (php server ) open csploit garnt superuser to install the resolution of the core new and wait, until he has finished extracting the close application en termux and wait until he did the installation type on termux : pkg install tsu pkg install git exit open server for php (or any other android webserver support php) install the newest package to copy the default page (file index ...) or page you prefer from fake pages go to you interchannel storage www and go public past it here and go to the server for the start of the hotspot your mobile phone and on the server for php choose wlan0 192.168.43.1 click on the starter server go to your browser and bring now all working clone git clone CD clone-download-Alk-evil- twin tsu bash install.sh wait Until it finishes in the view now type: exit and open termux and type: (now the server has to be launched, and the client must be connected) tsu alk99 alk99-evil-twin-on-andoid-v1 Copyright (C) 2018 by abderra in this new wireless attack, I will walk you through the process of creating Hot Spot 2.0 Evil Twinman. This is potentially another vector attack that can be used with or without social engineering that a penetration tester or nefarious actor can use when performing a wireless pen test or trying to socially engineer the user.
    [Show full text]
  • Ttwin Version 3 User Guide
    User’s Guide Terminal Emulation for Windows P.O. Box 2197 Strawberry Hills NSW 2012 AUSTRALIA Phone: +61 2 8396 3000 Fax: +61 2 9318 1515 Email: [email protected] [email protected] Web site: http://www.ttwin.com Copyright Notice © Copyright Turbosoft All rights reserved. This manual is protected by copyright. No part of this manual may be reproduced in any form without written permission of the copyright owner. All efforts have been made to ensure the contents of this manual are correct. If any errors are detected, please inform Turbosoft. The contents of this manual are subject to change without notice. Turbosoft can assume no responsibility for errors in this manual or their consequence. The software described in this manual is supplied under a license agreement and may be used or copied only in accordance with the terms of that agreement. Licenses and Trademarks All Licenses, Copyright and Trademarks are the property of their respective owners. TTWIN User's Guide Version 3 About this Manual The TTWIN 3 User's Guide is a comprehensive guide to all the information you need to work easily and efficiently with Turbosoft's TTWIN 3 terminal emulation package. Organisation of this Manual The TTWIN 3 User's Guide is divided into 5 parts: Part One - Basic Concepts Chapter 1 Introduction. A brief description of the files supplied with the TTWIN 3 product and the system requirements. Chapter 2 Installation. The steps to follow when setting up TTWIN 3 on a local PC or on a network file server. This chapter also includes modifying and uninstalling TTWIN 3.
    [Show full text]
  • Maxcam Emu Software Orf
    Maxcam emu software orf Software Without Biss Support / Ohne Biss Support NOTED!! Important!! Wichtig!!! FOR Biss Use Software / Für Biss Version Max Cam Twin V2 Software Fortuna (EMU). Thema: Max Cam Twin V2 Software Fortuna (EMU) Nagra 2 Key Edit for TV Globo,Swisscom > Menu > Key Edit > insert with remote. We presents new EMU Software and some minor fixes for good "old" Max Cam Twin V1. Have Fun Software Without Biss Support / Ohne. Max Cam Twin V2 Software Fortuna (EMU). Thumbnail Nagra 2 Key Edit for TV Globo,Swisscom > Menu > Key Edit > insert with remote. Thema: Max Cam Twin V2 Software Fortuna (EMU) ORF1,ORF2,ORF Regional Channels, H * Panasonic DMR-BST/BCT. EMU Funktion im Menü on/off * BISS Key Eingabe über die Fernbedienung * Austria Sat und ORF ebenfalls inkludiert. Open Channels on 19,2. Surrender Software v for V2 or v for ULTRA flash> after this firmware> Settings in the menu and disable Cam check where. Guten Morgen, ich bin neuer Besitzer einer Maxcam Twin und habe mir von Emu bedeutet, das du ORF, Austriasat (nur SD), VH1, einige frz. Infos Max Cam Twin V2 Software Fortuna (Emu) ORF ICE card Irdeto Mode Sim reader, decryption problem in some other TV´s fixed. Software aufbau ist Maxcam v + Emu O*F und U***yM****a . This release constitutes the programs of ORF and Austria Sat SD. Infos EMU - Firmware Max Cam Twin V2/ Ultra Fortuna . ORF / Austria-Sat / MTV / TNT Sat funktionieren alle seit geraumer Zeit nicht. Software Without Biss Support / Ohne Biss Support NOTED!! Important!! Wichtig!!! FOR Biss Use Software / Für Biss Version MaxCam Twin HIER KAUFEN First software for the new Max Cam Twin V2 module enjoy it wants the Max [Arşiv] MaxCam Twin EMU Software Diğer Modüller.
    [Show full text]
  • TWIN: a Window System for ‘Sub-PDA’ Devices
    TWIN: A Window System for ‘Sub-PDA’ Devices Keith Packard HP Cambridge Research Laboratory [email protected] Abstract (200MHz, fixed point, 384KB on-chip RAM), 8MB of flash memory, an Agilent ADNS-2030 Optical mouse sensor, a Zigbee (802.15.4) With embedded systems gaining high resolu- wireless networking interface and an Epson tion displays and powerful CPUs, the desire for L2F50176T00 LCD screen (1.1”, 120 x 160 sophisticated graphical user interfaces can be color). At 200MHz, this processor is capable of realized in even the smallest of systems. While significant computation, but 384KB holds little the CPU power available for a given power data. budget has increased dramatically, these tiny systems remain severely memory constrained. In contrast, early graphical user interfaces for This unique environment presents interesting desktop platforms was more constrained by challenges in graphical system design and im- available CPU performance than by memory. plementation. To explore this particular space, Early workstations had at least a million pixels a new window system, TWIN, has been de- and a megabyte of physical memory but only veloped. Using ideas from modern window about 1 MIPS of processing power. Software systems in larger environments, TWIN offers in this environment was much more a matter overlapping translucent windows, anti-aliased of what could be made fast enough than what graphics and scalable fonts in a total memory would fit in memory. budget of 100KB. While the X window system[7] has been ported to reasonably small environments[2], a mini- Motivation mal combination of window system server, pro- tocol library and application toolkit consumes on the order of 4 to 5MB of memory, some ten Researchers at the HP Cambridge Research times more than is available in the target plat- Laboratory are building a collection of sub-PDA form.
    [Show full text]
  • Atheros Communications License
    Atheros Communications License Copyright (c) 2008, Atheros Communications, Inc. All rights reserved. Redistribution. Redistribution and use in binary form, without modification, are permitted provided that the following conditions are met: * Redistributions must reproduce the above copyright notice and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of Atheros Communications, Inc. nor the names of its suppliers may be used to endorse or promote products derived from this software without specific prior written permission. * No reverse engineering, decompilation, or disassembly of this software is permitted. Limited patent license. Atheros Communications, Inc. grants a world-wide, royalty-free, non-exclusive license under patents it now or hereafter owns or controls to make, have made, use, import, offer to sell and sell ("Utilize") this software, but solely to the extent that any such patent is necessary to Utilize the software alone, or in combination with an operating system licensed under an approved Open Source license as listed by the Open Source Initiative at http://opensource.org/licenses. The patent license shall not apply to any other combinations which include this software. No hardware per se is licensed hereunder. DISCLAIMER. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER I N CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    [Show full text]
  • Free and Open Source Software
    Free and open source software Copyleft ·Events and Awards ·Free software ·Free Software Definition ·Gratis versus General Libre ·List of free and open source software packages ·Open-source software Operating system AROS ·BSD ·Darwin ·FreeDOS ·GNU ·Haiku ·Inferno ·Linux ·Mach ·MINIX ·OpenSolaris ·Sym families bian ·Plan 9 ·ReactOS Eclipse ·Free Development Pascal ·GCC ·Java ·LLVM ·Lua ·NetBeans ·Open64 ·Perl ·PHP ·Python ·ROSE ·Ruby ·Tcl History GNU ·Haiku ·Linux ·Mozilla (Application Suite ·Firefox ·Thunderbird ) Apache Software Foundation ·Blender Foundation ·Eclipse Foundation ·freedesktop.org ·Free Software Foundation (Europe ·India ·Latin America ) ·FSMI ·GNOME Foundation ·GNU Project ·Google Code ·KDE e.V. ·Linux Organizations Foundation ·Mozilla Foundation ·Open Source Geospatial Foundation ·Open Source Initiative ·SourceForge ·Symbian Foundation ·Xiph.Org Foundation ·XMPP Standards Foundation ·X.Org Foundation Apache ·Artistic ·BSD ·GNU GPL ·GNU LGPL ·ISC ·MIT ·MPL ·Ms-PL/RL ·zlib ·FSF approved Licences licenses License standards Open Source Definition ·The Free Software Definition ·Debian Free Software Guidelines Binary blob ·Digital rights management ·Graphics hardware compatibility ·License proliferation ·Mozilla software rebranding ·Proprietary software ·SCO-Linux Challenges controversies ·Security ·Software patents ·Hardware restrictions ·Trusted Computing ·Viral license Alternative terms ·Community ·Linux distribution ·Forking ·Movement ·Microsoft Open Other topics Specification Promise ·Revolution OS ·Comparison with closed
    [Show full text]
  • Linux Journal | July 2017 | Issue
    ™ Patch Managment Best Practices A Guide to Using Plex in Your Home Network JULY 2017 | ISSUE 279 Since 1994: The Original Magazine of the Linux Community http://www.linuxjournal.com BUILD YOUR OWN CLUSTER EOF: Linux for Everyone— All 7.5 Billion of Us PLUS: WATCH: Learn Golang ISSUE OVERVIEW and Back Up V GitHub Repositories LJ279-July2017.indd 1 6/21/17 4:31 PM NEW! Managing Harnessing Container the Power Security and of the Cloud Practical books Compliance with SUSE in Docker Author: Author: Petros Koutoupis for the most technical Petros Koutoupis Sponsor: Sponsor: SUSE people on the planet. Twistlock DevOps for An the Rest of Us Architect’s Author: Guide: John S. Tonello Linux for GEEK GUIDES Sponsor: Enterprise IT Puppet Author: Sol Lederman Sponsor: SUSE Memory: Past, Cloud-Scale Present and Automation Future—and with Puppet the Tools to Author: Optimize It John S. Tonello Author: Sponsor: Petros Koutoupis Puppet Sponsor: Intel Download books for free with a Why Innovative Tame the simple one-time registration. App Developers Docker Life Love High-Speed Cycle with http://geekguide.linuxjournal.com OSDBMS SUSE Author: Author: Ted Schmidt John S. Tonello Sponsor: Sponsor: IBM SUSE LJ279-July2017.indd 2 6/21/17 4:31 PM NEW! Managing Harnessing Container the Power Security and of the Cloud Practical books Compliance with SUSE in Docker Author: Author: Petros Koutoupis for the most technical Petros Koutoupis Sponsor: Sponsor: SUSE people on the planet. Twistlock DevOps for An the Rest of Us Architect’s Author: Guide: John S. Tonello Linux for GEEK GUIDES Sponsor: Enterprise IT Puppet Author: Sol Lederman Sponsor: SUSE Memory: Past, Cloud-Scale Present and Automation Future—and with Puppet the Tools to Author: Optimize It John S.
    [Show full text]
  • Appendix C Graphics and Computing Gpus
    C APPENDIX Graphics and Computing GPUs John Nickolls Imagination is more Director of Architecture important than NVIDIA knowledge. David Kirk Chief Scientist Albert Einstein On Science, 1930s NVIDIA C.1 Introduction C-3 C.2 GPU System Architectures C-7 C.3 Programming GPUs C-12 C.4 Multithreaded Multiprocessor Architecture C-24 C.5 Parallel Memory System C-36 C.6 Floating-point Arithmetic C-41 C.7 Real Stuff: The NVIDIA GeForce 8800 C-45 C.8 Real Stuff: Mapping Applications to GPUs C-54 C.9 Fallacies and Pitfalls C-70 C.10 Concluding Remarks C-74 C.11 Historical Perspective and Further Reading C-75 C.1 Introduction Th is appendix focuses on the GPU—the ubiquitous graphics processing unit graphics processing in every PC, laptop, desktop computer, and workstation. In its most basic form, unit (GPU) A processor the GPU generates 2D and 3D graphics, images, and video that enable window- optimized for 2D and 3D based operating systems, graphical user interfaces, video games, visual imaging graphics, video, visual computing, and display. applications, and video. Th e modern GPU that we describe here is a highly parallel, highly multithreaded multiprocessor optimized for visual computing. To provide visual computing real-time visual interaction with computed objects via graphics, images, and video, A mix of graphics the GPU has a unifi ed graphics and computing architecture that serves as both a processing and computing programmable graphics processor and a scalable parallel computing platform. PCs that lets you visually interact with computed and game consoles combine a GPU with a CPU to form heterogeneous systems.
    [Show full text]
  • Mellanox Switch Management System (MLNX OS) Software: End-User Agreement
    MELLANOX SWITCH MANAGEMENT SYSTEM END USER LICENSE AGREEMENT Mellanox Switch Management System (MLNX_OS) Software: End-User Agreement PLEASE READ THE FOLLOWING TERMS AND CONDITIONS OF THIS MELLANOX END USER LICENSE AGREEMENT (THIS “AGREEMENT”) BEFORE INSTALLING OR USING THE MELLANOX SOFTWARE. THE MELLANOX SOFTWARE, WHICH INCLUDES ALL COMPUTER SOFTWARE IN BINARY FORM THAT IS DELIVERED TO LICENSEE, GENERALLY DESCRIBED AS THE MELLANOX SWITCH MANAGEMENT SYSTEM (MLNX_OS) SOFTWARE, AND ALL INTELLECTUAL PROPERTY RIGHTS THEREIN OR THERETO AND ANY ASSOCIATED MEDIA AND PRINTED MATERIALS, AND ANY “ONLINE” OR ELECTRONIC DOCUMENTATION, IS REFERRED TO HEREIN AS THE “SOFTWARE”. INSTALLATION OR USAGE OF THE SOFTWARE INDICATES YOUR ACCEPTANCE OF THE TERMS OF THIS AGREEMENT, AND CREATES A LEGAL AND BINDING AGREEMENT BETWEEN YOU (EITHER AN INDIVIDUAL OR AN ENTITY) (“YOU” OR “LICENSEE”) AND MELLANOX TECHNOLOGIES LTD. AND ITS AFFILIATES (“MELLANOX”). IF YOU DO NOT AGREE WITH THE TERMS AND CONDITIONS OF THIS AGREEMENT, YOU SHALL NOT USE OR COPY THIS SOFTWARE PRODUCT AND YOU MUST PROMPTLY RETURN THIS PACKAGE TO MELLANOX. 1. General Each copy of the Software is intended for use only in conjunction with Mellanox’s managed switch products (“Mellanox Products”) and is subject to the terms of this Agreement. 2. Grant of License Subject to the terms and conditions of this Agreement, Mellanox grants you a personal, non-exclusive, non- transferable license to use the Software in binary form for your internal business purposes solely in connection with Mellanox Products and not for further distribution. 2.1. Archive. You may use software back-up utilities to make one back-up copy of the Software.
    [Show full text]