You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
so i found that sending that payload via Postman (now supports ws://)
i was able to take the data payload with the HEP3 section from the wireshark and hepgen.js and upload that into ws:// and connect to socket (interesting enough auth doesn't care on this ws:// connection.
I send it as Binary (Hexadecimal) and HEP was able to extract / parse as it had to start with 48455033
....
a few things i noticed though is overtime our ws:// sockets stop working and i have to restart heplifiy-server to get that back online to send but i would need more debug ws:// logs to determine if that is something to warrant as a new type of bug.
We are trying to send HEP3 payload buffer array (hep.js) over to ws://xx.xx.xx.xx:3000
I only see 1 log in /var/log/messages and i get this showing from decoder.go
heplify-server: 2022/08/22 06:09:21.900048 decoder.go:111: WARN malformed packet with length 1906 which is neither hep nor protobuf encapsulated
When I send the 418 byte payload its showing 1980byes on the tcpdump trace.
https://github.com/sipcapture/homer/wiki/HEP-WS-WSS-Socket (this was what i was referencing to find any documentation going the ws route)
i took the buffer from hepgen.js and took the raw payload and tried to send that.
not sure if theres an example payload to send via ws:// or what is a good UDP payload i need to convert to to send
echo -ne "$(echo '4845503301c1XXXX' sed -e 's/../\\x&/g')" | nc -4u -w0 xx.xx.xx.xx 9060
The text was updated successfully, but these errors were encountered: