This is merely a historical archive of years 2008-2021, before the migration to mailman3.
A maintained and still updated list archive can be found at https://lists.osmocom.org/hyperkitty/list/simtrace@lists.osmocom.org/.
J. Félix Ontañón felix.ontanon at podgroup.comHi Sunil, I recently wrote a quick few internal notes for my colleagues to use Simtrace2+Wireshark on Ubuntu 18.04 I'll share with you in the case it helps. Using Simtrace2 I had not to flash any firmware, it works out of the box. ------ h1. Simtrace and Wireshark h2. Simtrace2 The official installation steps are here: https://osmocom.org/projects/simtrace2/wiki But !! Follow this installation steps for a full-debian-packaged installation (tested on Ubuntu 18.04 LTS). Let's first prepare your system to compile debian packages, let's install some recurring compiling dependencies and then devscripts (the utilities for building debian packages): $ sudo apt install build-essential libtool libtalloc-dev shtool autoconf automake git-core pkg-config make gcc $ sudo apt install devscripts First, install libosmocore dependencies, download libosmocore itself and build the debian packages and install $ sudo apt install libgnutls28-dev doxygen libtalloc-dev $ git clone git://git.osmocom.org/libosmocore.git $ cd libosmocore $ debuild -uc -us $ cd .. $ sudo dpkg -i *deb Next, install simtrace2 dependencies, download simtrace2 itself and build the debian packages and install $ sudo apt install libusb-1.0-0-dev libpcsclite-dev $ git clone git://git.osmocom.org/simtrace2.git $ cd simtrace2 $ debuild -uc -us $ cd .. $ sudo dpkg -i *deb Finally, let's configure perms to launch simtrace2 in user space $ sudo adduser $USERNAME plugdev $ sudo wget -O /etc/udev/rules.d/99-simtrace2.rules https://git.osmocom.org/simtrace2/plain/host/99-simtrace2.rules $ sudo service udev reload $ sudo udevadm control --reload-rules $ sudo udevadm trigger Plug simtrace2 and test !!! $ simtrace2-sniff simtrace2-sniff - Phone-SIM card communication sniffer (C) 2010-2017 by Harald Welte <laforge at gnumonks.org> (C) 2018 by Kevin Redon <kredon at sysmocom.de> Using USB device 1d50:60e3 Addr=15, Path=1-3, Cfg=1, Intf=0, Alt=0: 255/1/0 (SIMtrace Sniffer) Entering main loop Card state change: reset asserted ATR: 3b 9f 96 80 1f 87 80 31 e0 73 fe 21 19 67 4a 55 73 30 31 07 46 be PPS: ff 10 96 79 PPS: ff 10 96 79 Fi/Di switched to 512/32 TPDU: 00 a4 00 04 02 3f 00 61 2c TPDU: 00 c0 00 00 2c 62 2a 82 02 78 21 83 02 3f 00 a5 09 80 01 71 83 04 00 03 18 9c 8a 01 05 8c 04 26 1a 00 00 c6 0c 90 01 60 83 01 01 83 01 81 83 01 0a 90 00 TPDU: 00 a4 08 04 02 2f e2 61 21 .. .. h2. Wireshark Install wireshark, run as root, capture localhost. Apply the following wireshark filter: udp port 4729 -- *J. Félix Ontañón* Director of Research and Innovation Pod Group felix.ontanon at podgroup.com www.podgroup.com <https://podgroup.com/> www.podm2m.com <https://podm2m.com/> www.pod.solutions <https://pod.solutions/> UK: +44 (0)1223 850 900 <+44%201223%20850900> USA: +1 415 7070 500 Spain: +34 954 050 200 <+34%20954%2005%2002%2000> [image: Facebook] <https://www.facebook.com/PodM2M/> [image: Twitter] <https://twitter.com/podm2m> [image: LinkedIn] <https://linkedin.com/company-beta/236154/> [image: Instagram] <https://www.instagram.com/podm2m/> *Sales*: sales at podgroup.com *Support*: support at podgroup.com -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.osmocom.org/pipermail/simtrace/attachments/20190502/bc3e430f/attachment.htm>