Date: Wed, 06 Apr 2016 11:05:20 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 208572] [NEW PORT]: net/sngrep - Sip calls grep Message-ID: <bug-208572-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D208572 Bug ID: 208572 Summary: [NEW PORT]: net/sngrep - Sip calls grep Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: tad@vif.com Created attachment 169031 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D169031&action= =3Dedit new port: net/sngrep - sip calls grep sngrep - SIP Messages flow viewer sngrep is a terminal tool that groups SIP (Session Initiation Protocol) Messages by Call-Id, and displays them in arrow flows similar to the used in SIP RFCs. The aim of this tool is to make easier the process of learnig or debugging SIP. It recognizes UDP, TCP and partially TLS SIP packets and understands bpf filter logic in the same way ngrep and tcpdump does. WWW: https://github.com/irontec/sngrep --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-208572-13>