#debug=6
fork=yes
log_stderror=no
check_via=no # (cmd. line:
-v)
dns=no #
(cmd. line: -r)
rev_dns=no # (cmd. line:
-R)
port=5060
children=4
fifo="/tmp/ser_fifo"
fifo_mode=0666
fifo_db_url="mysql://ser:hesloimgs@ns2.italycomnet.it/ser"
listen=213.178.216.45
modparam("domain", "db_url",
"mysql://ser:heslo@xxx.xxxxxx.it/ser")
modparam("domain", "db_mode",
1)
modparam("domain", "domain_table", "domain")
modparam("domain",
"domain_col", "domain")
modparam("permissions", "db_url",
"mysql://ser:heslo@xxx.xxxxxx.it/ser")
modparam("permissions", "db_mode",
1)
modparam("permissions", "trusted_table", "trusted")
modparam("uri_db",
"db_url", "mysql://ser:heslo@xxx.xxxxxx.it/ser")
modparam("usrloc", "db_url",
"mysql://ser:heslo@xxx.xxxxxx.it/ser")
modparam("usrloc", "db_mode",
1)
modparam("usrloc", "use_domain",1)
modparam("auth_db", "db_url",
"mysql://ser:heslo@xxx.xxxxxx.it/ser")
modparam("auth_db", "calculate_ha1",
yes)
modparam("auth_db", "password_column",
"password")
modparam("registrar", "nat_flag", 6)
modparam("registrar",
"use_domain",1)
modparam("nathelper", "natping_interval",
0)
modparam("nathelper", "rtpproxy_disable", 1)
modparam("mediaproxy","natping_interval",30)
modparam("acc", "db_url",
"mysql://ser:heslo@xxx.xxxxxx.it/ser")
modparam("acc", "db_flag",
1)
modparam("acc", "db_missed_flag", 1)
modparam("acc",
"failed_transactions", 1)
modparam("acc", "report_cancels",
1)
modparam("acc", "log_fmt", "cdfimorstup")
modparam("acc", "log_level",
1)
modparam("acc", "report_ack", 1)
modparam("rr", "enable_full_lr",
1)
modparam("tm", "fr_timer", 40)
modparam("tm", "fr_inv_timer",
60)
modparam("tm", "fr_inv_timer_avp", "inv_timeout")
modparam("tm",
"wt_timer", 5)
modparam("group", "db_url",
"mysql://ser:heslo@xxx.xxxxxx.it/ser")
#
route[2] {
sl_send_reply("100", "ci
provo...");
if
(!search("^Contact:\ +\*") && client_nat_test("7"))
{
setflag(6);
fix_nated_register();
force_rport();
};
if (!www_authorize("",
"subscriber"))
{
www_challenge("",
"0");
break;
};
route[3] {
if
(client_nat_test("3")){
setflag(7);
force_rport();
fix_nated_contact();
};
if (method=="INVITE" &&
!allow_trusted())
{
if (!proxy_authorize("", "subscriber"))
{
proxy_challenge("",
"0");
break;
} else if (!check_from())
{
sl_send_reply("403","Setta
From=ID");
break;
};
consume_credentials();
};
lookup("aliases");
if
(uri!=myself)
{
route(5);
route(1);
break;
};
if (!lookup("location")
&& !isflagset(4)) {
_______________________________________________
Serusers mailing
list
serusers@lists.iptel.org
http://lists.iptel.org/mailman/listinfo/serusers