Hi users,
I'm cracking my head with "500 :-I'm terribly sorry, server error occurred (1/SL) " . What's mean this... When I trying to calls from softphone to softphone " its says above message '.
openser server ip 192.168.2.4 sip -domain is xxx.xxx.xxx.xxx softphones ip are 192.168.2.21 and 20 which behind the NAT ( i.e not in server location ,its some where place )
please check the marked one in debug.
SIP Request: 0(29266) method: <INVITE> 0(29266) uri: sip:104@24.98.157.209 0(29266) version: <SIP/2.0> 0(29266) parse_headers: flags=2 0(29266) Found param type 235, <rport> = <n/a>; state=6 0(29266) Found param type 232, <branch> = <z9hG4bK1EA935B35FA14629985951EBA8B3F547>; state=16 0(29266) end of header reached, state=5 0(29266) parse_headers: Via found, flags=2 0(29266) parse_headers: this is the first via 0(29266) After parse_msg... 0(29266) preparing to run routing scripts... 0(29266) LOG:- step1 0(29266) parse_headers: flags=100 0(29266) DEBUG:parse_to:end of header reached, state=9 0(29266) DEBUG: get_hdr_field: <t> [25]; uri=[sip:104@xxx.xxx.xxx.xxx] 0(29266) DEBUG: to body [sip:104@xxx.xxx.xxx.xxx ] 0(29266) get_hdr_field: cseq <CSeq>: <3472> <INVITE> 0(29266) DEBUG:maxfwd:is_maxfwd_present: value = 70 0(29266) parse_headers: flags=200 0(29266) DEBUG: get_hdr_body : content_length=149 0(29266) found end of header 0(29266) find_first_route: No Route headers found 0(29266) loose_route: There is no Route HF 0(29266) LOG:- method not reg 0(29266) DEBUG: add_param: tag=612182576 0(29266) DEBUG:parse_to:end of header reached, state=29 0(29266) parse_headers: flags=200 0(29266) find_first_route: No Route headers found 0(29266) loose_route: There is no Route HF 0(29266) grep_sock_info - checking if host==us: 13==11 && xxx.xxx.xxx.xxx] == [192.168.2.4] 0(29266) grep_sock_info - checking if port 5060 matches port 5060 0(29266) grep_sock_info - checking if host==us: 13==13 && xxx.xxx.xxx.xxx] == [xxx.xxx.xxx.xxx] 0(29266) grep_sock_info - checking if port 5060 matches port 5060 0(29266) LOG:- uri method myself 0(29266) LOG:- INVITE & ACK IN URI 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) DEBUG:check_content_type: type <application/sdp> found valid 0(29266) record_route(): Double attempt to record-route 0(29266) parse_headers: flags=58 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) DEBUG:check_content_type: type <application/sdp> found valid 0(29266) parse_headers: flags=40 0(29266) force_rtp_proxy2: proxy reply: 35002
0(29266) DEBUG: t_newtran: msg id=5 , global msg id=0 , T on entrance=0xffffffff 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) parse_headers: flags=78 0(29266) t_lookup_request: start searching: hash=43828, isACK=0 0(29266) DEBUG: RFC3261 transaction matching failed 0(29266) DEBUG: t_lookup_request: no transaction found 0(29266) DBG: trans=0xb6123100, callback type 1, id 0 entered 0(29266) DEBUG:tm:t_relay: new INVITE 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) check_via_address(61.17.248.68, 192.168.2.21, 0) 0(29266) WARNING:vqm_resize: resize(0) called 0(29266) DEBUG:tm:_reply_light: reply sent out. buf=0x81213a0: SIP/2.0 1..., shmem=0xb61247a8: SIP/2.0 1 0(29266) DEBUG:tm:_reply_light: finished 0(29266) DEBUG: mk_proxy: doing DNS lookup... 0(29266) parse_headers: flags=1000 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) clen_builder: content-length: 187 (187) 0(29266) check_via_address(61.17.248.68, 192.168.2.21, 0) 0(29266) DEBUG: add_to_tail_of_timer[4]: 0xb612321c 0(29266) DEBUG: add_to_tail_of_timer[0]: 0xb612322c 0(29266) SER: new transaction fwd'ed 0(29266) rewrite_uri: Rewriting Request-URI with 'sip:104@192.168.2.20 :5060' 0(29266) lookup(): '104' Not found in usrloc 0(29266) grep_sock_info - checking if host==us: 12==11 && [192.168.2.20] == [192.168.2.4] 0(29266) grep_sock_info - checking if port 5060 matches port 5060 0(29266) grep_sock_info - checking if host==us: 12==13 && [192.168.2.20] == [xxx.xxx.xxx.xxx] 0(29266) grep_sock_info - checking if port 5060 matches port 5060 0(29266) grep_sock_info - checking if host==us: 12==11 && [192.168.2.20] == [192.168.2.4] 0(29266) grep_sock_info - checking if port 5060 matches port 5060 0(29266) grep_sock_info - checking if host==us: 12==13 && [192.168.2.20] == xxx.xxx.xxx.xxx] 0(29266) grep_sock_info - checking if port 5060 matches port 5060 0(29266) check_self: host != me 0(29266) LOG:_ uri in uri myself 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) DEBUG: t_newtran: msg id=5 , global msg id=5 , T on entrance=0xb6123100 0(29266) ERROR: t_newtran: transaction already in process 0xb6123100 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) check_via_address(61.17.248.68, 192.168.2.21, 0) 0(29266) ERROR: sl_reply_error used: I'm terribly sorry, server error occurred (1/SL) 0(29266) LOG:- ENeter into route 1 0(29266) DEBUG: t_newtran: msg id=5 , global msg id=5 , T on entrance=0xb6123100 0(29266) ERROR: t_newtran: transaction already in process 0xb6123100 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) check_via_address(61.17.248.68, 192.168.2.21, 0) 0(29266) ERROR: sl_reply_error used: I'm terribly sorry, server error occurred (1/SL) 0(29266) DEBUG:destroy_avp_list: destroying list (nil) 0(29266) receive_msg: cleaning up 0(29266) SIP Request: 0(29266) method: <ACK> 0(29266) uri: sip:104@24.98.157.209 0(29266) version: <SIP/2.0> 0(29266) parse_headers: flags=2 0(29266) Found param type 235, <rport> = <n/a>; state=6 0(29266) Found param type 232, <branch> = <z9hG4bK1EA935B35FA14629985951EBA8B3F547>; state=16 0(29266) end of header reached, state=5 0(29266) parse_headers: Via found, flags=2 0(29266) parse_headers: this is the first via 0(29266) After parse_msg... 0(29266) preparing to run routing scripts... 0(29266) parse_headers: flags=8 0(29266) DEBUG: add_param: tag=30901ad8c164fe584bedac02134d4858.65cc 0(29266) DEBUG:parse_to:end of header reached, state=29 0(29266) DEBUG: get_hdr_field: <t> [67]; uri=[sip:104@24.98.157.209] 0(29266) DEBUG: to body [sip:104@24.98.157.209] 0(29266) DEBUG: sl_filter_ACK : local ACK found -> dropping it! 0(29266) DEBUG:destroy_avp_list: destroying list (nil) 0(29266) receive_msg: cleaning up 0(29266) SIP Request: 0(29266) method: <ACK> 0(29266) uri: sip:104@24.98.157.209 0(29266) version: <SIP/2.0> 0(29266) parse_headers: flags=2 0(29266) Found param type 235, <rport> = <n/a>; state=6 0(29266) Found param type 232, <branch> = <z9hG4bK1EA935B35FA14629985951EBA8B3F547>; state=16 0(29266) end of header reached, state=5 0(29266) parse_headers: Via found, flags=2 0(29266) parse_headers: this is the first via 0(29266) After parse_msg... 0(29266) preparing to run routing scripts... 0(29266) parse_headers: flags=8 0(29266) DEBUG: add_param: tag=30901ad8c164fe584bedac02134d4858.65cc 0(29266) DEBUG:parse_to:end of header reached, state=29 0(29266) DEBUG: get_hdr_field: <t> [67]; uri=[sip:104@24.98.157.209] 0(29266) DEBUG: to body [sip:104@24.98.157.209] 0(29266) DEBUG: sl_filter_ACK : local ACK found -> dropping it! 0(29266) DEBUG:destroy_avp_list: destroying list (nil)
............................................................................... openser.cfg
route { log("LOG:- step1\n"); if(!mf_process_maxfwd_header("13")) { sl_send_reply("483","Too many hops are there "); exit; }; if(msg:len>max_len) { sl_send_reply("513","Messages are Too Big ... !"); exit; }; # loose_route(); if(!method=="REGISTER") { log("LOG:- method not reg \n"); record_route(); }; if(loose_route()) { log("LOG:- loose route\n"); acc_rad_request("200"); t_relay(); exit; }; if(uri==myself) { log("LOG:- uri method myself\n"); if(method=="REGISTER") { log("LOG:- REG IN URI MY SELF \n"); if(!www_authorize("xxx.xxx.xxx.xxx.","subscriber")) { log("LOG :- REG IN URI AUTH\n"); www_challenge("xxx.xxx.xxx.xxx","0"); exit; }; save("location"); setflag(6); force_rport(); exit; }; if(method=="INVITE"||method=="ACK") { log("LOG:- INVITE & ACK IN URI \n"); # if (uri =~ "^sip:1].@*"){ # log("LOG:-rewrite port and host\n"); log("LOG:- Aftere the rewite \n "); fix_nated_sdp("1"); record_route(); acc_rad_request("Start"); force_rtp_proxy(); t_on_reply("1"); t_relay(); }; if(method=="BYE"||method=="CANCEL") { setflag(2); acc_rad_request("200"); unforce_rtp_proxy(); }; if(!lookup("location")) { log("LOG:- NOT IN LOCATION \n"); sl_send_reply("404","sorry guy ... urs friend Not found"); exit; }; }; lookup("aliases"); # if (!uri==myself) { # log("LOG:_ uri in uri myself \n"); # append_hf("P-hint: outbound alias\r\n"); # route(1); # }; if(!t_relay()) { sl_reply_error(); }; # lookup("aliases"); # exit; route(1); # exit; } route[1] { log("LOG:- ENeter into route 1\n"); if(isflagset(6)) { force_rtp_proxy(); }; t_on_reply("1"); if(!t_relay()) { sl_reply_error(); }; } onreply_route[1] { log("LOG :- reply_route \n"); if(status=~"2[0-9][0-9]" && isflagset(6)) { log("LOG:- staus 183| 200 \n"); fix_nated_contact(); force_rtp_proxy(); }; }
Hi,
this means you do double t_relay() from your script (for the same request) - you have to debug your script to find the problem.
regards, bogdan
raviprakash sunkara wrote:
Hi users,
I'm cracking my head with "500 :-I'm terribly sorry, server error occurred (1/SL) " . What's mean this... When I trying to calls from softphone to softphone " its says above message '.
openser server ip 192.168.2.4 http://192.168.2.4 sip -domain is xxx.xxx.xxx.xxx softphones ip are 192.168.2.21 http://192.168.2.21 and 20 which behind the NAT ( i.e not in server location ,its some where place )
please check the marked one in debug.
SIP Request: 0(29266) method: <INVITE> 0(29266) uri: <sip:104@24.98.157.209 mailto:sip:104@24.98.157.209> 0(29266) version: <SIP/2.0> 0(29266) parse_headers: flags=2 0(29266) Found param type 235, <rport> = <n/a>; state=6 0(29266) Found param type 232, <branch> = <z9hG4bK1EA935B35FA14629985951EBA8B3F547>; state=16 0(29266) end of header reached, state=5 0(29266) parse_headers: Via found, flags=2 0(29266) parse_headers: this is the first via 0(29266) After parse_msg... 0(29266) preparing to run routing scripts... 0(29266) LOG:- step1 0(29266) parse_headers: flags=100 0(29266) DEBUG:parse_to:end of header reached, state=9 0(29266) DEBUG: get_hdr_field: <t> [25]; uri=[sip:104@xxx.xxx.xxx.xxx mailto:sip:104@xxx.xxx.xxx.xxx] 0(29266) DEBUG: to body [<sip:104@ xxx.xxx.xxx.xxx > ] 0(29266) get_hdr_field: cseq <CSeq>: <3472> <INVITE> 0(29266) DEBUG:maxfwd:is_maxfwd_present: value = 70 0(29266) parse_headers: flags=200 0(29266) DEBUG: get_hdr_body : content_length=149 0(29266) found end of header 0(29266) find_first_route: No Route headers found 0(29266) loose_route: There is no Route HF 0(29266) LOG:- method not reg 0(29266) DEBUG: add_param: tag=612182576 0(29266) DEBUG:parse_to:end of header reached, state=29 0(29266) parse_headers: flags=200 0(29266) find_first_route: No Route headers found 0(29266) loose_route: There is no Route HF 0(29266) grep_sock_info - checking if host==us: 13==11 && xxx.xxx.xxx.xxx ] == [192.168.2.4 http://192.168.2.4] 0(29266) grep_sock_info - checking if port 5060 matches port 5060 0(29266) grep_sock_info - checking if host==us: 13==13 && xxx.xxx.xxx.xxx ] == [ xxx.xxx.xxx.xxx ] 0(29266) grep_sock_info - checking if port 5060 matches port 5060 0(29266) LOG:- uri method myself 0(29266) LOG:- INVITE & ACK IN URI 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) DEBUG:check_content_type: type <application/sdp> found valid 0(29266) record_route(): Double attempt to record-route 0(29266) parse_headers: flags=58 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) DEBUG:check_content_type: type <application/sdp> found valid 0(29266) parse_headers: flags=40 0(29266) force_rtp_proxy2: proxy reply: 35002
0(29266) DEBUG: t_newtran: msg id=5 , global msg id=0 , T on entrance=0xffffffff 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) parse_headers: flags=78 0(29266) t_lookup_request: start searching: hash=43828, isACK=0 0(29266) DEBUG: RFC3261 transaction matching failed 0(29266) DEBUG: t_lookup_request: no transaction found 0(29266) DBG: trans=0xb6123100, callback type 1, id 0 entered 0(29266) DEBUG:tm:t_relay: new INVITE 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) check_via_address(61.17.248.68 http://61.17.248.68, 192.168.2.21 http://192.168.2.21, 0) 0(29266) WARNING:vqm_resize: resize(0) called 0(29266) DEBUG:tm:_reply_light: reply sent out. buf=0x81213a0: SIP/2.0 1..., shmem=0xb61247a8: SIP/2.0 1 0(29266) DEBUG:tm:_reply_light: finished 0(29266) DEBUG: mk_proxy: doing DNS lookup... 0(29266) parse_headers: flags=1000 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) clen_builder: content-length: 187 (187) 0(29266) check_via_address(61.17.248.68 http://61.17.248.68, 192.168.2.21 http://192.168.2.21, 0) 0(29266) DEBUG: add_to_tail_of_timer[4]: 0xb612321c 0(29266) DEBUG: add_to_tail_of_timer[0]: 0xb612322c 0(29266) SER: new transaction fwd'ed 0(29266) rewrite_uri: Rewriting Request-URI with 'sip:104@192.168.2.20:5060' 0(29266) lookup(): '104' Not found in usrloc 0(29266) grep_sock_info - checking if host==us: 12==11 && [192.168.2.20 http://192.168.2.20] == [192.168.2.4 http://192.168.2.4] 0(29266) grep_sock_info - checking if port 5060 matches port 5060 0(29266) grep_sock_info - checking if host==us: 12==13 && [192.168.2.20 http://192.168.2.20] == [ xxx.xxx.xxx.xxx ] 0(29266) grep_sock_info - checking if port 5060 matches port 5060 0(29266) grep_sock_info - checking if host==us: 12==11 && [192.168.2.20 http://192.168.2.20] == [192.168.2.4 http://192.168.2.4] 0(29266) grep_sock_info - checking if port 5060 matches port 5060 0(29266) grep_sock_info - checking if host==us: 12==13 && [192.168.2.20 http://192.168.2.20] == xxx.xxx.xxx.xxx ] 0(29266) grep_sock_info - checking if port 5060 matches port 5060 0(29266) check_self: host != me 0(29266) LOG:_ uri in uri myself 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) DEBUG: t_newtran: msg id=5 , global msg id=5 , T on entrance=0xb6123100 0(29266) ERROR: t_newtran: transaction already in process 0xb6123100 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) check_via_address(61.17.248.68 http://61.17.248.68, 192.168.2.21 http://192.168.2.21, 0) 0(29266) ERROR: sl_reply_error used: I'm terribly sorry, server error occurred (1/SL) 0(29266) LOG:- ENeter into route 1 0(29266) DEBUG: t_newtran: msg id=5 , global msg id=5 , T on entrance=0xb6123100 0(29266) ERROR: t_newtran: transaction already in process 0xb6123100 0(29266) parse_headers: flags=ffffffffffffffff 0(29266) check_via_address(61.17.248.68 http://61.17.248.68, 192.168.2.21 http://192.168.2.21, 0) 0(29266) ERROR: sl_reply_error used: I'm terribly sorry, server error occurred (1/SL) 0(29266) DEBUG:destroy_avp_list: destroying list (nil) 0(29266) receive_msg: cleaning up 0(29266) SIP Request: 0(29266) method: <ACK> 0(29266) uri: <sip:104@24.98.157.209 mailto:sip:104@24.98.157.209> 0(29266) version: <SIP/2.0> 0(29266) parse_headers: flags=2 0(29266) Found param type 235, <rport> = <n/a>; state=6 0(29266) Found param type 232, <branch> = <z9hG4bK1EA935B35FA14629985951EBA8B3F547>; state=16 0(29266) end of header reached, state=5 0(29266) parse_headers: Via found, flags=2 0(29266) parse_headers: this is the first via 0(29266) After parse_msg... 0(29266) preparing to run routing scripts... 0(29266) parse_headers: flags=8 0(29266) DEBUG: add_param: tag=30901ad8c164fe584bedac02134d4858.65cc 0(29266) DEBUG:parse_to:end of header reached, state=29 0(29266) DEBUG: get_hdr_field: <t> [67]; uri=[sip:104@24.98.157.209 mailto:sip:104@24.98.157.209] 0(29266) DEBUG: to body [<sip:104@24.98.157.209 mailto:sip:104@24.98.157.209>] 0(29266) DEBUG: sl_filter_ACK : local ACK found -> dropping it! 0(29266) DEBUG:destroy_avp_list: destroying list (nil) 0(29266) receive_msg: cleaning up 0(29266) SIP Request: 0(29266) method: <ACK> 0(29266) uri: <sip:104@24.98.157.209 mailto:sip:104@24.98.157.209> 0(29266) version: <SIP/2.0> 0(29266) parse_headers: flags=2 0(29266) Found param type 235, <rport> = <n/a>; state=6 0(29266) Found param type 232, <branch> = <z9hG4bK1EA935B35FA14629985951EBA8B3F547>; state=16 0(29266) end of header reached, state=5 0(29266) parse_headers: Via found, flags=2 0(29266) parse_headers: this is the first via 0(29266) After parse_msg... 0(29266) preparing to run routing scripts... 0(29266) parse_headers: flags=8 0(29266) DEBUG: add_param: tag=30901ad8c164fe584bedac02134d4858.65cc 0(29266) DEBUG:parse_to:end of header reached, state=29 0(29266) DEBUG: get_hdr_field: <t> [67]; uri=[sip:104@24.98.157.209 mailto:sip:104@24.98.157.209] 0(29266) DEBUG: to body [<sip:104@24.98.157.209 mailto:sip:104@24.98.157.209>] 0(29266) DEBUG: sl_filter_ACK : local ACK found -> dropping it! 0(29266) DEBUG:destroy_avp_list: destroying list (nil)
............................................................................... openser.cfg
route { log("LOG:- step1\n"); if(!mf_process_maxfwd_header("13")) { sl_send_reply("483","Too many hops are there "); exit; }; if(msg:len>max_len) { sl_send_reply("513","Messages are Too Big ... !"); exit; }; # loose_route(); if(!method=="REGISTER") { log("LOG:- method not reg \n"); record_route(); }; if(loose_route()) { log("LOG:- loose route\n"); acc_rad_request("200"); t_relay(); exit; }; if(uri==myself) { log("LOG:- uri method myself\n"); if(method=="REGISTER") { log("LOG:- REG IN URI MY SELF \n");
if(!www_authorize("xxx.xxx.xxx.xxx.","subscriber")) { log("LOG :- REG IN URI AUTH\n"); www_challenge("xxx.xxx.xxx.xxx","0"); exit; }; save("location"); setflag(6); force_rport(); exit; }; if(method=="INVITE"||method=="ACK") { log("LOG:- INVITE & ACK IN URI \n"); # if (uri =~ "^sip:1].@*"){ # log("LOG:-rewrite port and host\n"); log("LOG:- Aftere the rewite \n "); fix_nated_sdp("1"); record_route(); acc_rad_request("Start"); force_rtp_proxy(); t_on_reply("1"); t_relay(); }; if(method=="BYE"||method=="CANCEL") { setflag(2); acc_rad_request("200"); unforce_rtp_proxy(); }; if(!lookup("location")) { log("LOG:- NOT IN LOCATION \n"); sl_send_reply("404","sorry guy ... urs friend Not found"); exit; }; }; lookup("aliases"); # if (!uri==myself) { # log("LOG:_ uri in uri myself \n"); # append_hf("P-hint: outbound alias\r\n"); # route(1); # }; if(!t_relay()) { sl_reply_error(); }; # lookup("aliases"); # exit; route(1); # exit; } route[1] { log("LOG:- ENeter into route 1\n"); if(isflagset(6)) { force_rtp_proxy(); }; t_on_reply("1"); if(!t_relay()) { sl_reply_error(); }; } onreply_route[1] { log("LOG :- reply_route \n"); if(status=~"2[0-9][0-9]" && isflagset(6)) { log("LOG:- staus 183| 200 \n"); fix_nated_contact(); force_rtp_proxy(); }; }
-- Thanks and Regards with cheers Sunkara Ravi Prakash (Voip Developer) Hyperion Technology www.hyperion-tech.com http://www.hyperion-tech.com
<b>
Users mailing list Users@openser.org http://openser.org/cgi-bin/mailman/listinfo/users