Sending commands/APDUs to a real life Smart Card.
Australia is a strange country; As a kid I was scared of dogs, and in response, our family got a dog. This year started off with adventures working with ASN.1 encoded data, and after a week of banging my head against the table, I was scared of ASN.1 encoding. But now I love dogs, and […]
Increasing the SSH timeout in Ansible
A while ago I wrote a Python library for interfacing Open5GS HSS to Python. The Open5GS HSS uses a MongoDB backend, so the library is just running formatted Mongo queries. You can create, edit and delete subscribers in the HSS, along with modifying any parameters you can from the WebUI. Take a look: https://github.com/open5gs/open5gs/tree/master/misc/db/python
An update to PyHSS to support IMS Authentication for VoLTE
Using KEMI to handle Kamailio SIP Routing in Python
Using KEMI to write routing logic using languages like Python, Ruby, Lua and JS
How to encode and decode MCC and MNC as PLMN Identifiers
Feature Update on PyHSS the Python Home Subscriber Server
Note: NextEPC the Open Source project rebranded as Open5Gs in 2019 due to a naming issue. The remaining software called NextEPC is a branch of an old version of Open5Gs. This post was written before the rebranding. I’ve been working for some time on Private LTE networks, the packet core I’m using is NextEPC, it’s […]
Connecting to RTPengine via Python
I recently started working on an issue that I’d seen was to do with the HSS response to the MME on an Update Location Answer. I took some Wireshark traces of a connection from the MME to the HSS, and compared that to a trace from a different HSS. (Amarisoft EPC/HSS) The Update Location Answer […]
Basic usage of a Python RTP library I wrote
I’ve written in the past about SCTP – Stream Control Transmission Protocol, talking about it’s advantages and how to implement it in Kamailio. If you’d like to write your own software using SCTP there’s a fantastic SCTP sockets library from P1 Security that makes this easy as any other socket programming. Take a look at […]
How the SIP Authentication mechanism works, and how we can reverse it to check the password we’re expecting is the encrypted value we’re seeing in captures.