<div>Dear friends:</div> <div> </div> <div>I have installed openser-1.1.0-tls version, and it works fine with mysql, the sip flow is below:</div> <div>UA OpenSER</div> <div>invite----------------></div> <div> <----------------100 trying</div> <div> <----------------101 dialog establishement</div> <div> <----------------180 ringing</div> <div>.....</div> <div>My question is, why not have the 407 Proxy Authentication Required in the per call, see my openser.cfg file:</div> <div>#<BR># $Id: openser.cfg,v 1.6 2006/02/15 18:23:46 bogdan_iancu Exp $<BR>#<BR># simple quick-start config script<BR>#</div> <div># ----------- global configuration parameters ------------------------</div>
<div>debug=3 # debug level (cmd line: -dddddddddd)<BR>fork=yes<BR>log_stderror=no # (cmd line: -E)</div> <div>/* Uncomment these lines to enter debugging mode<BR>fork=no<BR>log_stderror=yes<BR>*/</div> <div>check_via=no # (cmd. line: -v)<BR>dns=no # (cmd. line: -r)<BR>rev_dns=no # (cmd. line: -R)<BR>port=5060<BR>children=4<BR>fifo="/tmp/openser_fifo"</div> <div>#<BR># uncomment the following lines for TLS support<BR>#disable_tls = 0<BR>#listen = tls:your_IP:5061<BR>#tls_verify = 1<BR>#tls_require_certificate = 0<BR>#tls_method = TLSv1<BR>#tls_certificate = "/usr/local/etc/openser/tls/user/user-cert.pem"<BR>#tls_private_key = "/usr/local/etc/openser/tls/user/user-privkey.pem"<BR>#tls_ca_list = "/usr/local/etc/openser/tls/user/user-calist.pem"</div> <div># ------------------ module
loading ----------------------------------</div> <div># Uncomment this if you want to use SQL database<BR>loadmodule "/usr/local/lib/openser/modules/mysql.so"</div> <div>loadmodule "/usr/local/lib/openser/modules/sl.so"<BR>loadmodule "/usr/local/lib/openser/modules/tm.so"<BR>loadmodule "/usr/local/lib/openser/modules/rr.so"<BR>loadmodule "/usr/local/lib/openser/modules/maxfwd.so"<BR>loadmodule "/usr/local/lib/openser/modules/usrloc.so"<BR>loadmodule "/usr/local/lib/openser/modules/registrar.so"<BR>loadmodule "/usr/local/lib/openser/modules/textops.so"</div> <div># Uncomment this if you want digest authentication<BR># mysql.so must be loaded !<BR>loadmodule "/usr/local/lib/openser/modules/auth.so"<BR>loadmodule "/usr/local/lib/openser/modules/auth_db.so"</div> <div># ----------------- setting module-specific parameters ---------------</div> <div># -- usrloc params --</div> <div>modparam("usrloc", "db_mode", 0)</div> <div># Uncomment this if you want to
use SQL database<BR># for persistent storage and comment the previous line<BR>modparam("usrloc", "db_mode", 2)</div> <div># -- auth params --<BR># Uncomment if you are using auth module<BR>#<BR>modparam("auth_db", "calculate_ha1", yes)<BR>#<BR># If you set "calculate_ha1" parameter to yes (which true in this config),<BR># uncomment also the following parameter)<BR>#<BR>modparam("auth_db", "password_column", "password")</div> <div># -- rr params --<BR># add value to ;lr param to make some broken UAs happy<BR>modparam("rr", "enable_full_lr", 1)</div> <div># ------------------------- request routing logic -------------------</div> <div># main routing logic</div> <div>route{</div> <div> # initial sanity checks -- messages with<BR> # max_forwards==0, or excessively long requests<BR> if (!mf_process_maxfwd_header("10"))
{<BR> sl_send_reply("483","Too Many Hops");<BR> exit;<BR> };</div> <div> if (msg:len >= 2048 ) {<BR> sl_send_reply("513", "Message too big");<BR> exit;<BR> };</div> <div> # we record-route all messages -- to make sure that<BR> # subsequent messages will go through our proxy; that's<BR> # particularly good if upstream and downstream
entities<BR> # use different transport protocol<BR> if (!method=="REGISTER")<BR> record_route();</div> <div> # subsequent messages withing a dialog should take the<BR> # path determined by record-routing<BR> if (loose_route()) {<BR> # mark routing logic in request<BR> append_hf("P-hint: rr-enforced\r\n");<BR> route(1);<BR> };</div>
<div> if (!uri==myself) {<BR> # mark routing logic in request<BR> append_hf("P-hint: outbound\r\n");<BR> # if you have some interdomain connections via TLS<BR> #if(uri=~"@tls_domain1.net") {<BR> # t_relay("tls:domain1.net");<BR> # exit;<BR> #}
else if(uri=~"@tls_domain2.net") {<BR> # t_relay("tls:domain2.net");<BR> # exit;<BR> #}<BR> route(1);<BR> };</div> <div> # if the request is for other domain use UsrLoc<BR> # (in case, it does not work, use the following command<BR> # with proper names and addresses in it)<BR> if (uri==myself) {</div>
<div> if (method=="REGISTER") {</div> <div> # Uncomment this if you want to use digest authentication<BR> if (!www_authorize("localhost", "subscriber")) {<BR> www_challenge("localhost", "0");<BR>
exit;<BR> };</div> <div> save("location");<BR> exit;<BR> };</div> <div> lookup("aliases");<BR> if (!uri==myself) {<BR> append_hf("P-hint: outbound
alias\r\n");<BR> route(1);<BR> };</div> <div> # native SIP destinations are handled using our USRLOC DB<BR> if (!lookup("location")) {<BR> sl_send_reply("404", "Not Found");<BR> exit;<BR>
};<BR> append_hf("P-hint: usrloc applied\r\n");<BR> };</div> <div> route(1);<BR>}</div> <div><BR>route[1] {<BR> # send it out now; use stateful forwarding as it works reliably<BR> # even for UDP2TCP<BR> if (!t_relay()) {<BR> sl_reply_error();<BR> };<BR> exit;<BR>}<BR>============================</div> <div> </div> <div>thanks.</div> <div> </div> <div> </div> <div> </div> <div>Mike</div><p> 
<hr size=1>Ahhh...imagining that irresistible "new car" smell?<br> Check out
<a href="http://us.rd.yahoo.com/evt=48245/*http://autos.yahoo.com/new_cars.html;_ylc=X3oDMTE1YW1jcXJ2BF9TAzk3MTA3MDc2BHNlYwNtYWlsdGFncwRzbGsDbmV3LWNhcnM-">new cars at Yahoo! Autos.</a>