pjsua is an open source command line SIP user agent that is used as
the reference implementation for PJSIP and PJMEDIA. It has many
features, such as:
* Mutiple identities/account registrations
* Concurrent calls and conference (unlimited number, but only up
to 254 sources can be mixed to a single destination)
* Call features: call hold, call transfer (attended or unattended,
with or without refersub).
* SIP Presence/SIMPLE with PIDF and XPIDF support. PUBLISH support.
* Instant messaging and message composing indication
* DTMF digits transmission/receipt (RFC 2833)
* WAV file playing, streaming, and recording.
* Accoustic echo cancellation (AEC).
* Auto-answer, auto-play file, auto-loop RTP
* Support SIP UDP, TCP, and TLS transports. Support for DNS SRV
resolution.
* NAT traversal with rport and STUN.
* Tone generation.
* Codecs: PCMA, PCMU, GSM, Speex (including wideband/16KHz and
ultra-wideband/32KHz), L16 (8-48KHz, mono or stereo), and iLBC.
* Adaptive jitter buffer, adaptive silence detection, and packet
lost concealment audio features.
With lots of testing and help from todd@, sthen@, jakemsr@, jolan@ and
Benny Prijono.
ok todd@ sthen@
fixes an overflow in IMAP voicemail storage reachable by anyone who can
send email to a VM box accessed from the phone. AST-2007-022, found by
sprintf audit.
ok ian@
Net::SIP consists of packages for handling SIP packets, for transport
of packets, for processing packets and on top of all that a simplified
layer for common tasks.
ok sturm@
Ohphone is a fully functional H.323 endpoint command line application
that can be used to listen for incoming H.323 calls, or to initiate a
call to a remote host. It includes a simple menu that allows
interactive control of functions, as well as allowing control of most
dialing and answer functions via a phone handset.
ok kili@
Update to 1.2.9.1 which addresses a security vulnerability in the IAX2
channel driver (chan_iax2). The vulnerability affects all users with
IAX2 clients that might be compromised or used by a malicious user, and
can lead to denial of service attacks and random Asterisk server crashes
via a relatively trivial exploit.
From: maintainer Stuart Henderson <stu@spacehopper.org>