Hi
About my problem with radius accounting IŽve seen some errors in debug mode when starting
ser:
.
.
16(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
16(0) DEBUG: init_mod_child (8): usrloc
16(0) DEBUG: init_mod_child (8): acc
16(6427) DBG: open_uac_fifo: opening fifo...
16(6427) DEBUG: open_fifo_server: FIFO stat failed: Bad file descriptor
16(6427) DEBUG: FIFO created @ /tmp/ser_fifo
16(6427) DEBUG: fifo /tmp/ser_fifo opened, mode=432
17(0) INFO: fifo process starting: 6428
.
.
in fact I do not know if there are more, please see my attached files (startSer.txt and
callDebug.txt),
thank you
Rafael
Jan Janak <jan(a)iptel.org> escribió:
Are there any error messages in ser logs ?
Jan.
On 07-06 13:14, Rafael J. Risco G.V. wrote:
hello
I?m still having problems with radius accounting module, ...I can see
that
authentication process works well but I did not see any "Accounting
Report" in /var/log/radius/radacct/ or neither in radiusd -X debug ,
please can someone share an example of its ser.cfg file for this
function?
thanks
Rafael
PS: my current ser.cfg configuration is shown below, freeradius it?s
installed
in the same host (SuSe Linux 9.0) and I have
included setflag(1) for
all transactions as Klaus D. recommend me some days ago...
ser:/var/log/radius/radacct# more /etc/ser/ser.cfg
# simple quick-start config script
#
# ----------- global configuration parameters
------------------------
#debug=3 # debug level (cmd line: -dddddddddd)
#fork=yes
#log_stderror=no # (cmd line: -E)
#/* Uncomment these lines to enter debugging mode
debug=9
fork=yes
log_stderror=yes
#*/
check_via=no # (cmd. line: -v)
dns=no # (cmd. line: -r)
rev_dns=no # (cmd. line: -R)
#port=5060
#children=4
fifo="/tmp/ser_fifo"
# ------------------ module loading
----------------------------------
# Uncomment this if you want to use SQL database
#loadmodule "//lib/ser/modules/mysql.so"
loadmodule "//lib/ser/modules/sl.so"
loadmodule "//lib/ser/modules/tm.so"
loadmodule "//lib/ser/modules/rr.so"
loadmodule "//lib/ser/modules/maxfwd.so"
loadmodule "//lib/ser/modules/usrloc.so"
loadmodule "//lib/ser/modules/registrar.so"
loadmodule "//lib/ser/modules/group_radius.so"
#loadmodule "//lib/ser/modules/group.so"
# Uncomment this if you want digest authentication
# mysql.so must be loaded !
loadmodule "//lib/ser/modules/auth.so"
#loadmodule "//lib/ser/modules/auth_db.so"
loadmodule "//lib/ser/modules/auth_radius.so"
loadmodule "//lib/ser/modules/acc.so"
#loadmodule "//lib/ser/modules/uri.so"
# ----------------- setting module-specific parameters
---------------
# -- usrloc params --
#modparam("usrloc", "db_mode", 0)
# Uncomment this if you want to use SQL database
# for persistent storage and comment the previous line
#modparam("usrloc", "db_mode", 2)
# -- auth params --
# Uncomment if you are using auth module
#
#modparam("auth_db", "calculate_ha1", yes)
#
# If you set "calculate_ha1" parameter to yes (which true in this
config),
# uncomment also the following parameter)
#
#modparam("auth_db", "password_column", "password")
# -- rr params --
# add value to ;lr param to make some broken UAs happy
modparam("rr", "enable_full_lr", 1)
modparam("auth_radius","radius_config","/etc/radiusclient/radiusclient.conf")
modparam("auth_radius","service_type",15)
modparam("acc", "log_level", 1)
modparam("acc",
"radius_config","/etc/radiusclient/radiusclient.conf")
modparam("acc",
"service_type", 15)
modparam("acc", "radius_flag", 1)
modparam("acc", "radius_missed_flag", 3)
# ------------------------- request routing logic
-------------------
# main routing logic
route{
setflag(1);
if (method=="REGISTER")
log(1, "REGISTER message received\n");
if (method=="INVITE")
log(1, "INVITE message received\n");
if (method=="ACK")
log(1, "ACK message received\n");
if (method=="BYE")
log(1, "BYE message received\n");
if (method=="CANCEL")
log(1, "CANCEL message received\n");
if (method=="SUBSCRIBE")
log(1, "SUBSCRIBE message received\n");
if (method=="NOTIFY")
log(1, "NOTIFY message received\n");
if (method=="OPTIONS")
log(1, "OPTIONS message received\n");
if (method=="INFO")
log(1, "INFO message received\n");
if (method=="MESSAGE")
log(1, "MESSAGE message received\n");
if (method=="REFER")
log(1, "REFER message received\n");
# initial sanity checks -- messages with
# max_forwards==0, or excessively long requests
if (!mf_process_maxfwd_header("10")) {
sl_send_reply("483","Too Many Hops");
break;
};
if ( msg:len > max_len ) {
sl_send_reply("513", "Message too big");
break;
};
# we record-route all messages -- to make sure that
# subsequent messages will go through our proxy; that's
# particularly good if upstream and downstream entities
# use different transport protocol
record_route();
# loose-route processing
if (loose_route()) {
t_relay();
break;
};
# if the request is for other domain use UsrLoc
# (in case, it does not work, use the following command
# with proper names and addresses in it)
if (uri==myself) {
if (method=="REGISTER") {
# Uncomment this if you want to use digest authentication
if (!radius_www_authorize("")) {
www_challenge("", "1");
break;
};
save("location");
break;
};
#Labeled transactions for accounting
#if (method =="INVITE" | method == "BYE")
# {
# log(1,"INVITE or BYE\n");
# setflag(1);
# };
#if (method=="MESSAGE") {
# log(1,"MESSAGE\n");
# setflag(1);
# };
#if (method=="BYE"){
# log (1, "BYEd or CANCEL\n");
# setflag(1);
# };
#if (method=="CANCEL"){
# log (1, "BYEe or CANCEL\n");
# setflag(1);
# };
# native SIP destinations are handled using our USRLOC
DB
if
(!lookup("location")) {
sl_send_reply("404", "Not Found");
break;
};
};
# forward to current uri now; use stateful forwarding; that
# works reliably even if we forward from TCP to UDP
if (!t_relay()) {
sl_reply_error();
};
}
ser:/var/log/radius/radacct #
[Serusers] Still trying to get radius Accounting!!!!!!!!!!
Klaus Darilion <klaus.mailinglists(a)pernau.at> escribi?:
> try setflag(1); for the transactions you want to account!
>
> klaus
>
> Rafael J. Risco G.V. wrote:
>
> > hello serusers!
> > I have followed these instructions carefully
>
again(http://iptel.org/ser/doc/ser_radius/ser_radius.html) and now I
can
> see that authentication process works well
but I did not see any
> "Accounting Report" in /var/log/radius/radacct/ or neither in
radiusd -X
> debug, please can someone send me an example
of ser.cfg
configuration
> for this purpose?
> >
> > thanks
> > Rafael
> >
> > PS: my current ser.cfg configuration is shown below, freeradius it
is
> installed in the same host (SuSe Linux
9.0):
> >
> > ser:/var/log/radius/radacct # more /etc/ser/ser.cfg
> > #
> > # $Id: ser.cfg,v 1.21.4.1 2003/11/10 15:35:15 andrei Exp $
> > #
> > # simple quick-start config script
> > #
> >
> > # ----------- global configuration parameters
> ------------------------
> >
> > #debug=3 # debug level (cmd line: -dddddddddd)
> > #fork=yes
> > #log_stderror=no # (cmd line: -E)
> >
> > #/* Uncomment these lines to enter debugging mode
> > debug=9
> > fork=yes
> > log_stderror=yes
> > #*/
> >
> > check_via=no # (cmd. line: -v)
> > dns=no # (cmd. line: -r)
> > rev_dns=no # (cmd. line: -R)
> > #port=5060
> > #children=4
> > fifo="/tmp/ser_fifo"
> >
> > # ------------------ module loading
> ----------------------------------
> >
> > # Uncomment this if you want to use SQL database
> > #loadmodule "//lib/ser/modules/mysql.so"
> >
> > loadmodule "//lib/ser/modules/sl.so"
> > loadmodule "//lib/ser/modules/tm.so"
> > loadmodule "//lib/ser/modules/rr.so"
> > loadmodule "//lib/ser/modules/maxfwd.so"
> > loadmodule "//lib/ser/modules/usrloc.so"
> > loadmodule "//lib/ser/modules/registrar.so"
> > loadmodule "//lib/ser/modules/group_radius.so"
> >
> > #loadmodule "//lib/ser/modules/group.so"
> > # Uncomment this if you want digest authentication
> > # mysql.so must be loaded !
> >
> > loadmodule "//lib/ser/modules/auth.so"
> >
> > #loadmodule "//lib/ser/modules/auth_db.so"
> >
> > loadmodule "//lib/ser/modules/auth_radius.so"
> > loadmodule "//lib/ser/modules/acc.so"
> >
> > #loadmodule "//lib/ser/modules/uri.so"
> >
> > # ----------------- setting module-specific parameters
> ---------------
> > # -- usrloc params --
> > #modparam("usrloc", "db_mode", 0)
> > # Uncomment this if you want to use SQL database
> > # for persistent storage and comment the previous line
> > #modparam("usrloc", "db_mode", 2)
> > # -- auth params --
> > # Uncomment if you are using auth module
> > #
> > #modparam("auth_db", "calculate_ha1", yes)
> > #
> > # If you set "calculate_ha1" parameter to yes (which true in this
> config),
> > # uncomment also the following parameter)
> > #
> > #modparam("auth_db", "password_column",
"password")
> >
> > # -- rr params --
> > # add value to ;lr param to make some broken UAs happy
> >
> > modparam("rr", "enable_full_lr", 1)
> >
>
modparam("auth_radius","radius_config","/etc/radiusclient/radiusclient.conf")
> >
modparam("auth_radius","service_type",15)
> > modparam("acc",
> "radius_config","/etc/radiusclient/radiusclient.conf")
> > modparam("acc", "service_type", 15)
> > modparam("acc", "radius_flag", 1)
> > modparam("acc", "radius_missed_flag", 3)
> >
> >
> >
> > # ------------------------- request routing logic
> -------------------
> >
> > # main routing logic
> >
> > route{
> >
> > # initial sanity checks -- messages with
> > # max_forwards==0, or excessively long requests
> > if (!mf_process_maxfwd_header("10")) {
> > sl_send_reply("483","Too Many Hops");
> > break;
> > };
> > if ( msg:len > max_len ) {
> > sl_send_reply("513", "Message too big");
> > break;
> > };
> >
> > # we record-route all messages -- to make sure that
> > # subsequent messages will go through our proxy; that's
> > # particularly good if upstream and downstream entities
> > # use different transport protocol
> > record_route();
> > # loose-route processing
> > if (loose_route()) {
> > t_relay();
> > break;
> > };
> >
> > # if the request is for other domain use UsrLoc
> > # (in case, it does not work, use the following command
> > # with proper names and addresses in it)
> > if (uri==myself) {
> >
> > if (method=="REGISTER") {
> >
> > # Uncomment this if you want to use digest authentication
> > if (!radius_www_authorize("")) {
> > www_challenge("", "0");
> > break;
> > };
> >
> > save("location");
> > break;
> > };
> >
> > # native SIP destinations are handled using our
USRLOC
> DB
> > if (!lookup("location")) {
> > sl_send_reply("404", "Not Found");
> > break;
> > };
> > };
> > # forward to current uri now; use stateful forwarding;
that
# works reliably even if we forward from TCP
to UDP
if (!t_relay()) {
sl_reply_error();
};
}
ser:/var/log/radius/radacct #
_______________________________________________
Serusers mailing list
serusers(a)lists.iptel.org
http://lists.iptel.org/mailman/listinfo/serusers
_______________________________________________
Serusers mailing list
serusers(a)lists.iptel.org
http://lists.iptel.org/mailman/listinfo/serusers
ser:/ #
ser:/ #
ser:/ #
ser:/ #
ser:/ # /etc/init.d/ser start
Starting SIP Express Router 0(6409) loading module //lib/ser/modules/sl.so
0(6409) loading module //lib/ser/modules/tm.so
0(6409) loading module //lib/ser/modules/rr.so
0(6409) loading module //lib/ser/modules/maxfwd.so
0(6409) loading module //lib/ser/modules/usrloc.so
0(6409) loading module //lib/ser/modules/registrar.so
0(6409) loading module //lib/ser/modules/group_radius.so
0(6409) loading module //lib/ser/modules/auth.so
0(6409) loading module //lib/ser/modules/auth_radius.so
0(6409) loading module //lib/ser/modules/acc.so
0(6409) set_mod_param_regex: rr matches module rr
0(6409) set_mod_param_regex: found <enable_full_lr> in module rr
[//lib/ser/modules/rr.so]
0(6409) set_mod_param_regex: auth_radius matches module auth_radius
0(6409) set_mod_param_regex: found <radius_config> in module auth_radius
[//lib/ser/modules/auth_radius.so]
0(6409) set_mod_param_regex: auth_radius matches module auth_radius
0(6409) set_mod_param_regex: found <service_type> in module auth_radius
[//lib/ser/modules/auth_radius.so]
0(6409) set_mod_param_regex: acc matches module acc
0(6409) set_mod_param_regex: found <log_level> in module acc
[//lib/ser/modules/acc.so]
0(6409) set_mod_param_regex: acc matches module acc
0(6409) set_mod_param_regex: found <radius_config> in module acc
[//lib/ser/modules/acc.so]
0(6409) set_mod_param_regex: acc matches module acc
0(6409) set_mod_param_regex: found <radius_flag> in module acc
[//lib/ser/modules/acc.so]
0(6409) set_mod_param_regex: acc matches module acc
0(6409) set_mod_param_regex: found <radius_missed_flag> in module acc
[//lib/ser/modules/acc.so]
0(6409) find_export: found <mf_process_maxfwd_header> in module maxfwd_module
[//lib/ser/modules/maxfwd.so]
0(6409) find_export: found <sl_send_reply> in module sl_module
[//lib/ser/modules/sl.so]
0(6409) find_export: found <sl_send_reply> in module sl_module
[//lib/ser/modules/sl.so]
0(6409) find_export: found <record_route> in module rr [//lib/ser/modules/rr.so]
0(6409) find_export: found <loose_route> in module rr [//lib/ser/modules/rr.so]
0(6409) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so]
0(6409) find_export: found <radius_www_authorize> in module auth_radius
[//lib/ser/modules/auth_radius.so]
0(6409) find_export: found <www_challenge> in module auth
[//lib/ser/modules/auth.so]
0(6409) find_export: found <save> in module registrar
[//lib/ser/modules/registrar.so]
0(6409) find_export: found <lookup> in module registrar
[//lib/ser/modules/registrar.so]
0(6409) find_export: found <sl_send_reply> in module sl_module
[//lib/ser/modules/sl.so]
0(6409) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so]
0(6409) find_export: found <sl_reply_error> in module sl_module
[//lib/ser/modules/sl.so]
0(6409) routing table 0:
0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421a9c30>
0(6409) , "10" 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x421a9c30> 0(6409) , "10" 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "483"
0(6409) , "Too Many Hops" 0(6409) ); 0(6409) drop( 0(6409) type<0>
0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) UNKNOWN 0(6409)
<UNKNOWN> 0(6409) 65535 0(6409) ) { 0(6409) external_module_call( 0(6409)
f_ptr<0x4001c760> 0(6409) , "513" 0(6409) , "Message too big"
0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) ); 0(6409) if (
0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409)
external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409)
type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) ==
0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409)
"REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call(
0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );
0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530>
0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409)
type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call(
0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop(
0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR(
0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) ==
0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) ,
"INVITE or BYE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409)
log( 0(6409) 1 0(6409) , "MESSAGE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEd or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEe or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20>
0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404"
0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) );
0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT(
0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else
{ 0(6409) }; 0(6409) if ( 0(6409) UNKNOWN 0(6409) <UNKNOWN> 0(6409) 65535 0(6409) )
{ 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "513"
0(6409) , "Message too big" 0(6409) ); 0(6409) drop( 0(6409) type<0>
0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409)
f_ptr<0x40022e10> 0(6409) ); 0(6409) if ( 0(6409) external_module_call( 0(6409)
f_ptr<0x40020e00> 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409) external_module_call( 0(6409)
f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) );
0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409)
) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) {
0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0>
0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409)
external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) ,
"0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else {
0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) ,
"location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) }
else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409)
"INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) )
0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409)
log( 0(6409) 1 0(6409) , "MESSAGE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEd or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEe or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20>
0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404"
0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) );
0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT(
0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else
{ 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) );
0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) );
0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop(
0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri
0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409)
"REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call(
0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );
0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530>
0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409)
type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call(
0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop(
0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR(
0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) ==
0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) ,
"INVITE or BYE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409)
log( 0(6409) 1 0(6409) , "MESSAGE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEd or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEe or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20>
0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404"
0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) );
0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT(
0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else
{ 0(6409) }; 0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00>
0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) );
0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );
0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if (
0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) ==
0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409)
external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );
0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , ""
0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409)
f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409)
drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409)
external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location"
0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) ,
0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "INVITE or BYE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409)
log( 0(6409) 1 0(6409) , "MESSAGE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEd or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEe or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20>
0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404"
0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) );
0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT(
0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else
{ 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if
( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409)
NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) ,
"" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0>
0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call(
0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) );
0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409)
external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location"
0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) ,
0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "INVITE or BYE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409)
log( 0(6409) 1 0(6409) , "MESSAGE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEd or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEe or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20>
0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404"
0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) );
0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT(
0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else
{ 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409)
f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call(
0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409)
Listening on
127.0.0.1 [127.0.0.1]:5060
200.110.2.132 [200.110.2.132]:5060
Aliases: ser:5060 ser.local:5060 localhost:5060
0(6411) DEBUG: init_mod: sl_module
stateless - initializing
0(6411) DEBUG: register_fifo_cmd: new command (sl_stats) registered
0(6411) DEBUG: MD5 calculated: b27e1a1d33761e85846fc98f5f3a7e58
0(6411) DEBUG: init_mod: tm
0(6411) TM - initializing...
0(6411) Call-ID initialization: '7edfe76a'
0(6411) DEBUG: register_fifo_cmd: new command (t_uac_dlg) registered
0(6411) DEBUG: register_fifo_cmd: new command (t_hash) registered
0(6411) DEBUG: lock_initialize: lock initialization started
done
ser:/ # 0(6411) DEBUG: register_fifo_cmd: new command (t_stats) registered
0(6411) DEBUG: MD5 calculated: 533cb9e91f4b999cf76861cbb9ed54ed
0(6411) DEBUG: MD5 calculated: a6a1c5f60faecf035a1ae5b6e96e979a
0(6411) DEBUG: init_mod: rr
0(6411) rr - initializing
0(6411) DEBUG: init_mod: maxfwd_module
Maxfwd module- initializing
0(6411) DEBUG: init_mod: usrloc
0(6411) usrloc - initializing
0(6411) DEBUG: register_fifo_cmd: new command (ul_stats) registered
0(6411) DEBUG: register_fifo_cmd: new command (ul_rm) registered
0(6411) DEBUG: register_fifo_cmd: new command (ul_rm_contact) registered
0(6411) DEBUG: register_fifo_cmd: new command (ul_dump) registered
0(6411) DEBUG: register_fifo_cmd: new command (ul_flush) registered
0(6411) DEBUG: register_fifo_cmd: new command (ul_add) registered
0(6411) DEBUG: register_fifo_cmd: new command (ul_show_contact) registered
0(6411) DEBUG: init_mod: registrar
0(6411) registrar - initializing
0(6411) find_export: found <sl_send_reply> in module sl_module
[//lib/ser/modules/sl.so]
0(6411) find_export: found <ul_bind_usrloc> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_register_udomain> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_get_all_ucontacts> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_insert_urecord> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_delete_urecord> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_get_urecord> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_lock_udomain> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_unlock_udomain> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_release_urecord> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_insert_ucontact> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_delete_ucontact> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_get_ucontact> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_update_ucontact> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) DEBUG: init_mod: group_radius
0(6411) group_radius - initializing
0(6411) DEBUG: init_mod: auth
0(6411) auth module - initializing
0(6411) find_export: found <sl_send_reply> in module sl_module
[//lib/ser/modules/sl.so]
0(6411) DEBUG: init_mod: auth_radius
0(6411) auth_radius - Initializing
0(6411) find_export: found <pre_auth> in module auth [//lib/ser/modules/auth.so]
0(6411) find_export: found <post_auth> in module auth [//lib/ser/modules/auth.so]
0(6411) DEBUG: init_mod: acc
acc - initializing
0(6411) find_export: found <load_tm> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <register_tmcb> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <t_relay_to_tcp> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <t_relay_to_udp> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <t_reply> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <t_reply_with_body> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <t_is_local> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <t_get_trans_ident> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <t_lookup_ident> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <t_add_blind> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <t_forward_nonack> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <t_request_within> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <t_request_outside> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <t_request> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <new_dlg_uac> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <dlg_response_uac> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <new_dlg_uas> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <dlg_request_uas> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <free_dlg> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <print_dlg> in module tm [//lib/ser/modules/tm.so]
0(0) fixing //lib/ser/modules/maxfwd.so mf_process_maxfwd_header
0(0) fixing //lib/ser/modules/sl.so sl_send_reply
0(0) fixing //lib/ser/modules/sl.so sl_send_reply
0(0) fixing //lib/ser/modules/rr.so record_route
0(0) fixing //lib/ser/modules/rr.so loose_route
0(0) fixing //lib/ser/modules/tm.so t_relay
0(0) fixing //lib/ser/modules/auth_radius.so radius_www_authorize
0(0) fixing //lib/ser/modules/auth.so www_challenge
0(0) fixing //lib/ser/modules/registrar.so save
0(0) fixing //lib/ser/modules/registrar.so lookup
0(0) fixing //lib/ser/modules/sl.so sl_send_reply
0(0) fixing //lib/ser/modules/tm.so t_relay
0(0) fixing //lib/ser/modules/sl.so sl_reply_error
0(0) INFO: udp_init: SO_RCVBUF is initially 65535
0(0) DEBUG: udp_init: trying SO_RCVBUF: 131070
0(0) DEBUG: setting SO_RCVBUF; set=131070,verify=131070
0(0) DEBUG: udp_init: trying SO_RCVBUF: 262140
0(0) DEBUG: setting SO_RCVBUF; set=262140,verify=131070
0(0) DEBUG: setting SO_RCVBUF has no effect
0(0) DEBUG: udp_init: trying SO_RCVBUF: 133118
0(0) DEBUG: setting SO_RCVBUF; set=133118,verify=131070
0(0) DEBUG: setting SO_RCVBUF has no effect
0(0) INFO: udp_init: SO_RCVBUF is finally 131070
0(0) INFO: udp_init: SO_RCVBUF is initially 65535
0(0) DEBUG: udp_init: trying SO_RCVBUF: 131070
0(0) DEBUG: setting SO_RCVBUF; set=131070,verify=131070
0(0) DEBUG: udp_init: trying SO_RCVBUF: 262140
0(0) DEBUG: setting SO_RCVBUF; set=262140,verify=131070
0(0) DEBUG: setting SO_RCVBUF has no effect
0(0) DEBUG: udp_init: trying SO_RCVBUF: 133118
0(0) DEBUG: setting SO_RCVBUF; set=133118,verify=131070
0(0) DEBUG: setting SO_RCVBUF has no effect
0(0) INFO: udp_init: SO_RCVBUF is finally 131070
1(0) DEBUG: init_mod_child (1): tm
1(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
1(0) DEBUG: init_mod_child (1): usrloc
1(0) DEBUG: init_mod_child (1): acc
2(0) DEBUG: init_mod_child (2): tm
2(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
2(0) DEBUG: init_mod_child (2): usrloc
2(0) DEBUG: init_mod_child (2): acc
3(0) DEBUG: init_mod_child (3): tm
3(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
3(0) DEBUG: init_mod_child (3): usrloc
3(0) DEBUG: init_mod_child (3): acc
4(0) DEBUG: init_mod_child (4): tm
4(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
4(0) DEBUG: init_mod_child (4): usrloc
4(0) DEBUG: init_mod_child (4): acc
5(0) DEBUG: init_mod_child (5): tm
5(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
5(0) DEBUG: init_mod_child (5): usrloc
5(0) DEBUG: init_mod_child (5): acc
6(0) DEBUG: init_mod_child (6): tm
6(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
6(0) DEBUG: init_mod_child (6): usrloc
6(0) DEBUG: init_mod_child (6): acc
7(0) DEBUG: init_mod_child (7): tm
7(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
7(0) DEBUG: init_mod_child (7): usrloc
7(0) DEBUG: init_mod_child (7): acc
8(0) DEBUG: init_mod_child (8): tm
8(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
8(0) DEBUG: init_mod_child (8): usrloc
8(0) DEBUG: init_mod_child (8): acc
9(0) DEBUG: init_mod_child (1): tm
9(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
9(0) DEBUG: init_mod_child (1): usrloc
9(0) DEBUG: init_mod_child (1): acc
10(0) DEBUG: init_mod_child (2): tm
10(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
10(0) DEBUG: init_mod_child (2): usrloc
10(0) DEBUG: init_mod_child (2): acc
11(0) DEBUG: init_mod_child (3): tm
11(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
11(0) DEBUG: init_mod_child (3): usrloc
11(0) DEBUG: init_mod_child (3): acc
12(0) DEBUG: init_mod_child (4): tm
12(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
12(0) DEBUG: init_mod_child (4): usrloc
12(0) DEBUG: init_mod_child (4): acc
13(0) DEBUG: init_mod_child (5): tm
13(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
13(0) DEBUG: init_mod_child (5): usrloc
13(0) DEBUG: init_mod_child (5): acc
14(0) DEBUG: init_mod_child (6): tm
14(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
14(0) DEBUG: init_mod_child (6): usrloc
14(0) DEBUG: init_mod_child (6): acc
15(0) DEBUG: init_mod_child (7): tm
15(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
15(0) DEBUG: init_mod_child (7): usrloc
15(0) DEBUG: init_mod_child (7): acc
16(0) DEBUG: init_mod_child (8): tm
16(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
16(0) DEBUG: init_mod_child (8): usrloc
16(0) DEBUG: init_mod_child (8): acc
16(6427) DBG: open_uac_fifo: opening fifo...
16(6427) DEBUG: open_fifo_server: FIFO stat failed: Bad file descriptor
16(6427) DEBUG: FIFO created @ /tmp/ser_fifo
16(6427) DEBUG: fifo /tmp/ser_fifo opened, mode=432
17(0) INFO: fifo process starting: 6428
17(0) DEBUG: init_mod_child (-2): tm
17(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
17(0) DEBUG: init_mod_child (-2): usrloc
17(0) DEBUG: init_mod_child (-2): acc
18(0) DEBUG: init_mod_child (-1): tm
18(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
18(0) DEBUG: init_mod_child (-1): usrloc
18(0) DEBUG: init_mod_child (-1): acc
17(6428) SER: open_uac_fifo: fifo server up at /tmp/ser_fifo...
19(0) DEBUG: init_mod_child (9): tm
19(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
19(0) DEBUG: init_mod_child (9): usrloc
19(0) DEBUG: init_mod_child (9): acc
20(0) DEBUG: init_mod_child (10): tm
20(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
20(0) DEBUG: init_mod_child (10): usrloc
20(0) DEBUG: init_mod_child (10): acc
21(0) DEBUG: init_mod_child (11): tm
21(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
21(0) DEBUG: init_mod_child (11): usrloc
21(0) DEBUG: init_mod_child (11): acc
22(0) DEBUG: init_mod_child (12): tm
22(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
22(0) DEBUG: init_mod_child (12): usrloc
22(0) DEBUG: init_mod_child (12): acc
23(0) DEBUG: init_mod_child (13): tm
23(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
23(0) DEBUG: init_mod_child (13): usrloc
23(0) DEBUG: init_mod_child (13): acc
24(0) DEBUG: init_mod_child (14): tm
24(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
24(0) DEBUG: init_mod_child (14): usrloc
24(0) DEBUG: init_mod_child (14): acc
25(0) DEBUG: init_mod_child (15): tm
25(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
25(0) DEBUG: init_mod_child (15): usrloc
25(0) DEBUG: init_mod_child (15): acc
26(0) DEBUG: init_mod_child (16): tm
26(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
26(0) DEBUG: init_mod_child (16): usrloc
26(0) DEBUG: init_mod_child (16): acc
27(0) DEBUG: init_mod_child (-4): tm
27(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
27(0) DEBUG: init_mod_child (-4): usrloc
27(0) DEBUG: init_mod_child (-4): acc
0(6411) DEBUG: init_mod_child (0): tm
0(6411) DEBUG: callid: '7edfe76a-6411(a)127.0.0.1'
0(6411) DEBUG: init_mod_child (0): usrloc
0(6411) DEBUG: init_mod_child (0): acc
ser:/ #
ser:/ # 13(6424) SIP Request:
13(6424) method: <INVITE>
13(6424) uri: <sip:6604000@200.110.2.132>
13(6424) version: <SIP/2.0>
13(6424) parse_headers: flags=1
13(6424) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16
13(6424) end of header reached, state=5
13(6424) parse_headers: Via found, flags=1
13(6424) parse_headers: this is the first via
13(6424) After parse_msg...
13(6424) preparing to run routing scripts...
13(6424) DEBUG : is_maxfwd_present: searching for max_forwards header
13(6424) parse_headers: flags=128
13(6424) end of header reached, state=9
13(6424) DEBUG: get_hdr_field: <To> [29]; uri=[sip:6604000@200.110.2.132]
13(6424) DEBUG: to body [<sip:6604000@200.110.2.132>
]
13(6424) get_hdr_field: cseq <CSeq>: <180> <INVITE>
13(6424) DEBUG: get_hdr_body : content_length=137
13(6424) DEBUG: is_maxfwd_present: value = 70
13(6424) DEBUG: add_param: tag=6e00fdeaa4
13(6424) end of header reached, state=29
13(6424) parse_headers: flags=256
13(6424) found end of header
13(6424) find_first_route(): No Route headers found
13(6424) loose_route(): There is no Route HF
13(6424) check_self - checking if host==us: 13==9 && [200.110.2.132] ==
[127.0.0.1]
13(6424) check_self - checking if port 5060 matches port 5060
13(6424) check_self - checking if host==us: 13==13 && [200.110.2.132] ==
[200.110.2.132]
13(6424) check_self - checking if port 5060 matches port 5060
13(6424) INVITE or BYE
13(6424) rwrite(): Rewriting Request-URI with 'sip:6604000@200.110.6.58'
13(6424) DEBUG: t_addifnew: msg id=4 , global msg id=0 , T on entrance=0xffffffff
13(6424) parse_headers: flags=-1
13(6424) parse_headers: flags=60
13(6424) t_lookup_request: start searching: hash=28567, isACK=0
13(6424) DEBUG: RFC3261 transaction matching failed
13(6424) DEBUG: t_lookup_request: no transaction found
13(6424) DBG: callback type 2, id 3 entered
13(6424) parse_headers: flags=44
13(6424) DEBUG: noisy_timer set for accounting
13(6424) SER: new INVITE
13(6424) parse_headers: flags=-1
13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0)
13(6424) WARNING:vqm_resize: resize(0) called
13(6424) DEBUG: reply sent out. buf=0x80cb880: SIP/2.0 1..., shmem=0x402f6b10: SIP/2.0 1
13(6424) DEBUG: t_reply: finished
13(6424) DEBUG: mk_proxy: doing DNS lookup...
13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0)
13(6424) DEBUG: add_to_tail_of_timer[4]: 0x402f5574
13(6424) DEBUG: add_to_tail_of_timer[0]: 0x402f5588
13(6424) SER: new transaction fwd'ed
13(6424) receive_msg: cleaning up
15(6426) SIP Reply (status):
15(6426) version: <SIP/2.0>
15(6426) status: <100>
15(6426) reason: <Trying>
15(6426) parse_headers: flags=1
15(6426) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16
15(6426) end of header reached, state=5
15(6426) parse_headers: Via found, flags=1
15(6426) parse_headers: this is the first via
15(6426) After parse_msg...
15(6426) forward_reply: found module tm, passing reply to it
15(6426) DEBUG: t_check: msg id=5 global id=0 T start=0xffffffff
15(6426) parse_headers: flags=17
15(6426) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16
15(6426) end of header reached, state=5
15(6426) parse_headers: Via found, flags=17
15(6426) parse_headers: this is the second via
15(6426) end of header reached, state=9
15(6426) DEBUG: get_hdr_field: <To> [29]; uri=[sip:6604000@200.110.2.132]
15(6426) DEBUG: to body [<sip:6604000@200.110.2.132>
]
15(6426) get_hdr_field: cseq <CSeq>: <180> <INVITE>
15(6426) parse_headers: flags=4
15(6426) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0
15(6426) DEBUG: t_reply_matching: reply matched (T=0x402f5450)!
15(6426) DBG: callback type 1, id 5 entered
15(6426) DEBUG: t_check: msg id=5 global id=5 T end=0x402f5450
15(6426) DEBUG: t_on_reply: org. status uas=100, uac[0]=0 local=0 is_invite=1)
15(6426) ->>>>>>>>> T_code=100, new_code=100
15(6426) DEBUG: relay_reply: branch=0, save=0, relay=-1
15(6426) DEBUG: add_to_tail_of_timer[1]: 0x402f5588
15(6426) receive_msg: cleaning up
10(6421) SIP Reply (status):
10(6421) version: <SIP/2.0>
10(6421) status: <180>
10(6421) reason: <Ringing>
10(6421) parse_headers: flags=1
10(6421) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16
10(6421) end of header reached, state=5
10(6421) parse_headers: Via found, flags=1
10(6421) parse_headers: this is the first via
10(6421) After parse_msg...
10(6421) forward_reply: found module tm, passing reply to it
10(6421) DEBUG: t_check: msg id=4 global id=0 T start=0xffffffff
10(6421) parse_headers: flags=17
10(6421) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16
10(6421) end of header reached, state=5
10(6421) parse_headers: Via found, flags=17
10(6421) parse_headers: this is the second via
10(6421) DEBUG: add_param: tag=218f2c81a4
10(6421) end of header reached, state=29
10(6421) DEBUG: get_hdr_field: <To> [44]; uri=[sip:6604000@200.110.2.132]
10(6421) DEBUG: to body [<sip:6604000@200.110.2.132>]
10(6421) get_hdr_field: cseq <CSeq>: <180> <INVITE>
10(6421) parse_headers: flags=4
10(6421) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0
10(6421) DEBUG: t_reply_matching: reply matched (T=0x402f5450)!
10(6421) DBG: callback type 1, id 5 entered
10(6421) DEBUG: t_check: msg id=4 global id=4 T end=0x402f5450
10(6421) DEBUG: t_on_reply: org. status uas=100, uac[0]=100 local=0 is_invite=1)
10(6421) ->>>>>>>>> T_code=100, new_code=180
10(6421) DEBUG: relay_reply: branch=0, save=0, relay=0
10(6421) old size: 472, new size: 410
10(6421) build_res_from_sip_res: copied size: orig:83, new: 21, rest: 389 msg=
SIP/2.0 180 Ringing
Via: SIP/2.0/UDP 10.0.0.236:5060;branch=z9hG4bK6e00fdeaa4180
From: <sip:6603000@200.110.2.132>;tag=6e00fdeaa4
To: <sip:6604000@200.110.2.132>;tag=218f2c81a4
Call-ID: 6e124000-5d1c-fd5d-80ea-0002a40055b2(a)10.0.0.236
CSeq: 180 INVITE
User-Agent: AddPac SIP Gateway
Contact: sip:6604000@200.110.6.58
Content-Length: 0
Record-Route: <sip:6604000@200.110.2.132;ftag=6e00fdeaa4;lr=on>
10(6421) DEBUG: reply relayed. buf=0x80cb900: SIP/2.0 1..., shmem=0x402f6b10: SIP/2.0 1
10(6421) DBG: callback type 7, id 1 entered
10(6421) DEBUG: add_to_tail_of_timer[1]: 0x402f5588
10(6421) receive_msg: cleaning up
12(6423) SIP Request:
12(6423) method: <REGISTER>
12(6423) uri: <sip:200.110.2.132>
12(6423) version: <SIP/2.0>
12(6423) parse_headers: flags=1
12(6423) Found param type 232, <branch> = <z9hG4bK2f003c00a422890>; state=16
12(6423) end of header reached, state=5
12(6423) parse_headers: Via found, flags=1
12(6423) parse_headers: this is the first via
12(6423) After parse_msg...
12(6423) preparing to run routing scripts...
12(6423) DEBUG : is_maxfwd_present: searching for max_forwards header
12(6423) parse_headers: flags=128
12(6423) end of header reached, state=8
12(6423) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6600020@200.110.2.132]
12(6423) DEBUG: to body [sip:6600020@200.110.2.132
]
12(6423) get_hdr_field: cseq <CSeq>: <22890> <REGISTER>
12(6423) DEBUG: get_hdr_body : content_length=0
12(6423) DEBUG: is_maxfwd_present: value = 70
12(6423) DEBUG: add_param: tag=2f003c00a4
12(6423) end of header reached, state=29
12(6423) parse_headers: flags=256
12(6423) found end of header
12(6423) find_first_route(): No Route headers found
12(6423) loose_route(): There is no Route HF
12(6423) check_self - checking if host==us: 13==9 && [200.110.2.132] ==
[127.0.0.1]
12(6423) check_self - checking if port 5060 matches port 5060
12(6423) check_self - checking if host==us: 13==13 && [200.110.2.132] ==
[200.110.2.132]
12(6423) check_self - checking if port 5060 matches port 5060
12(6423) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and
[40c5e31099e63fbafaee2c72c460ad2f587a5354]
12(6423) radius_authorize_sterman(): Success
12(6423) save_rpid(): rpid value is ''
12(6423) parse_headers: flags=-1
12(6423) parse_headers: flags=-1
12(6423) check_via_address(10.0.0.236, 10.0.0.236, 0)
12(6423) receive_msg: cleaning up
13(6424) SIP Request:
13(6424) method: <REGISTER>
13(6424) uri: <sip:200.110.2.132>
13(6424) version: <SIP/2.0>
13(6424) parse_headers: flags=1
13(6424) Found param type 232, <branch> = <z9hG4bK2f003c00a422891>; state=16
13(6424) end of header reached, state=5
13(6424) parse_headers: Via found, flags=1
13(6424) parse_headers: this is the first via
13(6424) After parse_msg...
13(6424) preparing to run routing scripts...
13(6424) DEBUG : is_maxfwd_present: searching for max_forwards header
13(6424) parse_headers: flags=128
13(6424) end of header reached, state=8
13(6424) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6603000@200.110.2.132]
13(6424) DEBUG: to body [sip:6603000@200.110.2.132
]
13(6424) get_hdr_field: cseq <CSeq>: <22891> <REGISTER>
13(6424) DEBUG: get_hdr_body : content_length=0
13(6424) DEBUG: is_maxfwd_present: value = 70
13(6424) DEBUG: add_param: tag=2f003c00a4
13(6424) end of header reached, state=29
13(6424) parse_headers: flags=256
13(6424) found end of header
13(6424) find_first_route(): No Route headers found
13(6424) loose_route(): There is no Route HF
13(6424) check_self - checking if host==us: 13==9 && [200.110.2.132] ==
[127.0.0.1]
13(6424) check_self - checking if port 5060 matches port 5060
13(6424) check_self - checking if host==us: 13==13 && [200.110.2.132] ==
[200.110.2.132]
13(6424) check_self - checking if port 5060 matches port 5060
13(6424) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and
[40c5e31099e63fbafaee2c72c460ad2f587a5354]
13(6424) radius_authorize_sterman(): Success
13(6424) save_rpid(): rpid value is ''
13(6424) parse_headers: flags=-1
13(6424) parse_headers: flags=-1
13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0)
13(6424) receive_msg: cleaning up
18(6429) DEBUG: timer routine:4,tl=0x402f5574 next=(nil)
16(6427) SIP Request:
16(6427) method: <REGISTER>
16(6427) uri: <sip:200.110.2.132>
16(6427) version: <SIP/2.0>
16(6427) parse_headers: flags=1
16(6427) Found param type 232, <branch> = <z9hG4bK2f003c00a422892>; state=16
16(6427) end of header reached, state=5
16(6427) parse_headers: Via found, flags=1
16(6427) parse_headers: this is the first via
16(6427) After parse_msg...
16(6427) preparing to run routing scripts...
16(6427) DEBUG : is_maxfwd_present: searching for max_forwards header
16(6427) parse_headers: flags=128
16(6427) end of header reached, state=8
16(6427) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6600020@200.110.2.132]
16(6427) DEBUG: to body [sip:6600020@200.110.2.132
]
16(6427) get_hdr_field: cseq <CSeq>: <22892> <REGISTER>
16(6427) DEBUG: get_hdr_body : content_length=0
16(6427) DEBUG: is_maxfwd_present: value = 70
16(6427) DEBUG: add_param: tag=2f003c00a4
16(6427) end of header reached, state=29
16(6427) parse_headers: flags=256
16(6427) found end of header
16(6427) find_first_route(): No Route headers found
16(6427) loose_route(): There is no Route HF
16(6427) check_self - checking if host==us: 13==9 && [200.110.2.132] ==
[127.0.0.1]
16(6427) check_self - checking if port 5060 matches port 5060
16(6427) check_self - checking if host==us: 13==13 && [200.110.2.132] ==
[200.110.2.132]
16(6427) check_self - checking if port 5060 matches port 5060
16(6427) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and
[40c5e31099e63fbafaee2c72c460ad2f587a5354]
16(6427) radius_authorize_sterman(): Success
16(6427) save_rpid(): rpid value is ''
16(6427) parse_headers: flags=-1
16(6427) parse_headers: flags=-1
16(6427) check_via_address(10.0.0.236, 10.0.0.236, 0)
16(6427) receive_msg: cleaning up
10(6421) SIP Request:
10(6421) method: <REGISTER>
10(6421) uri: <sip:200.110.2.132>
10(6421) version: <SIP/2.0>
10(6421) parse_headers: flags=1
10(6421) Found param type 232, <branch> = <z9hG4bK2f003c00a422893>; state=16
10(6421) end of header reached, state=5
10(6421) parse_headers: Via found, flags=1
10(6421) parse_headers: this is the first via
10(6421) After parse_msg...
10(6421) preparing to run routing scripts...
10(6421) DEBUG : is_maxfwd_present: searching for max_forwards header
10(6421) parse_headers: flags=128
10(6421) end of header reached, state=8
10(6421) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6603000@200.110.2.132]
10(6421) DEBUG: to body [sip:6603000@200.110.2.132
]
10(6421) get_hdr_field: cseq <CSeq>: <22893> <REGISTER>
10(6421) DEBUG: get_hdr_body : content_length=0
10(6421) DEBUG: is_maxfwd_present: value = 70
10(6421) DEBUG: add_param: tag=2f003c00a4
10(6421) end of header reached, state=29
10(6421) parse_headers: flags=256
10(6421) found end of header
10(6421) find_first_route(): No Route headers found
10(6421) loose_route(): There is no Route HF
10(6421) check_self - checking if host==us: 13==9 && [200.110.2.132] ==
[127.0.0.1]
10(6421) check_self - checking if port 5060 matches port 5060
10(6421) check_self - checking if host==us: 13==13 && [200.110.2.132] ==
[200.110.2.132]
10(6421) check_self - checking if port 5060 matches port 5060
10(6421) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and
[40c5e31099e63fbafaee2c72c460ad2f587a5354]
10(6421) radius_authorize_sterman(): Success
10(6421) save_rpid(): rpid value is ''
10(6421) parse_headers: flags=-1
10(6421) parse_headers: flags=-1
10(6421) check_via_address(10.0.0.236, 10.0.0.236, 0)
10(6421) receive_msg: cleaning up
11(6422) SIP Reply (status):
11(6422) version: <SIP/2.0>
11(6422) status: <200>
11(6422) reason: <OK>
11(6422) parse_headers: flags=1
11(6422) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16
11(6422) end of header reached, state=5
11(6422) parse_headers: Via found, flags=1
11(6422) parse_headers: this is the first via
11(6422) After parse_msg...
11(6422) forward_reply: found module tm, passing reply to it
11(6422) DEBUG: t_check: msg id=6 global id=0 T start=0xffffffff
11(6422) parse_headers: flags=17
11(6422) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16
11(6422) end of header reached, state=5
11(6422) parse_headers: Via found, flags=17
11(6422) parse_headers: this is the second via
11(6422) DEBUG: add_param: tag=218f2c81a4
11(6422) end of header reached, state=29
11(6422) DEBUG: get_hdr_field: <To> [44]; uri=[sip:6604000@200.110.2.132]
11(6422) DEBUG: to body [<sip:6604000@200.110.2.132>]
11(6422) get_hdr_field: cseq <CSeq>: <180> <INVITE>
11(6422) parse_headers: flags=4
11(6422) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0
11(6422) DEBUG: t_reply_matching: reply matched (T=0x402f5450)!
11(6422) parse_headers: flags=4
11(6422) DBG: callback type 1, id 5 entered
11(6422) parse_headers: flags=4
11(6422) DEBUG: t_check: msg id=6 global id=6 T end=0x402f5450
11(6422) DEBUG: t_on_reply: org. status uas=180, uac[0]=180 local=0 is_invite=1)
11(6422) ->>>>>>>>> T_code=180, new_code=200
11(6422) DEBUG: relay_reply: branch=0, save=0, relay=0
11(6422) old size: 682, new size: 620
11(6422) build_res_from_sip_res: copied size: orig:78, new: 16, rest: 604 msg=
SIP/2.0 200 OK
Via: SIP/2.0/UDP 10.0.0.236:5060;branch=z9hG4bK6e00fdeaa4180
From: <sip:6603000@200.110.2.132>;tag=6e00fdeaa4
To: <sip:6604000@200.110.2.132>;tag=218f2c81a4
Call-ID: 6e124000-5d1c-fd5d-80ea-0002a40055b2(a)10.0.0.236
CSeq: 180 INVITE
Session-Expires: 1800;refresher=uac
User-Agent: AddPac SIP Gateway
Contact: sip:6604000@200.110.6.58
Require: timer
Content-Type: application/sdp
Content-Length: 129
Record-Route: <sip:6604000@200.110.2.132;ftag=6e00fdeaa4;lr=on>
v=0
o=AddpacTechSIP-GW-UserAgent 0 0 IN IP4 200.110.6.58
s=SIP Session
c=IN IP4 200.110.6.58
t=0 0
m=audio 23120 RTP/AVP 4
11(6422) DEBUG: update_totag_set: new totag
11(6422) DEBUG: reply relayed. buf=0x80cbda0: SIP/2.0 2..., shmem=0x402f70d8: SIP/2.0 2
11(6422) DBG: callback type 7, id 1 entered
18(6429) DEBUG: timer routine:1,tl=0x402f5588 next=(nil)