Hi,
I have found a few posts on this error from Google but none of the solutions works.  I am able to use radius_proxy_authorize for REGISTER request without problem.  But when I use radius_proxy_authorize for INVITE, Opensers can't authroize it.  I have tried:

radius_proxy_authorize("192.168.1.104"))
proxy_authorize("192.168.1.104","subscriber")
radius_proxy_authorize(""))
proxy_authorize("","subscriber
")

I have been stuck with this for days already and I truely hope someone can tell me what could be wrong with my setup.  I am pretty much in a stage of desperation right now.  Thanks in advance for all your help.


Here are the relevant lines in openser.cfg:
#if (!radius_proxy_authorize("192.168.1.104")) {
                       if (!proxy_authorize("192.168.1.104","subscriber")) {
                            www_challenge("192.168.1.104","1");
                            exit;
                        }

Here is the openser debug log, I have highlighted the part that proxy_authorize throws error:

Jun  1 05:37:16 [29028] DBG:core:parse_msg: SIP Request:
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  method:  <INVITE>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  uri:     <sip:1006@192.168.1.104>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  version: <SIP/2.0>
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232, <branch> = <z9hG4bK-f072f593>; state=16
Jun  1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5
Jun  1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_headers: this is the first via
Jun  1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg...
Jun  1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing scripts...
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=8
Jun  1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=10
Jun  1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={sip:1006@192.168.1.104}
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [33]; uri=[sip:1006@192.168.1.104]
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" <sip:1006@192.168.1.104>
]
Jun  1 05:37:16 [29028] DBG:core:pv_get_to_attr: no To tag
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: cseq <CSeq>: <101> <INVITE>
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: content_length=393
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: found end of header
Jun  1 05:37:16 [29028] DBG:core:parse_to_param: tag=39a9124ca59076d9o0
Jun  1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29
Jun  1 05:37:16 [29028] DBG:core:parse_to: display={"1005"}, ruri={sip:1005@192.168.1.104}
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=14000
Jun  1 05:37:16 [29028] DBG:core:pv_get_authattr: no [Proxy-]Authorization header
Sun Jun  1 05:37:16 2008-192.168.1.101::method <INVITE> r-uri <sip:1006@192.168.1.104> to-tag <<null>>  2nd via <<null>> to-header <sip:1006@192.168.1.104> from-header <sip:1005@192.168.1.104> auth-user <<null>>
Jun  1 05:37:16 [29028] DBG:maxfwd:is_maxfwd_present: value = 70
Jun  1 05:37:16 [29028] DBG:core:check_via_address: params 192.168.1.101, 192.168.1.101, 0
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=80
before fix nated contact
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=80

Jun  1 05:37:16 [29028] DBG:uri:has_totag: no totag
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=78
Jun  1 05:37:16 [29028] DBG:tm:t_lookup_request: start searching: hash=59293, isACK=0
Jun  1 05:37:16 [29028] DBG:tm:matching_3261: RFC3261 transaction matching failed
Jun  1 05:37:16 [29028] DBG:tm:t_lookup_request: no transaction found

Jun  1 05:37:16 [29028] DBG:domain:is_domain_local: Realm '192.168.1.104' is local
Jun  1 05:37:16 [29028] DBG:core:db_free_rows: freeing 1 rows
Jun  1 05:37:16 [29028] DBG:core:db_free_rows: row[0]=0x81a1c28
Jun  1 05:37:16 [29028] DBG:core:db_free_rows: 0x81a1c28=pkg_free() RES_ROWS

Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=10000
Jun  1 05:37:16 [29028] DBG:auth:pre_auth: credentials with given realm not found

Jun  1 05:37:16 [29028] DBG:auth:build_auth_hf: 'WWW-Authenticate: Digest realm="192.168.1.104", nonce="4841c6380fa8573a4e9794b1a0a2df9f3e53cb49", qop="auth"
'
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff
Jun  1 05:37:16 [29028] DBG:core:check_via_address: params 192.168.1.101, 192.168.1.101, 0
Jun  1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list 0xb5bf9be0
Jun  1 05:37:16 [29028] DBG:core:receive_msg: cleaning up
Jun  1 05:37:16 [29028] DBG:core:parse_msg: SIP Request:
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  method:  <ACK>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  uri:     <sip:1006@192.168.1.104>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  version: <SIP/2.0>
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232, <branch> = <z9hG4bK-f072f593>; state=16
Jun  1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5
Jun  1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_headers: this is the first via
Jun  1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg...
Jun  1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing scripts...
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=8
Jun  1 05:37:16 [29028] DBG:core:parse_to_param: tag=026ab2c49274b4e0186dd72188f7d50a.939a
Jun  1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29
Jun  1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={sip:1006@192.168.1.104}
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [75]; uri=[sip:1006@192.168.1.104]
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" <sip:1006@192.168.1.104>]
Jun  1 05:37:16 [29028] DBG:sl:sl_filter_ACK: local ACK found -> dropping it!
Jun  1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list (nil)
Jun  1 05:37:16 [29028] DBG:core:receive_msg: cleaning up
Jun  1 05:37:16 [29028] DBG:core:parse_msg: SIP Request:
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  method:  <INVITE>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  uri:     <sip:1006@192.168.1.104>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  version: <SIP/2.0>
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232, <branch> = <z9hG4bK-dc12d56c>; state=16
Jun  1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5
Jun  1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_headers: this is the first via
Jun  1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg...
Jun  1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing scripts...
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=8
Jun  1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=10
Jun  1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={sip:1006@192.168.1.104}
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [33]; uri=[sip:1006@192.168.1.104]
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" <sip:1006@192.168.1.104>
]
Jun  1 05:37:16 [29028] DBG:core:pv_get_to_attr: no To tag
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: cseq <CSeq>: <102> <INVITE>
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: content_length=393
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: found end of header
Jun  1 05:37:16 [29028] DBG:core:parse_to_param: tag=39a9124ca59076d9o0
Jun  1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29
Jun  1 05:37:16 [29028] DBG:core:parse_to: display={"1005"}, ruri={sip:1005@192.168.1.104}
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=14000
Sun Jun  1 05:37:16 2008-192.168.1.101::method <INVITE> r-uri <sip:1006@192.168.1.104> to-tag <<null>>  2nd via <<null>> to-header <sip:1006@192.168.1.104> from-header <sip:1005@192.168.1.104> auth-user <1005>
Jun  1 05:37:16 [29028] DBG:maxfwd:is_maxfwd_present: value = 70
Jun  1 05:37:16 [29028] DBG:core:check_via_address: params 192.168.1.101, 192.168.1.101, 0
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=80

Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=80

Jun  1 05:37:16 [29028] DBG:uri:has_totag: no totag
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=78
Jun  1 05:37:16 [29028] DBG:tm:t_lookup_request: start searching: hash=59290, isACK=0
Jun  1 05:37:16 [29028] DBG:tm:matching_3261: RFC3261 transaction matching failed
Jun  1 05:37:16 [29028] DBG:tm:t_lookup_request: no transaction found

Jun  1 05:37:16 [29028] DBG:domain:is_domain_local: Realm '192.168.1.104' is local
Jun  1 05:37:16 [29028] DBG:core:db_free_rows: freeing 1 rows
Jun  1 05:37:16 [29028] DBG:core:db_free_rows: row[0]=0x81a1c28
Jun  1 05:37:16 [29028] DBG:core:db_free_rows: 0x81a1c28=pkg_free() RES_ROWS

Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=10000
Jun  1 05:37:16 [29028] DBG:auth:pre_auth: credentials with given realm not found

Jun  1 05:37:16 [29028] DBG:auth:build_auth_hf: 'WWW-Authenticate: Digest realm="192.168.1.104", nonce="4841c6380fa8573a4e9794b1a0a2df9f3e53cb49", qop="auth"
'
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff
Jun  1 05:37:16 [29028] DBG:core:check_via_address: params 192.168.1.101, 192.168.1.101, 0
Jun  1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list 0xb5bf9be0
Jun  1 05:37:16 [29028] DBG:core:receive_msg: cleaning up
Jun  1 05:37:16 [29028] DBG:core:parse_msg: SIP Request:
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  method:  <ACK>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  uri:     <sip:1006@192.168.1.104>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  version: <SIP/2.0>
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232, <branch> = <z9hG4bK-dc12d56c>; state=16
Jun  1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5
Jun  1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_headers: this is the first via
Jun  1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg...
Jun  1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing scripts...
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=8
Jun  1 05:37:16 [29028] DBG:core:parse_to_param: tag=026ab2c49274b4e0186dd72188f7d50a.6388
Jun  1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29
Jun  1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={sip:1006@192.168.1.104}
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [75]; uri=[sip:1006@192.168.1.104]
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" <sip:1006@192.168.1.104>]
Jun  1 05:37:16 [29028] DBG:sl:sl_filter_ACK: local ACK found -> dropping it!
Jun  1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list (nil)
Jun  1 05:37:16 [29028] DBG:core:receive_msg: cleaning up



Here is the SIP trace:

U 192.168.1.101:5062 -> 192.168.1.104:5060
INVITE sip:1005@192.168.1.104 SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-d392c9a5.
From: "1005" <sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104>.
Call-ID: a3888884-92d13124@192.168.1.101.
CSeq: 101 INVITE.
Max-Forwards: 70.
Contact: "1005" <sip:1005@192.168.1.101:5062>.
Expires: 240.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 395.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Content-Type: application/sdp.
.
v=0.
o=- 36185 36185 IN IP4 192.168.1.101.
s=-.
c=IN IP4 192.168.1.101.
t=0 0.
m=audio 16424 RTP/AVP 0 2 4 8 18 96 97 98 101.
a=rtpmap:0 PCMU/8000.
a=rtpmap:2 G726-32/8000.
a=rtpmap:4 G723/8000.
a=rtpmap:8 PCMA/8000.
a=rtpmap:18 G729a/8000.
a=rtpmap:96 G726-40/8000.
a=rtpmap:97 G726-24/8000.
a=rtpmap:98 G726-16/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.


U 192.168.1.104:5060 -> 192.168.1.101:5062
SIP/2.0 401 Unauthorized.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-d392c9a5;rport=5062.
From: "1005" <sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104>;tag=026ab2c49274b4e0186dd72188f7d50a.f608.
Call-ID: a3888884-92d13124@192.168.1.101.
CSeq: 101 INVITE.
WWW-Authenticate: Digest realm="192.168.1.104", nonce="4841caae665a98cec71734a5cf84c70d10ac8f63", qop="auth".
Server: OpenSER (1.3.2-notls (i386/linux)).
Content-Length: 0.
.


U 192.168.1.101:5062 -> 192.168.1.104:5060
ACK sip:1005@192.168.1.104 SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-d392c9a5.
From: "1005" <sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104>;tag=026ab2c49274b4e0186dd72188f7d50a.f608.
Call-ID: a3888884-92d13124@192.168.1.101.
CSeq: 101 ACK.
Max-Forwards: 70.
Contact: "1005" <sip:1005@192.168.1.101:5062>.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 0.
.


U 192.168.1.101:5062 -> 192.168.1.104:5060
INVITE sip:1005@192.168.1.104 SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-4cf05fb6.
From: "1005" <sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104>.
Call-ID: a3888884-92d13124@192.168.1.101.
CSeq: 102 INVITE.
Max-Forwards: 70.
Authorization: Digest username="1005",realm="192.168.1.104",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri="sip:1005@192.168.1.104",algorithm=MD5,response="e39bd9dc46a72ea191fca87e98cf9136",qop=auth,nc=00000001,cnonce="9d027a79".
Contact: "1005" <sip:1005@192.168.1.101:5062>.
Expires: 240.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 395.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Content-Type: application/sdp.
.
v=0.
o=- 36185 36185 IN IP4 192.168.1.101.
s=-.
c=IN IP4 192.168.1.101.
t=0 0.
m=audio 16424 RTP/AVP 0 2 4 8 18 96 97 98 101.
a=rtpmap:0 PCMU/8000.
a=rtpmap:2 G726-32/8000.
a=rtpmap:4 G723/8000.
a=rtpmap:8 PCMA/8000.
a=rtpmap:18 G729a/8000.
a=rtpmap:96 G726-40/8000.
a=rtpmap:97 G726-24/8000.
a=rtpmap:98 G726-16/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.


U 192.168.1.104:5060 -> 192.168.1.101:5062
SIP/2.0 401 Unauthorized.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-4cf05fb6;rport=5062.
From: "1005" <sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104>;tag=026ab2c49274b4e0186dd72188f7d50a.218e.
Call-ID: a3888884-92d13124@192.168.1.101.
CSeq: 102 INVITE.
WWW-Authenticate: Digest realm="192.168.1.104", nonce="4841caae665a98cec71734a5cf84c70d10ac8f63", qop="auth".
Server: OpenSER (1.3.2-notls (i386/linux)).
Content-Length: 0.
.


U 192.168.1.101:5062 -> 192.168.1.104:5060
ACK sip:1005@192.168.1.104 SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-4cf05fb6.
From: "1005" <sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104>;tag=026ab2c49274b4e0186dd72188f7d50a.218e.
Call-ID: a3888884-92d13124@192.168.1.101.
CSeq: 102 ACK.
Max-Forwards: 70.
Authorization: Digest username="1005",realm="192.168.1.104",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri="sip:1005@192.168.1.104",algorithm=MD5,response="dc66b568ed8ec48f0f405aa063156eaa",qop=auth,nc=00000001,cnonce="9d027a79".
Contact: "1005" <sip:1005@192.168.1.101:5062>.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 0.
.


U 192.168.1.101:5062 -> 192.168.1.104:5060
INVITE sip:1005@192.168.1.104 SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-e2c260be.
From: "1005" <sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104>.
Call-ID: a3888884-92d13124@192.168.1.101.
CSeq: 103 INVITE.
Max-Forwards: 70.
Authorization: Digest username="1005",realm="192.168.1.104",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri="sip:1005@192.168.1.104",algorithm=MD5,response="8d2b52278a72326a57361ec1ca2601c3",qop=auth,nc=00000001,cnonce="f4b6f3a0".
Contact: "1005" <sip:1005@192.168.1.101:5062>.
Expires: 240.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 395.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Content-Type: application/sdp.
.
v=0.
o=- 36185 36185 IN IP4 192.168.1.101.
s=-.
c=IN IP4 192.168.1.101.
t=0 0.
m=audio 16424 RTP/AVP 0 2 4 8 18 96 97 98 101.
a=rtpmap:0 PCMU/8000.
a=rtpmap:2 G726-32/8000.
a=rtpmap:4 G723/8000.
a=rtpmap:8 PCMA/8000.
a=rtpmap:18 G729a/8000.
a=rtpmap:96 G726-40/8000.
a=rtpmap:97 G726-24/8000.
a=rtpmap:98 G726-16/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.


U 192.168.1.104:5060 -> 192.168.1.101:5062
SIP/2.0 401 Unauthorized.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-e2c260be;rport=5062.
From: "1005" <sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104>;tag=026ab2c49274b4e0186dd72188f7d50a.8d8a.
Call-ID: a3888884-92d13124@192.168.1.101.
CSeq: 103 INVITE.
WWW-Authenticate: Digest realm="192.168.1.104", nonce="4841caae665a98cec71734a5cf84c70d10ac8f63", qop="auth".
Server: OpenSER (1.3.2-notls (i386/linux)).
Content-Length: 0.
.


U 192.168.1.101:5062 -> 192.168.1.104:5060
ACK sip:1005@192.168.1.104 SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-e2c260be.
From: "1005" <sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104>;tag=026ab2c49274b4e0186dd72188f7d50a.8d8a.
Call-ID: a3888884-92d13124@192.168.1.101.
CSeq: 103 ACK.
Max-Forwards: 70.
Authorization: Digest username="1005",realm="192.168.1.104",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri="sip:1005@192.168.1.104",algorithm=MD5,response="8ebde837f7c7c49f721d9f2c44b3797d",qop=auth,nc=00000001,cnonce="f4b6f3a0".
Contact: "1005" <sip:1005@192.168.1.101:5062>.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 0.