SIPSAK: The SIP Swiss Army Knife.

I discovered this useful tool talking with a colleague, SIPSAK is a small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications.

It can be used for some simple tests on SIP applications and devices.

SIPSAK Main Features:
sends OPTIONS request
sends text files (which should contain SIP requests)
traceroute (see section 11 in RFC3261)
user location test
flooding test
random character trashed test
interpret and react on response
authentication with qop supported (MD5 and SHA1)
short notation supported for receiving (not for sending)
unlimited string replacements in files and requests
add any header to the requests
can simulate calls in usrloc mode
uses symmetric signaling and thus should work behind NAT
can upload any given contact to a registrar
send messages to any SIP destination
Nagios compliant return codes
search for strings in reply with regluar expression
use multiple processes to create more server load
read SIP message from STDIN (e.g. from a pipe ‘|’)
supports DNS SRV through c-ares or libruli
supports UDP and TCP transport

Some Usage Examples:
Send an OPTIONS request to nobody@foo.bar and display received replies:

sipsak -vv -s sip:nobody@foo.bar

Trace the SIP path to nobody@foo.bar:

sipsak -T -s sip:nobody@foo.bar

Insert a forwarding contact for myself at work to me at home for one hour and authenticated with password if required:

sipsak -U -C sip:me@home -x 3600 -a password -s sip:myself@company

Query the currently registered bindings for myself at work and authenticate with password if required:

sipsak -I -C empty -a password -s sip:myself@work

Send the instant message “Lunch time!” to the colleague and show result:

sipsak -M -v -s sip:colleaue@work -B "Lunch time!"

For more information the MAN Page is the official and most complete resource.


Comments are closed.