Hello All.

My English is bad so I hope you can understand.

 

I have been working with Kamailio some time, I following some of Guides of http://kb.asipto.com, http://saevolgo.blogspot.com and http://nil.uniza.sk.

 

To Authenticate Asterisk sipusers I'm not have problems, but subscriber of Kamailio  authenticate is my problem.

Autenticate are denied to subscriber Kamailio.

 

In spanish I can explain it better  :-)

 

best regards

 

 

my Settings:

 

#######################

# ----- auth_db params -----

#!ifdef WITH_AUTH

modparam("auth_db", "calculate_ha1", yes)

modparam("auth_db", "load_credentials", "")

 

#!ifdef WITH_ASTERISK

modparam("auth_db", "user_column", "name")

modparam("auth_db", "password_column", "sippasswd")

modparam("auth_db", "db_url", DBASTURL)

modparam("auth_db", "version_table", 0)

#!else

modparam("auth_db", "db_url", DBURL)

modparam("auth_db", "password_column", "password")

modparam("auth_db", "use_domain", MULTIDOMAIN)

#!endif

 

####################

 

#!ifdef WITH_AUTH

 

#!ifdef WITH_ASTERISK

                # do not auth traffic from Asterisk - trusted!

                if(route(FROMASTERISK))

                               return;

#!endif

 

#!ifdef WITH_IPAUTH

                if((!is_method("REGISTER")) && allow_source_address())

                {

                               # source IP allowed

                               return;

                }

#!endif

 

                if (is_method("REGISTER") || from_uri==myself)

                {

                               # authenticate requests

#!ifdef WITH_ASTERISK

                               if (!auth_check("$fd", "sipusers", "1")) {                      #### Aquí autentifica sin problemas en caso de ser un usuario asterisk

#!else                                                                                                                         #### Pero hace caso omiso al switch.

                               if (!auth_check("$fd", "subscriber", "1")) {                 #### No autentifica subscriber de la base de datos de kamailio

#!endif

                                               auth_challenge("$fd", "0");

                                               exit;

                               }

                               # user authenticated - remove auth header

                               if(!is_method("REGISTER|PUBLISH"))

                                               consume_credentials();

                }

#!endif

                return;

}

 

#########################

 

DEBUG KAMAILIO

 

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/msg_parser.c:623]: parse_msg(): SIP Request:

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/msg_parser.c:625]: parse_msg():  method:  <REGISTER>

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/msg_parser.c:627]: parse_msg():  uri:     <sip:192.168.65.132>

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/msg_parser.c:629]: parse_msg():  version: <SIP/2.0>

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/parse_addr_spec.c:898]: parse_addr_spec(): end of header reached, state=10

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/msg_parser.c:190]: get_hdr_field(): DEBUG: get_hdr_field: <To> [29]; uri=[sip:107@192.168.65.132]

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/msg_parser.c:192]: get_hdr_field(): DEBUG: to body [107<sip:107@192.168.65.132>#015#012]

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/parse_via.c:1284]: parse_via_param(): Found param type 232, <branch> = <z9hG4bK-d87543-733510592-1--d87543->; state=6

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/parse_via.c:1284]: parse_via_param(): Found param type 235, <rport> = <n/a>; state=17

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/parse_via.c:2672]: parse_via(): end of header reached, state=5

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/msg_parser.c:513]: parse_headers(): parse_headers: Via found, flags=2

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/msg_parser.c:515]: parse_headers(): parse_headers: this is the first via

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [receive.c:154]: receive_msg(): After parse_msg...

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [receive.c:197]: receive_msg(): preparing to run routing scripts...

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/msg_parser.c:170]: get_hdr_field(): get_hdr_field: cseq <CSeq>: <1> <REGISTER>

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: maxfwd [mf_funcs.c:85]: is_maxfwd_present(): value = 70

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/msg_parser.c:204]: get_hdr_field(): DEBUG: get_hdr_body : content_length=0

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/msg_parser.c:106]: get_hdr_field(): found end of header

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/parse_addr_spec.c:176]: parse_to_param(): DEBUG: add_param: tag=306ac106

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [parser/parse_addr_spec.c:898]: parse_addr_spec(): end of header reached, state=29

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: sanity [mod_sanity.c:255]: w_sanity_check(): sanity checks result: 1

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: siputils [checks.c:103]: has_totag(): no totag

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:1072]: t_check_msg(): DEBUG: t_check_msg: msg id=2 global id=1 T start=0xffffffffffffffff

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:527]: t_lookup_request(): t_lookup_request: start searching: hash=16161, isACK=0

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:485]: matching_3261(): DEBUG: RFC3261 transaction matching failed

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:709]: t_lookup_request(): DEBUG: t_lookup_request: no transaction found

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:1141]: t_check_msg(): DEBUG: t_check_msg: msg id=2 global id=2 T end=(nil)

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [socket_info.c:583]: grep_sock_info(): grep_sock_info - checking if host==us: 14==14 && [192.168.65.132] == [192.168.65.132]

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [socket_info.c:587]: grep_sock_info(): grep_sock_info - checking if port 5060 (advertise 0) matches port 5060

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [select.c:429]: run_select(): Calling SELECT 0x7f213171d950

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [select.c:429]: run_select(): Calling SELECT 0x7f21317216c0

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth_db [authorize.c:498]: auth_check(): realm [192.168.65.132] table [sipusers] flags [1]

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth [api.c:86]: pre_auth(): auth:pre_auth: Credentials with realm '192.168.65.132' not found

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth_db [authorize.c:264]: digest_authenticate_hdr(): no credentials

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth [challenge.c:127]: get_challenge_hf(): build_challenge_hf: realm='192.168.65.132'

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth [challenge.c:269]: get_challenge_hf(): auth: 'WWW-Authenticate: Digest realm="192.168.65.132", nonce="VUDgjFVA32CFnv6lYnT/fxOzv3M7Mw7n"#015#012'

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: sl [sl.c:296]: send_reply(): reply in stateless mode (sl)

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying list (nil)

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying list (nil)

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying list (nil)

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying list (nil)

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying list (nil)

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying list (nil)

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [xavp.c:448]: xavp_destroy_list(): destroying xavp list (nil)

Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [receive.c:298]: receive_msg(): receive_msg: cleaning up

 

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/msg_parser.c:623]: parse_msg(): SIP Request:

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/msg_parser.c:625]: parse_msg():  method:  <REGISTER>

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/msg_parser.c:627]: parse_msg():  uri:     <sip:192.168.65.132>

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/msg_parser.c:629]: parse_msg():  version: <SIP/2.0>

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/parse_addr_spec.c:898]: parse_addr_spec(): end of header reached, state=10

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/msg_parser.c:190]: get_hdr_field(): DEBUG: get_hdr_field: <To> [29]; uri=[sip:107@192.168.65.132]

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/msg_parser.c:192]: get_hdr_field(): DEBUG: to body [107<sip:107@192.168.65.132>#015#012]

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/parse_via.c:1284]: parse_via_param(): Found param type 232, <branch> = <z9hG4bK-d87543-600273073-1--d87543->; state=6

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/parse_via.c:1284]: parse_via_param(): Found param type 235, <rport> = <n/a>; state=17

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/parse_via.c:2672]: parse_via(): end of header reached, state=5

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/msg_parser.c:513]: parse_headers(): parse_headers: Via found, flags=2

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/msg_parser.c:515]: parse_headers(): parse_headers: this is the first via

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [receive.c:154]: receive_msg(): After parse_msg...

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [receive.c:197]: receive_msg(): preparing to run routing scripts...

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/msg_parser.c:170]: get_hdr_field(): get_hdr_field: cseq <CSeq>: <2> <REGISTER>

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: maxfwd [mf_funcs.c:85]: is_maxfwd_present(): value = 70

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/msg_parser.c:204]: get_hdr_field(): DEBUG: get_hdr_body : content_length=0

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/msg_parser.c:106]: get_hdr_field(): found end of header

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/parse_addr_spec.c:176]: parse_to_param(): DEBUG: add_param: tag=306ac106

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [parser/parse_addr_spec.c:898]: parse_addr_spec(): end of header reached, state=29

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: sanity [mod_sanity.c:255]: w_sanity_check(): sanity checks result: 1

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: siputils [checks.c:103]: has_totag(): no totag

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:1072]: t_check_msg(): DEBUG: t_check_msg: msg id=2 global id=1 T start=0xffffffffffffffff

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:527]: t_lookup_request(): t_lookup_request: start searching: hash=16158, isACK=0

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:485]: matching_3261(): DEBUG: RFC3261 transaction matching failed

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:709]: t_lookup_request(): DEBUG: t_lookup_request: no transaction found

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:1141]: t_check_msg(): DEBUG: t_check_msg: msg id=2 global id=2 T end=(nil)

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [socket_info.c:583]: grep_sock_info(): grep_sock_info - checking if host==us: 14==14 && [192.168.65.132] == [192.168.65.132]

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [socket_info.c:587]: grep_sock_info(): grep_sock_info - checking if port 5060 (advertise 0) matches port 5060

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [select.c:429]: run_select(): Calling SELECT 0x7f213171d950

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [select.c:429]: run_select(): Calling SELECT 0x7f21317216c0

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth_db [authorize.c:498]: auth_check(): realm [192.168.65.132] table [sipusers] flags [1]

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth [api.c:96]: pre_auth(): auth: digest-algo: MD5 parsed value: 1

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:118]: db_new_result(): allocate 56 bytes for result set at 0x7f213171c1a0

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql [km_res.c:68]: db_mysql_get_columns(): 1 columns returned from the query

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:156]: db_allocate_columns(): allocate 8 bytes for result names at 0x7f21317236a8

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:167]: db_allocate_columns(): allocate 4 bytes for result types at 0x7f2131739f10

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql [km_res.c:86]: db_mysql_get_columns(): allocate 16 bytes for RES_NAMES[0] at 0x7f21317605f8

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql [km_res.c:93]: db_mysql_get_columns(): RES_NAMES(0x7f21317605f8)[0]=[sippasswd]

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql [km_res.c:137]: db_mysql_get_columns(): use DB1_STRING result type

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql [km_res.c:170]: db_mysql_convert_rows(): no rows returned from the query

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth_db [authorize.c:196]: get_ha1(): no result for user '107@'

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:81]: db_free_columns(): freeing 1 columns

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:85]: db_free_columns(): freeing RES_NAMES[0] at 0x7f21317605f8

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:94]: db_free_columns(): freeing result names at 0x7f21317236a8

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:99]: db_free_columns(): freeing result types at 0x7f2131739f10

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:136]: db_free_result(): freeing result set at 0x7f213171c1a0

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth [challenge.c:127]: get_challenge_hf(): build_challenge_hf: realm='192.168.65.132'

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth [challenge.c:269]: get_challenge_hf(): auth: 'WWW-Authenticate: Digest realm="192.168.65.132", nonce="VUDgjFVA32CFnv6lYnT/fxOzv3M7Mw7n"#015#012'

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: sl [sl.c:296]: send_reply(): reply in stateless mode (sl)

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying list (nil)

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying list (nil)

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying list (nil)

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying list (nil)

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying list (nil)

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying list (nil)

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [xavp.c:448]: xavp_destroy_list(): destroying xavp list (nil)

Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [receive.c:298]: receive_msg(): receive_msg: cleaning up

 

 

 

 

 

 

 

 

 

 

 

 

 

Ngrep sipusers asterisk

 

U 192.168.65.1:6018 -> 192.168.65.132:5060

REGISTER sip:192.168.65.132 SIP/2.0.

To: 101<sip:101@192.168.65.132>.

From: 101<sip:101@192.168.65.132>;tag=622d132b.

Via: SIP/2.0/UDP 192.168.65.1:6018;branch=z9hG4bK-d87543-11473800-1--d87543-;rport.

Call-ID: 45522f4e99747d39.

CSeq: 1 REGISTER.

Contact: <sip:101@192.168.65.1:6018>.

Expires: 3600.

Max-Forwards: 70.

Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO.

User-Agent: eyeBeam release 3004w stamp 16863.

Content-Length: 0.

.

 

#

U 192.168.65.132:5060 -> 192.168.65.1:6018

SIP/2.0 401 Unauthorized.

To: 101<sip:101@192.168.65.132>;tag=65b56d053bca97da69d7accef5da903f.bfcc.

From: 101<sip:101@192.168.65.132>;tag=622d132b.

Via: SIP/2.0/UDP 192.168.65.1:6018;branch=z9hG4bK-d87543-11473800-1--d87543-;rport=6018;received=192.168.65.1.

Call-ID: 45522f4e99747d39.

CSeq: 1 REGISTER.

WWW-Authenticate: Digest realm="192.168.65.132", nonce="VUDfOlVA3g5sSAKxFPg/zsB0qvueMh8Y".

Server: kamailio (4.2.4 (x86_64/linux)).

Content-Length: 0.

.

 

#

U 192.168.65.1:6018 -> 192.168.65.132:5060

REGISTER sip:192.168.65.132 SIP/2.0.

To: 101<sip:101@192.168.65.132>.

From: 101<sip:101@192.168.65.132>;tag=622d132b.

Via: SIP/2.0/UDP 192.168.65.1:6018;branch=z9hG4bK-d87543-426128389-1--d87543-;rport.

Call-ID: 45522f4e99747d39.

CSeq: 2 REGISTER.

Contact: <sip:101@192.168.65.1:6018>.

Expires: 3600.

Max-Forwards: 70.

Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO.

User-Agent: eyeBeam release 3004w stamp 16863.

Authorization: Digest username="101",realm="192.168.65.132",nonce="VUDfOlVA3g5sSAKxFPg/zsB0qvueMh8Y",uri="sip:192.168.65.132",response="792b60f48b2da3bb93f5d808fd87c09c",algorithm=MD5.

Content-Length: 0.

.

 

#

U 192.168.65.132:5060 -> 192.168.65.1:6018

SIP/2.0 200 OK.

To: 101<sip:101@192.168.65.132>;tag=65b56d053bca97da69d7accef5da903f.92bc.

From: 101<sip:101@192.168.65.132>;tag=622d132b.

Via: SIP/2.0/UDP 192.168.65.1:6018;branch=z9hG4bK-d87543-426128389-1--d87543-;rport=6018;received=192.168.65.1.

Call-ID: 45522f4e99747d39.

CSeq: 2 REGISTER.

Contact: <sip:101@192.168.65.1:6018>;expires=3600.

Server: kamailio (4.2.4 (x86_64/linux)).

Content-Length: 0.

 

 

 

Ngrep subscriber Kamailio

 

U 192.168.65.1:6018 -> 192.168.65.132:5060

REGISTER sip:192.168.65.132 SIP/2.0.

To: 107<sip:107@192.168.65.132>.

From: 107<sip:107@192.168.65.132>;tag=7b070e2d.

Via: SIP/2.0/UDP 192.168.65.1:6018;branch=z9hG4bK-d87543-536609279-1--d87543-;rport.

Call-ID: 77019a2d9e70df3f.

CSeq: 1 REGISTER.

Contact: <sip:107@192.168.65.1:6018>.

Expires: 3600.

Max-Forwards: 70.

Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO.

User-Agent: eyeBeam release 3004w stamp 16863.

Content-Length: 0.

.

 

#

U 192.168.65.132:5060 -> 192.168.65.1:6018

SIP/2.0 401 Unauthorized.

To: 107<sip:107@192.168.65.132>;tag=65b56d053bca97da69d7accef5da903f.1c0e.

From: 107<sip:107@192.168.65.132>;tag=7b070e2d.

Via: SIP/2.0/UDP 192.168.65.1:6018;branch=z9hG4bK-d87543-536609279-1--d87543-;rport=6018;received=192.168.65.1.

Call-ID: 77019a2d9e70df3f.

CSeq: 1 REGISTER.

WWW-Authenticate: Digest realm="192.168.65.132", nonce="VUDf21VA3q+Px29K8cRa5tWIadNTI5e6".

Server: kamailio (4.2.4 (x86_64/linux)).

Content-Length: 0.

.

 

#

U 192.168.65.1:6018 -> 192.168.65.132:5060

REGISTER sip:192.168.65.132 SIP/2.0.

To: 107<sip:107@192.168.65.132>.

From: 107<sip:107@192.168.65.132>;tag=7b070e2d.

Via: SIP/2.0/UDP 192.168.65.1:6018;branch=z9hG4bK-d87543-1058472151-1--d87543-;rport.

Call-ID: 77019a2d9e70df3f.

CSeq: 2 REGISTER.

Contact: <sip:107@192.168.65.1:6018>.

Expires: 3600.

Max-Forwards: 70.

Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO.

User-Agent: eyeBeam release 3004w stamp 16863.

Authorization: Digest username="107",realm="192.168.65.132",nonce="VUDf21VA3q+Px29K8cRa5tWIadNTI5e6",uri="sip:192.168.65.132",response="c9ca6eff16e3b661337b6d99d74027de",algorithm=MD5.

Content-Length: 0.

.

 

#

U 192.168.65.132:5060 -> 192.168.65.1:6018

SIP/2.0 401 Unauthorized.

To: 107<sip:107@192.168.65.132>;tag=65b56d053bca97da69d7accef5da903f.8cc0.

From: 107<sip:107@192.168.65.132>;tag=7b070e2d.

Via: SIP/2.0/UDP 192.168.65.1:6018;branch=z9hG4bK-d87543-1058472151-1--d87543-;rport=6018;received=192.168.65.1.

Call-ID: 77019a2d9e70df3f.

CSeq: 2 REGISTER.

WWW-Authenticate: Digest realm="192.168.65.132", nonce="VUDf21VA3q+Px29K8cRa5tWIadNTI5e6".

Server: kamailio (4.2.4 (x86_64/linux)).

Content-Length: 0.

.