Increasing the SSH timeout in Ansible

Increasing the SSH timeout in Ansible
Using Docker to containerize Kamailio instanances
A while ago I wrote a Python library for interfacing Open5GS HSS to Python. The Open5GS HSS uses a MongoDB backend, so the library is just running formatted Mongo queries. You can create, edit and delete subscribers in the HSS, along with modifying any parameters you can from the WebUI. Take a look: https://github.com/open5gs/open5gs/tree/master/misc/db/python
Using Ansible to orchestrate EPC Network Elements
A quick look at the Interface Types in the F-TIED field in GTPv2
Using Ansible to automate Kamailio deployments at scale
An update to PyHSS to support IMS Authentication for VoLTE
Using KEMI to handle Kamailio SIP Routing in Python
Using KEMI to write routing logic using languages like Python, Ruby, Lua and JS
How to encode and decode MCC and MNC as PLMN Identifiers
Feature Update on PyHSS the Python Home Subscriber Server
Note: NextEPC the Open Source project rebranded as Open5Gs in 2019 due to a naming issue. The remaining software called NextEPC is a branch of an old version of Open5Gs. This post was written before the rebranding. I’ve been working for some time on Private LTE networks, the packet core I’m using is NextEPC, it’s […]
Connecting to RTPengine via Python
I recently started working on an issue that I’d seen was to do with the HSS response to the MME on an Update Location Answer. I took some Wireshark traces of a connection from the MME to the HSS, and compared that to a trace from a different HSS. (Amarisoft EPC/HSS) The Update Location Answer […]
Basic usage of a Python RTP library I wrote
I’ve written in the past about SCTP – Stream Control Transmission Protocol, talking about it’s advantages and how to implement it in Kamailio. If you’d like to write your own software using SCTP there’s a fantastic SCTP sockets library from P1 Security that makes this easy as any other socket programming. Take a look at […]
Introduction to Encoding & Decoding data in ASN.1 (Using Python)
DNS style message amplification using SIP requests to flood a server / host.
How the SIP Authentication mechanism works, and how we can reverse it to check the password we’re expecting is the encrypted value we’re seeing in captures.