Hi
About my problem with radius accounting IŽve seen some errors in debug mode when starting ser: . . 16(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 16(0) DEBUG: init_mod_child (8): usrloc 16(0) DEBUG: init_mod_child (8): acc 16(6427) DBG: open_uac_fifo: opening fifo... 16(6427) DEBUG: open_fifo_server: FIFO stat failed: Bad file descriptor 16(6427) DEBUG: FIFO created @ /tmp/ser_fifo 16(6427) DEBUG: fifo /tmp/ser_fifo opened, mode=432 17(0) INFO: fifo process starting: 6428 . . in fact I do not know if there are more, please see my attached files (startSer.txt and callDebug.txt),
thank you Rafael
Jan Janak jan@iptel.org escribió:
Are there any error messages in ser logs ?
Jan.
On 07-06 13:14, Rafael J. Risco G.V. wrote:
hello
I?m still having problems with radius accounting module, ...I can see
that authentication process works well but I did not see any "Accounting Report" in /var/log/radius/radacct/ or neither in radiusd -X debug , please can someone share an example of its ser.cfg file for this function?
thanks Rafael
PS: my current ser.cfg configuration is shown below, freeradius it?s
installed
in the same host (SuSe Linux 9.0) and I have included setflag(1) for
all transactions as Klaus D. recommend me some days ago...
ser:/var/log/radius/radacct# more /etc/ser/ser.cfg
# simple quick-start config script #
# ----------- global configuration parameters
#debug=3 # debug level (cmd line: -dddddddddd) #fork=yes #log_stderror=no # (cmd line: -E)
#/* Uncomment these lines to enter debugging mode debug=9 fork=yes log_stderror=yes #*/
check_via=no # (cmd. line: -v) dns=no # (cmd. line: -r) rev_dns=no # (cmd. line: -R) #port=5060 #children=4 fifo="/tmp/ser_fifo"
# ------------------ module loading
# Uncomment this if you want to use SQL database #loadmodule "//lib/ser/modules/mysql.so"
loadmodule "//lib/ser/modules/sl.so" loadmodule "//lib/ser/modules/tm.so" loadmodule "//lib/ser/modules/rr.so" loadmodule "//lib/ser/modules/maxfwd.so" loadmodule "//lib/ser/modules/usrloc.so" loadmodule "//lib/ser/modules/registrar.so" loadmodule "//lib/ser/modules/group_radius.so" #loadmodule "//lib/ser/modules/group.so" # Uncomment this if you want digest authentication # mysql.so must be loaded ! loadmodule "//lib/ser/modules/auth.so" #loadmodule "//lib/ser/modules/auth_db.so" loadmodule "//lib/ser/modules/auth_radius.so" loadmodule "//lib/ser/modules/acc.so" #loadmodule "//lib/ser/modules/uri.so" # ----------------- setting module-specific parameters
# -- usrloc params -- #modparam("usrloc", "db_mode", 0) # Uncomment this if you want to use SQL database # for persistent storage and comment the previous line #modparam("usrloc", "db_mode", 2) # -- auth params -- # Uncomment if you are using auth module # #modparam("auth_db", "calculate_ha1", yes) # # If you set "calculate_ha1" parameter to yes (which true in this
config),
# uncomment also the following parameter) # #modparam("auth_db", "password_column", "password") # -- rr params -- # add value to ;lr param to make some broken UAs happy
modparam("rr", "enable_full_lr", 1)
modparam("auth_radius","radius_config","/etc/radiusclient/radiusclient.conf")
modparam("auth_radius","service_type",15) modparam("acc", "log_level", 1) modparam("acc",
"radius_config","/etc/radiusclient/radiusclient.conf")
modparam("acc", "service_type", 15) modparam("acc", "radius_flag", 1) modparam("acc", "radius_missed_flag", 3)
# ------------------------- request routing logic
# main routing logic
route{
setflag(1); if (method=="REGISTER") log(1, "REGISTER message received\n");
if (method=="INVITE") log(1, "INVITE message received\n"); if (method=="ACK") log(1, "ACK message received\n"); if (method=="BYE") log(1, "BYE message received\n"); if (method=="CANCEL") log(1, "CANCEL message received\n"); if (method=="SUBSCRIBE") log(1, "SUBSCRIBE message received\n"); if (method=="NOTIFY") log(1, "NOTIFY message received\n"); if (method=="OPTIONS") log(1, "OPTIONS message received\n"); if (method=="INFO") log(1, "INFO message received\n"); if (method=="MESSAGE") log(1, "MESSAGE message received\n"); if (method=="REFER") log(1, "REFER message received\n"); # initial sanity checks -- messages with # max_forwards==0, or excessively long requests if (!mf_process_maxfwd_header("10")) { sl_send_reply("483","Too Many Hops"); break; }; if ( msg:len > max_len ) { sl_send_reply("513", "Message too big"); break; }; # we record-route all messages -- to make sure that # subsequent messages will go through our proxy; that's # particularly good if upstream and downstream entities # use different transport protocol record_route(); # loose-route processing if (loose_route()) { t_relay(); break; }; # if the request is for other domain use UsrLoc # (in case, it does not work, use the following command # with proper names and addresses in it) if (uri==myself) { if (method=="REGISTER") {
# Uncomment this if you want to use digest authentication if (!radius_www_authorize("")) { www_challenge("", "1"); break; };
save("location"); break; };
#Labeled transactions for accounting #if (method =="INVITE" | method == "BYE") # { # log(1,"INVITE or BYE\n"); # setflag(1); # }; #if (method=="MESSAGE") { # log(1,"MESSAGE\n"); # setflag(1); # }; #if (method=="BYE"){ # log (1, "BYEd or CANCEL\n"); # setflag(1); # }; #if (method=="CANCEL"){ # log (1, "BYEe or CANCEL\n"); # setflag(1); # };
# native SIP destinations are handled using our USRLOC
DB
if (!lookup("location")) { sl_send_reply("404", "Not Found"); break; }; }; # forward to current uri now; use stateful forwarding; that # works reliably even if we forward from TCP to UDP if (!t_relay()) { sl_reply_error(); };
}
ser:/var/log/radius/radacct #
[Serusers] Still trying to get radius Accounting!!!!!!!!!!
Klaus Darilion klaus.mailinglists@pernau.at escribi?:
try setflag(1); for the transactions you want to account!
klaus
Rafael J. Risco G.V. wrote:
hello serusers! I have followed these instructions carefully
again(http://iptel.org/ser/doc/ser_radius/ser_radius.html) and now I
can
see that authentication process works well but I did not see any "Accounting Report" in /var/log/radius/radacct/ or neither in
radiusd -X
debug, please can someone send me an example of ser.cfg
configuration
for this purpose?
thanks Rafael
PS: my current ser.cfg configuration is shown below, freeradius it
is
installed in the same host (SuSe Linux 9.0):
ser:/var/log/radius/radacct # more /etc/ser/ser.cfg # # $Id: ser.cfg,v 1.21.4.1 2003/11/10 15:35:15 andrei Exp $ # # simple quick-start config script #
# ----------- global configuration parameters
#debug=3 # debug level (cmd line: -dddddddddd) #fork=yes #log_stderror=no # (cmd line: -E)
#/* Uncomment these lines to enter debugging mode debug=9 fork=yes log_stderror=yes #*/
check_via=no # (cmd. line: -v) dns=no # (cmd. line: -r) rev_dns=no # (cmd. line: -R) #port=5060 #children=4 fifo="/tmp/ser_fifo"
# ------------------ module loading
# Uncomment this if you want to use SQL database #loadmodule "//lib/ser/modules/mysql.so"
loadmodule "//lib/ser/modules/sl.so" loadmodule "//lib/ser/modules/tm.so" loadmodule "//lib/ser/modules/rr.so" loadmodule "//lib/ser/modules/maxfwd.so" loadmodule "//lib/ser/modules/usrloc.so" loadmodule "//lib/ser/modules/registrar.so" loadmodule "//lib/ser/modules/group_radius.so"
#loadmodule "//lib/ser/modules/group.so" # Uncomment this if you want digest authentication # mysql.so must be loaded !
loadmodule "//lib/ser/modules/auth.so"
#loadmodule "//lib/ser/modules/auth_db.so"
loadmodule "//lib/ser/modules/auth_radius.so" loadmodule "//lib/ser/modules/acc.so"
#loadmodule "//lib/ser/modules/uri.so"
# ----------------- setting module-specific parameters
# -- usrloc params -- #modparam("usrloc", "db_mode", 0) # Uncomment this if you want to use SQL database # for persistent storage and comment the previous line #modparam("usrloc", "db_mode", 2) # -- auth params -- # Uncomment if you are using auth module # #modparam("auth_db", "calculate_ha1", yes) # # If you set "calculate_ha1" parameter to yes (which true in this
config),
# uncomment also the following parameter) # #modparam("auth_db", "password_column", "password")
# -- rr params -- # add value to ;lr param to make some broken UAs happy
modparam("rr", "enable_full_lr", 1)
modparam("auth_radius","radius_config","/etc/radiusclient/radiusclient.conf")
modparam("auth_radius","service_type",15) modparam("acc",
"radius_config","/etc/radiusclient/radiusclient.conf")
modparam("acc", "service_type", 15) modparam("acc", "radius_flag", 1) modparam("acc", "radius_missed_flag", 3)
# ------------------------- request routing logic
# main routing logic
route{
# initial sanity checks -- messages with # max_forwards==0, or excessively long requests if (!mf_process_maxfwd_header("10")) { sl_send_reply("483","Too Many Hops"); break; }; if ( msg:len > max_len ) { sl_send_reply("513", "Message too big"); break; }; # we record-route all messages -- to make sure that # subsequent messages will go through our proxy; that's # particularly good if upstream and downstream entities # use different transport protocol record_route(); # loose-route processing if (loose_route()) { t_relay(); break; }; # if the request is for other domain use UsrLoc # (in case, it does not work, use the following command # with proper names and addresses in it) if (uri==myself) { if (method=="REGISTER") {
# Uncomment this if you want to use digest authentication if (!radius_www_authorize("")) { www_challenge("", "0"); break; };
save("location"); break; }; # native SIP destinations are handled using our
USRLOC
DB
if (!lookup("location")) { sl_send_reply("404", "Not Found"); break; }; }; # forward to current uri now; use stateful forwarding;
that
# works reliably even if we forward from TCP to UDP if (!t_relay()) { sl_reply_error(); };
} ser:/var/log/radius/radacct #
Serusers mailing list serusers@lists.iptel.org http://lists.iptel.org/mailman/listinfo/serusers
Serusers mailing list serusers@lists.iptel.org http://lists.iptel.org/mailman/listinfo/serusers
ser:/ # ser:/ # ser:/ # ser:/ # ser:/ # /etc/init.d/ser start Starting SIP Express Router 0(6409) loading module //lib/ser/modules/sl.so 0(6409) loading module //lib/ser/modules/tm.so 0(6409) loading module //lib/ser/modules/rr.so 0(6409) loading module //lib/ser/modules/maxfwd.so 0(6409) loading module //lib/ser/modules/usrloc.so 0(6409) loading module //lib/ser/modules/registrar.so 0(6409) loading module //lib/ser/modules/group_radius.so 0(6409) loading module //lib/ser/modules/auth.so 0(6409) loading module //lib/ser/modules/auth_radius.so 0(6409) loading module //lib/ser/modules/acc.so 0(6409) set_mod_param_regex: rr matches module rr 0(6409) set_mod_param_regex: found <enable_full_lr> in module rr [//lib/ser/modules/rr.so] 0(6409) set_mod_param_regex: auth_radius matches module auth_radius 0(6409) set_mod_param_regex: found <radius_config> in module auth_radius [//lib/ser/modules/auth_radius.so] 0(6409) set_mod_param_regex: auth_radius matches module auth_radius 0(6409) set_mod_param_regex: found <service_type> in module auth_radius [//lib/ser/modules/auth_radius.so] 0(6409) set_mod_param_regex: acc matches module acc 0(6409) set_mod_param_regex: found <log_level> in module acc [//lib/ser/modules/acc.so] 0(6409) set_mod_param_regex: acc matches module acc 0(6409) set_mod_param_regex: found <radius_config> in module acc [//lib/ser/modules/acc.so] 0(6409) set_mod_param_regex: acc matches module acc 0(6409) set_mod_param_regex: found <radius_flag> in module acc [//lib/ser/modules/acc.so] 0(6409) set_mod_param_regex: acc matches module acc 0(6409) set_mod_param_regex: found <radius_missed_flag> in module acc [//lib/ser/modules/acc.so] 0(6409) find_export: found <mf_process_maxfwd_header> in module maxfwd_module [//lib/ser/modules/maxfwd.so] 0(6409) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6409) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6409) find_export: found <record_route> in module rr [//lib/ser/modules/rr.so] 0(6409) find_export: found <loose_route> in module rr [//lib/ser/modules/rr.so] 0(6409) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so] 0(6409) find_export: found <radius_www_authorize> in module auth_radius [//lib/ser/modules/auth_radius.so] 0(6409) find_export: found <www_challenge> in module auth [//lib/ser/modules/auth.so] 0(6409) find_export: found <save> in module registrar [//lib/ser/modules/registrar.so] 0(6409) find_export: found <lookup> in module registrar [//lib/ser/modules/registrar.so] 0(6409) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6409) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so] 0(6409) find_export: found <sl_reply_error> in module sl_module [//lib/ser/modules/sl.so] 0(6409) routing table 0: 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421a9c30> 0(6409) , "10" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421a9c30> 0(6409) , "10" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "483" 0(6409) , "Too Many Hops" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) UNKNOWN 0(6409) <UNKNOWN> 0(6409) 65535 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "513" 0(6409) , "Message too big" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) ); 0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) UNKNOWN 0(6409) <UNKNOWN> 0(6409) 65535 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "513" 0(6409) , "Message too big" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) ); 0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) ); 0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) Listening on 127.0.0.1 [127.0.0.1]:5060 200.110.2.132 [200.110.2.132]:5060 Aliases: ser:5060 ser.local:5060 localhost:5060 0(6411) DEBUG: init_mod: sl_module stateless - initializing 0(6411) DEBUG: register_fifo_cmd: new command (sl_stats) registered 0(6411) DEBUG: MD5 calculated: b27e1a1d33761e85846fc98f5f3a7e58 0(6411) DEBUG: init_mod: tm 0(6411) TM - initializing... 0(6411) Call-ID initialization: '7edfe76a' 0(6411) DEBUG: register_fifo_cmd: new command (t_uac_dlg) registered 0(6411) DEBUG: register_fifo_cmd: new command (t_hash) registered 0(6411) DEBUG: lock_initialize: lock initialization started done ser:/ # 0(6411) DEBUG: register_fifo_cmd: new command (t_stats) registered 0(6411) DEBUG: MD5 calculated: 533cb9e91f4b999cf76861cbb9ed54ed 0(6411) DEBUG: MD5 calculated: a6a1c5f60faecf035a1ae5b6e96e979a 0(6411) DEBUG: init_mod: rr 0(6411) rr - initializing 0(6411) DEBUG: init_mod: maxfwd_module Maxfwd module- initializing 0(6411) DEBUG: init_mod: usrloc 0(6411) usrloc - initializing 0(6411) DEBUG: register_fifo_cmd: new command (ul_stats) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_rm) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_rm_contact) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_dump) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_flush) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_add) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_show_contact) registered 0(6411) DEBUG: init_mod: registrar 0(6411) registrar - initializing 0(6411) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6411) find_export: found <ul_bind_usrloc> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_register_udomain> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_get_all_ucontacts> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_insert_urecord> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_delete_urecord> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_get_urecord> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_lock_udomain> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_unlock_udomain> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_release_urecord> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_insert_ucontact> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_delete_ucontact> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_get_ucontact> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_update_ucontact> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) DEBUG: init_mod: group_radius 0(6411) group_radius - initializing 0(6411) DEBUG: init_mod: auth 0(6411) auth module - initializing 0(6411) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6411) DEBUG: init_mod: auth_radius 0(6411) auth_radius - Initializing 0(6411) find_export: found <pre_auth> in module auth [//lib/ser/modules/auth.so] 0(6411) find_export: found <post_auth> in module auth [//lib/ser/modules/auth.so] 0(6411) DEBUG: init_mod: acc acc - initializing 0(6411) find_export: found <load_tm> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <register_tmcb> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_relay_to_tcp> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_relay_to_udp> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_reply> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_reply_with_body> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_is_local> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_get_trans_ident> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_lookup_ident> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_add_blind> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_forward_nonack> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_request_within> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_request_outside> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_request> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <new_dlg_uac> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <dlg_response_uac> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <new_dlg_uas> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <dlg_request_uas> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <free_dlg> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <print_dlg> in module tm [//lib/ser/modules/tm.so] 0(0) fixing //lib/ser/modules/maxfwd.so mf_process_maxfwd_header 0(0) fixing //lib/ser/modules/sl.so sl_send_reply 0(0) fixing //lib/ser/modules/sl.so sl_send_reply 0(0) fixing //lib/ser/modules/rr.so record_route 0(0) fixing //lib/ser/modules/rr.so loose_route 0(0) fixing //lib/ser/modules/tm.so t_relay 0(0) fixing //lib/ser/modules/auth_radius.so radius_www_authorize 0(0) fixing //lib/ser/modules/auth.so www_challenge 0(0) fixing //lib/ser/modules/registrar.so save 0(0) fixing //lib/ser/modules/registrar.so lookup 0(0) fixing //lib/ser/modules/sl.so sl_send_reply 0(0) fixing //lib/ser/modules/tm.so t_relay 0(0) fixing //lib/ser/modules/sl.so sl_reply_error 0(0) INFO: udp_init: SO_RCVBUF is initially 65535 0(0) DEBUG: udp_init: trying SO_RCVBUF: 131070 0(0) DEBUG: setting SO_RCVBUF; set=131070,verify=131070 0(0) DEBUG: udp_init: trying SO_RCVBUF: 262140 0(0) DEBUG: setting SO_RCVBUF; set=262140,verify=131070 0(0) DEBUG: setting SO_RCVBUF has no effect 0(0) DEBUG: udp_init: trying SO_RCVBUF: 133118 0(0) DEBUG: setting SO_RCVBUF; set=133118,verify=131070 0(0) DEBUG: setting SO_RCVBUF has no effect 0(0) INFO: udp_init: SO_RCVBUF is finally 131070 0(0) INFO: udp_init: SO_RCVBUF is initially 65535 0(0) DEBUG: udp_init: trying SO_RCVBUF: 131070 0(0) DEBUG: setting SO_RCVBUF; set=131070,verify=131070 0(0) DEBUG: udp_init: trying SO_RCVBUF: 262140 0(0) DEBUG: setting SO_RCVBUF; set=262140,verify=131070 0(0) DEBUG: setting SO_RCVBUF has no effect 0(0) DEBUG: udp_init: trying SO_RCVBUF: 133118 0(0) DEBUG: setting SO_RCVBUF; set=133118,verify=131070 0(0) DEBUG: setting SO_RCVBUF has no effect 0(0) INFO: udp_init: SO_RCVBUF is finally 131070 1(0) DEBUG: init_mod_child (1): tm 1(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 1(0) DEBUG: init_mod_child (1): usrloc 1(0) DEBUG: init_mod_child (1): acc 2(0) DEBUG: init_mod_child (2): tm 2(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 2(0) DEBUG: init_mod_child (2): usrloc 2(0) DEBUG: init_mod_child (2): acc 3(0) DEBUG: init_mod_child (3): tm 3(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 3(0) DEBUG: init_mod_child (3): usrloc 3(0) DEBUG: init_mod_child (3): acc 4(0) DEBUG: init_mod_child (4): tm 4(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 4(0) DEBUG: init_mod_child (4): usrloc 4(0) DEBUG: init_mod_child (4): acc 5(0) DEBUG: init_mod_child (5): tm 5(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 5(0) DEBUG: init_mod_child (5): usrloc 5(0) DEBUG: init_mod_child (5): acc 6(0) DEBUG: init_mod_child (6): tm 6(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 6(0) DEBUG: init_mod_child (6): usrloc 6(0) DEBUG: init_mod_child (6): acc 7(0) DEBUG: init_mod_child (7): tm 7(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 7(0) DEBUG: init_mod_child (7): usrloc 7(0) DEBUG: init_mod_child (7): acc 8(0) DEBUG: init_mod_child (8): tm 8(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 8(0) DEBUG: init_mod_child (8): usrloc 8(0) DEBUG: init_mod_child (8): acc 9(0) DEBUG: init_mod_child (1): tm 9(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 9(0) DEBUG: init_mod_child (1): usrloc 9(0) DEBUG: init_mod_child (1): acc 10(0) DEBUG: init_mod_child (2): tm 10(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 10(0) DEBUG: init_mod_child (2): usrloc 10(0) DEBUG: init_mod_child (2): acc 11(0) DEBUG: init_mod_child (3): tm 11(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 11(0) DEBUG: init_mod_child (3): usrloc 11(0) DEBUG: init_mod_child (3): acc 12(0) DEBUG: init_mod_child (4): tm 12(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 12(0) DEBUG: init_mod_child (4): usrloc 12(0) DEBUG: init_mod_child (4): acc 13(0) DEBUG: init_mod_child (5): tm 13(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 13(0) DEBUG: init_mod_child (5): usrloc 13(0) DEBUG: init_mod_child (5): acc 14(0) DEBUG: init_mod_child (6): tm 14(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 14(0) DEBUG: init_mod_child (6): usrloc 14(0) DEBUG: init_mod_child (6): acc 15(0) DEBUG: init_mod_child (7): tm 15(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 15(0) DEBUG: init_mod_child (7): usrloc 15(0) DEBUG: init_mod_child (7): acc 16(0) DEBUG: init_mod_child (8): tm 16(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 16(0) DEBUG: init_mod_child (8): usrloc 16(0) DEBUG: init_mod_child (8): acc 16(6427) DBG: open_uac_fifo: opening fifo... 16(6427) DEBUG: open_fifo_server: FIFO stat failed: Bad file descriptor 16(6427) DEBUG: FIFO created @ /tmp/ser_fifo 16(6427) DEBUG: fifo /tmp/ser_fifo opened, mode=432 17(0) INFO: fifo process starting: 6428 17(0) DEBUG: init_mod_child (-2): tm 17(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 17(0) DEBUG: init_mod_child (-2): usrloc 17(0) DEBUG: init_mod_child (-2): acc 18(0) DEBUG: init_mod_child (-1): tm 18(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 18(0) DEBUG: init_mod_child (-1): usrloc 18(0) DEBUG: init_mod_child (-1): acc 17(6428) SER: open_uac_fifo: fifo server up at /tmp/ser_fifo... 19(0) DEBUG: init_mod_child (9): tm 19(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 19(0) DEBUG: init_mod_child (9): usrloc 19(0) DEBUG: init_mod_child (9): acc 20(0) DEBUG: init_mod_child (10): tm 20(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 20(0) DEBUG: init_mod_child (10): usrloc 20(0) DEBUG: init_mod_child (10): acc 21(0) DEBUG: init_mod_child (11): tm 21(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 21(0) DEBUG: init_mod_child (11): usrloc 21(0) DEBUG: init_mod_child (11): acc 22(0) DEBUG: init_mod_child (12): tm 22(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 22(0) DEBUG: init_mod_child (12): usrloc 22(0) DEBUG: init_mod_child (12): acc 23(0) DEBUG: init_mod_child (13): tm 23(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 23(0) DEBUG: init_mod_child (13): usrloc 23(0) DEBUG: init_mod_child (13): acc 24(0) DEBUG: init_mod_child (14): tm 24(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 24(0) DEBUG: init_mod_child (14): usrloc 24(0) DEBUG: init_mod_child (14): acc 25(0) DEBUG: init_mod_child (15): tm 25(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 25(0) DEBUG: init_mod_child (15): usrloc 25(0) DEBUG: init_mod_child (15): acc 26(0) DEBUG: init_mod_child (16): tm 26(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 26(0) DEBUG: init_mod_child (16): usrloc 26(0) DEBUG: init_mod_child (16): acc 27(0) DEBUG: init_mod_child (-4): tm 27(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 27(0) DEBUG: init_mod_child (-4): usrloc 27(0) DEBUG: init_mod_child (-4): acc 0(6411) DEBUG: init_mod_child (0): tm 0(6411) DEBUG: callid: '7edfe76a-6411@127.0.0.1' 0(6411) DEBUG: init_mod_child (0): usrloc 0(6411) DEBUG: init_mod_child (0): acc
ser:/ # ser:/ # 13(6424) SIP Request: 13(6424) method: <INVITE> 13(6424) uri: sip:6604000@200.110.2.132 13(6424) version: <SIP/2.0> 13(6424) parse_headers: flags=1 13(6424) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16 13(6424) end of header reached, state=5 13(6424) parse_headers: Via found, flags=1 13(6424) parse_headers: this is the first via 13(6424) After parse_msg... 13(6424) preparing to run routing scripts... 13(6424) DEBUG : is_maxfwd_present: searching for max_forwards header 13(6424) parse_headers: flags=128 13(6424) end of header reached, state=9 13(6424) DEBUG: get_hdr_field: <To> [29]; uri=[sip:6604000@200.110.2.132] 13(6424) DEBUG: to body [sip:6604000@200.110.2.132 ] 13(6424) get_hdr_field: cseq <CSeq>: <180> <INVITE> 13(6424) DEBUG: get_hdr_body : content_length=137 13(6424) DEBUG: is_maxfwd_present: value = 70 13(6424) DEBUG: add_param: tag=6e00fdeaa4 13(6424) end of header reached, state=29 13(6424) parse_headers: flags=256 13(6424) found end of header 13(6424) find_first_route(): No Route headers found 13(6424) loose_route(): There is no Route HF 13(6424) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 13(6424) check_self - checking if port 5060 matches port 5060 13(6424) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 13(6424) check_self - checking if port 5060 matches port 5060 13(6424) INVITE or BYE 13(6424) rwrite(): Rewriting Request-URI with 'sip:6604000@200.110.6.58' 13(6424) DEBUG: t_addifnew: msg id=4 , global msg id=0 , T on entrance=0xffffffff 13(6424) parse_headers: flags=-1 13(6424) parse_headers: flags=60 13(6424) t_lookup_request: start searching: hash=28567, isACK=0 13(6424) DEBUG: RFC3261 transaction matching failed 13(6424) DEBUG: t_lookup_request: no transaction found 13(6424) DBG: callback type 2, id 3 entered 13(6424) parse_headers: flags=44 13(6424) DEBUG: noisy_timer set for accounting 13(6424) SER: new INVITE 13(6424) parse_headers: flags=-1 13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0) 13(6424) WARNING:vqm_resize: resize(0) called 13(6424) DEBUG: reply sent out. buf=0x80cb880: SIP/2.0 1..., shmem=0x402f6b10: SIP/2.0 1 13(6424) DEBUG: t_reply: finished 13(6424) DEBUG: mk_proxy: doing DNS lookup... 13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0) 13(6424) DEBUG: add_to_tail_of_timer[4]: 0x402f5574 13(6424) DEBUG: add_to_tail_of_timer[0]: 0x402f5588 13(6424) SER: new transaction fwd'ed 13(6424) receive_msg: cleaning up 15(6426) SIP Reply (status): 15(6426) version: <SIP/2.0> 15(6426) status: <100> 15(6426) reason: <Trying> 15(6426) parse_headers: flags=1 15(6426) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16 15(6426) end of header reached, state=5 15(6426) parse_headers: Via found, flags=1 15(6426) parse_headers: this is the first via 15(6426) After parse_msg... 15(6426) forward_reply: found module tm, passing reply to it 15(6426) DEBUG: t_check: msg id=5 global id=0 T start=0xffffffff 15(6426) parse_headers: flags=17 15(6426) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16 15(6426) end of header reached, state=5 15(6426) parse_headers: Via found, flags=17 15(6426) parse_headers: this is the second via 15(6426) end of header reached, state=9 15(6426) DEBUG: get_hdr_field: <To> [29]; uri=[sip:6604000@200.110.2.132] 15(6426) DEBUG: to body [sip:6604000@200.110.2.132 ] 15(6426) get_hdr_field: cseq <CSeq>: <180> <INVITE> 15(6426) parse_headers: flags=4 15(6426) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0 15(6426) DEBUG: t_reply_matching: reply matched (T=0x402f5450)! 15(6426) DBG: callback type 1, id 5 entered 15(6426) DEBUG: t_check: msg id=5 global id=5 T end=0x402f5450 15(6426) DEBUG: t_on_reply: org. status uas=100, uac[0]=0 local=0 is_invite=1) 15(6426) ->>>>>>>>> T_code=100, new_code=100 15(6426) DEBUG: relay_reply: branch=0, save=0, relay=-1 15(6426) DEBUG: add_to_tail_of_timer[1]: 0x402f5588 15(6426) receive_msg: cleaning up 10(6421) SIP Reply (status): 10(6421) version: <SIP/2.0> 10(6421) status: <180> 10(6421) reason: <Ringing> 10(6421) parse_headers: flags=1 10(6421) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16 10(6421) end of header reached, state=5 10(6421) parse_headers: Via found, flags=1 10(6421) parse_headers: this is the first via 10(6421) After parse_msg... 10(6421) forward_reply: found module tm, passing reply to it 10(6421) DEBUG: t_check: msg id=4 global id=0 T start=0xffffffff 10(6421) parse_headers: flags=17 10(6421) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16 10(6421) end of header reached, state=5 10(6421) parse_headers: Via found, flags=17 10(6421) parse_headers: this is the second via 10(6421) DEBUG: add_param: tag=218f2c81a4 10(6421) end of header reached, state=29 10(6421) DEBUG: get_hdr_field: <To> [44]; uri=[sip:6604000@200.110.2.132] 10(6421) DEBUG: to body [sip:6604000@200.110.2.132] 10(6421) get_hdr_field: cseq <CSeq>: <180> <INVITE> 10(6421) parse_headers: flags=4 10(6421) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0 10(6421) DEBUG: t_reply_matching: reply matched (T=0x402f5450)! 10(6421) DBG: callback type 1, id 5 entered 10(6421) DEBUG: t_check: msg id=4 global id=4 T end=0x402f5450 10(6421) DEBUG: t_on_reply: org. status uas=100, uac[0]=100 local=0 is_invite=1) 10(6421) ->>>>>>>>> T_code=100, new_code=180 10(6421) DEBUG: relay_reply: branch=0, save=0, relay=0 10(6421) old size: 472, new size: 410 10(6421) build_res_from_sip_res: copied size: orig:83, new: 21, rest: 389 msg= SIP/2.0 180 Ringing Via: SIP/2.0/UDP 10.0.0.236:5060;branch=z9hG4bK6e00fdeaa4180 From: sip:6603000@200.110.2.132;tag=6e00fdeaa4 To: sip:6604000@200.110.2.132;tag=218f2c81a4 Call-ID: 6e124000-5d1c-fd5d-80ea-0002a40055b2@10.0.0.236 CSeq: 180 INVITE User-Agent: AddPac SIP Gateway Contact: sip:6604000@200.110.6.58 Content-Length: 0 Record-Route: sip:6604000@200.110.2.132;ftag=6e00fdeaa4;lr=on
10(6421) DEBUG: reply relayed. buf=0x80cb900: SIP/2.0 1..., shmem=0x402f6b10: SIP/2.0 1 10(6421) DBG: callback type 7, id 1 entered 10(6421) DEBUG: add_to_tail_of_timer[1]: 0x402f5588 10(6421) receive_msg: cleaning up 12(6423) SIP Request: 12(6423) method: <REGISTER> 12(6423) uri: sip:200.110.2.132 12(6423) version: <SIP/2.0> 12(6423) parse_headers: flags=1 12(6423) Found param type 232, <branch> = <z9hG4bK2f003c00a422890>; state=16 12(6423) end of header reached, state=5 12(6423) parse_headers: Via found, flags=1 12(6423) parse_headers: this is the first via 12(6423) After parse_msg... 12(6423) preparing to run routing scripts... 12(6423) DEBUG : is_maxfwd_present: searching for max_forwards header 12(6423) parse_headers: flags=128 12(6423) end of header reached, state=8 12(6423) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6600020@200.110.2.132] 12(6423) DEBUG: to body [sip:6600020@200.110.2.132 ] 12(6423) get_hdr_field: cseq <CSeq>: <22890> <REGISTER> 12(6423) DEBUG: get_hdr_body : content_length=0 12(6423) DEBUG: is_maxfwd_present: value = 70 12(6423) DEBUG: add_param: tag=2f003c00a4 12(6423) end of header reached, state=29 12(6423) parse_headers: flags=256 12(6423) found end of header 12(6423) find_first_route(): No Route headers found 12(6423) loose_route(): There is no Route HF 12(6423) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 12(6423) check_self - checking if port 5060 matches port 5060 12(6423) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 12(6423) check_self - checking if port 5060 matches port 5060 12(6423) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354] 12(6423) radius_authorize_sterman(): Success 12(6423) save_rpid(): rpid value is '' 12(6423) parse_headers: flags=-1 12(6423) parse_headers: flags=-1 12(6423) check_via_address(10.0.0.236, 10.0.0.236, 0) 12(6423) receive_msg: cleaning up 13(6424) SIP Request: 13(6424) method: <REGISTER> 13(6424) uri: sip:200.110.2.132 13(6424) version: <SIP/2.0> 13(6424) parse_headers: flags=1 13(6424) Found param type 232, <branch> = <z9hG4bK2f003c00a422891>; state=16 13(6424) end of header reached, state=5 13(6424) parse_headers: Via found, flags=1 13(6424) parse_headers: this is the first via 13(6424) After parse_msg... 13(6424) preparing to run routing scripts... 13(6424) DEBUG : is_maxfwd_present: searching for max_forwards header 13(6424) parse_headers: flags=128 13(6424) end of header reached, state=8 13(6424) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6603000@200.110.2.132] 13(6424) DEBUG: to body [sip:6603000@200.110.2.132 ] 13(6424) get_hdr_field: cseq <CSeq>: <22891> <REGISTER> 13(6424) DEBUG: get_hdr_body : content_length=0 13(6424) DEBUG: is_maxfwd_present: value = 70 13(6424) DEBUG: add_param: tag=2f003c00a4 13(6424) end of header reached, state=29 13(6424) parse_headers: flags=256 13(6424) found end of header 13(6424) find_first_route(): No Route headers found 13(6424) loose_route(): There is no Route HF 13(6424) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 13(6424) check_self - checking if port 5060 matches port 5060 13(6424) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 13(6424) check_self - checking if port 5060 matches port 5060 13(6424) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354] 13(6424) radius_authorize_sterman(): Success 13(6424) save_rpid(): rpid value is '' 13(6424) parse_headers: flags=-1 13(6424) parse_headers: flags=-1 13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0) 13(6424) receive_msg: cleaning up 18(6429) DEBUG: timer routine:4,tl=0x402f5574 next=(nil) 16(6427) SIP Request: 16(6427) method: <REGISTER> 16(6427) uri: sip:200.110.2.132 16(6427) version: <SIP/2.0> 16(6427) parse_headers: flags=1 16(6427) Found param type 232, <branch> = <z9hG4bK2f003c00a422892>; state=16 16(6427) end of header reached, state=5 16(6427) parse_headers: Via found, flags=1 16(6427) parse_headers: this is the first via 16(6427) After parse_msg... 16(6427) preparing to run routing scripts... 16(6427) DEBUG : is_maxfwd_present: searching for max_forwards header 16(6427) parse_headers: flags=128 16(6427) end of header reached, state=8 16(6427) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6600020@200.110.2.132] 16(6427) DEBUG: to body [sip:6600020@200.110.2.132 ] 16(6427) get_hdr_field: cseq <CSeq>: <22892> <REGISTER> 16(6427) DEBUG: get_hdr_body : content_length=0 16(6427) DEBUG: is_maxfwd_present: value = 70 16(6427) DEBUG: add_param: tag=2f003c00a4 16(6427) end of header reached, state=29 16(6427) parse_headers: flags=256 16(6427) found end of header 16(6427) find_first_route(): No Route headers found 16(6427) loose_route(): There is no Route HF 16(6427) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 16(6427) check_self - checking if port 5060 matches port 5060 16(6427) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 16(6427) check_self - checking if port 5060 matches port 5060 16(6427) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354] 16(6427) radius_authorize_sterman(): Success 16(6427) save_rpid(): rpid value is '' 16(6427) parse_headers: flags=-1 16(6427) parse_headers: flags=-1 16(6427) check_via_address(10.0.0.236, 10.0.0.236, 0) 16(6427) receive_msg: cleaning up 10(6421) SIP Request: 10(6421) method: <REGISTER> 10(6421) uri: sip:200.110.2.132 10(6421) version: <SIP/2.0> 10(6421) parse_headers: flags=1 10(6421) Found param type 232, <branch> = <z9hG4bK2f003c00a422893>; state=16 10(6421) end of header reached, state=5 10(6421) parse_headers: Via found, flags=1 10(6421) parse_headers: this is the first via 10(6421) After parse_msg... 10(6421) preparing to run routing scripts... 10(6421) DEBUG : is_maxfwd_present: searching for max_forwards header 10(6421) parse_headers: flags=128 10(6421) end of header reached, state=8 10(6421) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6603000@200.110.2.132] 10(6421) DEBUG: to body [sip:6603000@200.110.2.132 ] 10(6421) get_hdr_field: cseq <CSeq>: <22893> <REGISTER> 10(6421) DEBUG: get_hdr_body : content_length=0 10(6421) DEBUG: is_maxfwd_present: value = 70 10(6421) DEBUG: add_param: tag=2f003c00a4 10(6421) end of header reached, state=29 10(6421) parse_headers: flags=256 10(6421) found end of header 10(6421) find_first_route(): No Route headers found 10(6421) loose_route(): There is no Route HF 10(6421) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 10(6421) check_self - checking if port 5060 matches port 5060 10(6421) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 10(6421) check_self - checking if port 5060 matches port 5060 10(6421) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354] 10(6421) radius_authorize_sterman(): Success 10(6421) save_rpid(): rpid value is '' 10(6421) parse_headers: flags=-1 10(6421) parse_headers: flags=-1 10(6421) check_via_address(10.0.0.236, 10.0.0.236, 0) 10(6421) receive_msg: cleaning up 11(6422) SIP Reply (status): 11(6422) version: <SIP/2.0> 11(6422) status: <200> 11(6422) reason: <OK> 11(6422) parse_headers: flags=1 11(6422) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16 11(6422) end of header reached, state=5 11(6422) parse_headers: Via found, flags=1 11(6422) parse_headers: this is the first via 11(6422) After parse_msg... 11(6422) forward_reply: found module tm, passing reply to it 11(6422) DEBUG: t_check: msg id=6 global id=0 T start=0xffffffff 11(6422) parse_headers: flags=17 11(6422) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16 11(6422) end of header reached, state=5 11(6422) parse_headers: Via found, flags=17 11(6422) parse_headers: this is the second via 11(6422) DEBUG: add_param: tag=218f2c81a4 11(6422) end of header reached, state=29 11(6422) DEBUG: get_hdr_field: <To> [44]; uri=[sip:6604000@200.110.2.132] 11(6422) DEBUG: to body [sip:6604000@200.110.2.132] 11(6422) get_hdr_field: cseq <CSeq>: <180> <INVITE> 11(6422) parse_headers: flags=4 11(6422) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0 11(6422) DEBUG: t_reply_matching: reply matched (T=0x402f5450)! 11(6422) parse_headers: flags=4 11(6422) DBG: callback type 1, id 5 entered 11(6422) parse_headers: flags=4 11(6422) DEBUG: t_check: msg id=6 global id=6 T end=0x402f5450 11(6422) DEBUG: t_on_reply: org. status uas=180, uac[0]=180 local=0 is_invite=1) 11(6422) ->>>>>>>>> T_code=180, new_code=200 11(6422) DEBUG: relay_reply: branch=0, save=0, relay=0 11(6422) old size: 682, new size: 620 11(6422) build_res_from_sip_res: copied size: orig:78, new: 16, rest: 604 msg= SIP/2.0 200 OK Via: SIP/2.0/UDP 10.0.0.236:5060;branch=z9hG4bK6e00fdeaa4180 From: sip:6603000@200.110.2.132;tag=6e00fdeaa4 To: sip:6604000@200.110.2.132;tag=218f2c81a4 Call-ID: 6e124000-5d1c-fd5d-80ea-0002a40055b2@10.0.0.236 CSeq: 180 INVITE Session-Expires: 1800;refresher=uac User-Agent: AddPac SIP Gateway Contact: sip:6604000@200.110.6.58 Require: timer Content-Type: application/sdp Content-Length: 129 Record-Route: sip:6604000@200.110.2.132;ftag=6e00fdeaa4;lr=on
v=0 o=AddpacTechSIP-GW-UserAgent 0 0 IN IP4 200.110.6.58 s=SIP Session c=IN IP4 200.110.6.58 t=0 0 m=audio 23120 RTP/AVP 4
11(6422) DEBUG: update_totag_set: new totag 11(6422) DEBUG: reply relayed. buf=0x80cbda0: SIP/2.0 2..., shmem=0x402f70d8: SIP/2.0 2 11(6422) DBG: callback type 7, id 1 entered 18(6429) DEBUG: timer routine:1,tl=0x402f5588 next=(nil)