<!--
Kamailio Project uses GitHub Issues only for bugs in the code or feature requests. Please use this template only for bug reports.
If you have questions about using Kamailio or related to its configuration file, ask on sr-users mailing list:
* https://lists.kamailio.org/mailman3/postorius/lists/sr-users.lists.kamailio…
If you have questions about developing extensions to Kamailio or its existing C code, ask on sr-dev mailing list:
* https://lists.kamailio.org/mailman3/postorius/…
[View More]lists/sr-dev.lists.kamailio.o…
Please try to fill this template as much as possible for any issue. It helps the developers to troubleshoot the issue.
If there is no content to be filled in a section, the entire section can be removed.
You can delete the comments from the template sections when filling.
You can delete next line and everything above before submitting (it is a comment).
-->
### Description
<!--
Explain what you did, what you expected to happen, and what actually happened.
-->
Migrating from Kamailio 5.6.4 IMS to Kamailio 5.7.1 IMS; using Open5GS CN, Amarisoft CallBox eNB, and Huawei UE to implement VoLTE infrastructure for lab testing. VoLTE works in Kamailio 5.6.4 IMS with IPSEC and non-IPSEC UE's; but Kamailio 5.7.1 IMS not working yet with IPSEC UE.
Client and server port settings in P-CSCF kamailio.cfg:
...
modparam("ims_ipsec_pcscf", "ipsec_client_port", 5100)
modparam("ims_ipsec_pcscf", "ipsec_server_port", 6100)
...
Debug log shows ports are exchanged (server port used as client port and vice-versa):
...
Jul 18 12:15:30 corsa03 p-cscf[58287]: DEBUG: ims_ipsec_pcscf [cmd.c:460]: create_ipsec_tunnel(): Creating security associations: Local IP: 10.169.138.17 **port_pc: 6100 port_ps: 5100**; UE IP: 10.46.0.6; port_uc 31409 port_us 31894; spi_pc 4096, spi_ps 4097, spi_uc 48734730, spi_us 96335982, alg hmac-md5-96, ealg null
...
### Troubleshooting
spi_add function definition and declaration differ:
From src/modules/ims_ipsec_pcscf/spi_list.h:
int spi_add(spi_list_t *list, uint32_t spi_cid, uint32_t spi_sid,
**uint16_t cport, uint16_t sport**);
But in spi_list.c:
int spi_add(spi_list_t *list, uint32_t spi_cid, uint32_t spi_sid,
**uint16_t sport, uint16_t cport**)
#### Reproduction
<!--
If the issue can be reproduced, describe how it can be done.
-->
#### Debugging Data
<!--
If you got a core dump, use gdb to extract troubleshooting data - full backtrace,
local variables and the list of the code at the issue location.
gdb /path/to/kamailio /path/to/corefile
bt full
info locals
list
If you are familiar with gdb, feel free to attach more of what you consider to
be relevant.
-->
```
(paste your debugging data here)
```
#### Log Messages
<!--
Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->
```
(paste your log messages here)
```
#### SIP Traffic
<!--
If the issue is exposed by processing specific SIP messages, grab them with ngrep or save in a pcap file, then add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->
```
(paste your sip traffic here)
```
### Possible Solutions
<!--
If you found a solution or workaround for the issue, describe it. Ideally, provide a pull request with a fix.
-->
Applied following patch:
--- a/src/modules/ims_ipsec_pcscf/spi_list.c 2023-06-28 09:40:45.000000000 +0200
+++ b/src/modules/ims_ipsec_pcscf/spi_list.c 2023-07-18 16:12:11.166476076 +0200
@@ -51,7 +51,7 @@
}
int spi_add(spi_list_t *list, uint32_t spi_cid, uint32_t spi_sid,
- uint16_t sport, uint16_t cport)
+ uint16_t cport, uint16_t sport)
{
if(!list) {
return 1;
Log now shows expected client and server port:
...
Jul 18 17:45:22 corsa03 p-cscf[82076]: DEBUG: ims_ipsec_pcscf [cmd.c:460]: create_ipsec_tunnel(): Creating security associations: Local IP: 10.169.138.17 **port_pc: 5100 port_ps: 6100**; UE IP: 10.46.0.6; port_uc 31411 port_us 31896; spi_pc 4096, spi_ps 4097, spi_uc 48734732, spi_us 96335984, alg hmac-md5-96, ealg null
...
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
```
version: kamailio 5.7.1 (x86_64/linux)
flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, MEM_JOIN_FREE, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED
ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: unknown
compiled on 16:22:26 Jul 18 2023 with x86_64-pc-linux-gnu-gcc 13.1.1
```
* **Operating System**:
<!--
Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04, CentOS 7.1, ...), MacOS, xBSD, Solaris, ...;
Kernel details (output of `lsb_release -a` and `uname -a`)
-->
```
Linux corsa03 6.4.2-gentoo-x86_64 #2 SMP PREEMPT_DYNAMIC Tue Jul 11 14:35:45 CEST 2023 x86_64 AMD EPYC 7513 32-Core Processor AuthenticAMD GNU/Linux
```
--
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/3513
You are receiving this because you are subscribed to this thread.
Message ID: <kamailio/kamailio/issues/3513(a)github.com>
[View Less]
Module: kamailio
Branch: master
Commit: 20634fccc59c82a35b45a3da0b8e6a0e64acb37e
URL: https://github.com/kamailio/kamailio/commit/20634fccc59c82a35b45a3da0b8e6a0…
Author: Stefan Mititelu <stefan-cristian.mititelu(a)1and1.ro>
Committer: Henning Westerholt <hw(a)gilawa.com>
Date: 2023-08-14T17:08:35+02:00
ims_qos: doc and logs update
---
Modified: src/modules/ims_qos/doc/ims_qos_admin.xml
Modified: src/modules/ims_qos/ims_qos_mod.c
---
Diff: https://github.com/kamailio/kamailio/…
[View More]commit/20634fccc59c82a35b45a3da0b8e6a0…
Patch: https://github.com/kamailio/kamailio/commit/20634fccc59c82a35b45a3da0b8e6a0…
---
diff --git a/src/modules/ims_qos/doc/ims_qos_admin.xml b/src/modules/ims_qos/doc/ims_qos_admin.xml
index b8a36c7b136..7755a963abd 100644
--- a/src/modules/ims_qos/doc/ims_qos_admin.xml
+++ b/src/modules/ims_qos/doc/ims_qos_admin.xml
@@ -29,7 +29,7 @@
<itemizedlist>
<listitem>
- <para>Dialog</para>
+ <para>IMS Dialog</para>
</listitem>
<listitem>
@@ -625,8 +625,8 @@ route[REG_AAR_REPLY]
</listitem>
</itemizedlist>
- <para>This function can be used from REQUEST_ROUTE or
- ONREPLY_ROUTE.</para>
+ <para>This function can be used only from ONREPLY_ROUTE, only for replies to INVITE, UPDATE, PRACK.
+ The reply and request must have SDP, for this function to work properly.</para>
<para>p.s. this is executed asynchronously. See example on how to
retrieve return value</para>
diff --git a/src/modules/ims_qos/ims_qos_mod.c b/src/modules/ims_qos/ims_qos_mod.c
index d2502020450..9ff174f03eb 100644
--- a/src/modules/ims_qos/ims_qos_mod.c
+++ b/src/modules/ims_qos/ims_qos_mod.c
@@ -205,8 +205,8 @@ static int pv_t_copy_msg(struct sip_msg *src, struct sip_msg *dst)
}
-static cmd_export_t cmds[] = {{"Rx_AAR", (cmd_function)w_rx_aar, 4, fixup_aar,
- 0, REQUEST_ROUTE | ONREPLY_ROUTE},
+static cmd_export_t cmds[] = {
+ {"Rx_AAR", (cmd_function)w_rx_aar, 4, fixup_aar, 0, ONREPLY_ROUTE},
{"Rx_AAR_Register", (cmd_function)w_rx_aar_register, 2,
fixup_aar_register, 0, REQUEST_ROUTE},
{0, 0, 0, 0, 0, 0}};
@@ -801,7 +801,7 @@ static int w_rx_aar(
}
if(t->uas.status >= 200) {
- LM_DBG("transaction sent out a final response already - %d\n",
+ LM_WARN("transaction sent out a final response already - %d\n",
t->uas.status);
return result;
}
@@ -864,13 +864,13 @@ static int w_rx_aar(
|| memcmp(t->method.s, "UPDATE", 6) == 0))) {
if(cscf_get_content_length(msg) == 0
|| cscf_get_content_length(orig_sip_request_msg) == 0) {
- LM_DBG("No SDP offer answer -> therefore we can not do Rx AAR");
+ LM_WARN("No SDP offer answer -> therefore we can not do Rx AAR");
//goto aarna; //AAR na if we don't have offer/answer pair
return result;
}
} else {
- LM_DBG("Message is not response to INVITE, PRACK or UPDATE -> "
- "therefore we do not Rx AAR");
+ LM_WARN("Message is not response to INVITE, PRACK or UPDATE -> "
+ "therefore we do not Rx AAR");
return result;
}
@@ -1162,7 +1162,7 @@ static int w_rx_aar(
int ret = create_new_callsessiondata(&callid, &ftag, &ttag, &identifier,
identifier_type, &ip, ip_version, &rx_authdata_p);
if(!ret) {
- LM_DBG("Unable to create new media session data parcel\n");
+ LM_ERR("Unable to create new media session data parcel\n");
goto error;
}
[View Less]
Module: kamailio
Branch: master
Commit: 2fd5d881563126f7425730f798afcbfc2feeac65
URL: https://github.com/kamailio/kamailio/commit/2fd5d881563126f7425730f798afcbf…
Author: Kamailio Dev <kamailio.dev(a)kamailio.org>
Committer: Kamailio Dev <kamailio.dev(a)kamailio.org>
Date: 2023-08-12T13:46:24+02:00
modules: readme files regenerated - rabbitmq ... [skip ci]
---
Modified: src/modules/rabbitmq/README
Modified: src/modules/xhttp/README
---
Diff: https://github.com/kamailio/…
[View More]kamailio/commit/2fd5d881563126f7425730f798afcbf…
Patch: https://github.com/kamailio/kamailio/commit/2fd5d881563126f7425730f798afcbf…
---
diff --git a/src/modules/rabbitmq/README b/src/modules/rabbitmq/README
index 942afffa83f..889512b6a48 100644
--- a/src/modules/rabbitmq/README
+++ b/src/modules/rabbitmq/README
@@ -176,7 +176,7 @@ modparam("rabbitmq", "direct_reply_to", 1)
* content_type - the content_type of the messagebody.
* messagebody - the messagebody to be published.
- This function can be used from REQUEST_ROUTE.
+ This function can be used from any route.
Example 1.5. rabbitmq_publish usage
rabbitmq_publish("exchange", "routing_key", "application/json", "$avp(json_reque
diff --git a/src/modules/xhttp/README b/src/modules/xhttp/README
index 9a59c839aa1..ec009bacafb 100644
--- a/src/modules/xhttp/README
+++ b/src/modules/xhttp/README
@@ -83,8 +83,8 @@ Chapter 1. Admin Guide
SIP parser can easily handle HTTP requests just by adding a fake Via
header.
- The <module>xmlrpc</module> module uses the same concept. The xHTTP
- module offers a generic way of handling the HTTP protocol, by calling
+ The xmlrpc module uses the same concept. The xHTTP module offers a
+ generic way of handling the HTTP protocol, by calling
event_route[xhttp:request] in your config. You can check the HTTP URL
via the config variable $hu. Note that use of $ru will raise errors
since the structure of an HTTP URL is not compatible with that of a SIP
@@ -222,7 +222,10 @@ event_route[xhttp:request] {
6.1. xhttp:request
- The event route is executed when a new HTTP request is received.
+ The event route is executed when a new HTTP request is received. Most
+ of the variables related to a SIP request can be used inside this event
+ route to get HTTP request attributes (e.g., $si - source IP, $hdr(X) -
+ body of header X, $rm - request method, $rb - request body, ...).
...
tcp_accept_no_cl=yes
...
[View Less]