Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 06 Apr 2016 11:05:20 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 208572] [NEW PORT]: net/sngrep - Sip calls grep
Message-ID:  <bug-208572-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D208572

            Bug ID: 208572
           Summary: [NEW PORT]: net/sngrep - Sip calls grep
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs@FreeBSD.org
          Reporter: tad@vif.com

Created attachment 169031
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D169031&action=
=3Dedit
new port: net/sngrep - sip calls grep

sngrep - SIP Messages flow viewer

sngrep is a terminal tool that groups SIP (Session Initiation Protocol)
Messages by Call-Id, and displays them in arrow flows similar to the used in
SIP RFCs. The aim of this tool is to make easier the process of learnig or
debugging SIP. It recognizes UDP, TCP and partially TLS SIP packets and
understands bpf filter logic in the same way ngrep and tcpdump does.

WWW: https://github.com/irontec/sngrep

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-208572-13>