Hi
About my problem with radius accounting IŽve seen some errors in debug mode when starting ser: . . 16(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 16(0) DEBUG: init_mod_child (8): usrloc 16(0) DEBUG: init_mod_child (8): acc 16(6427) DBG: open_uac_fifo: opening fifo... 16(6427) DEBUG: open_fifo_server: FIFO stat failed: Bad file descriptor 16(6427) DEBUG: FIFO created @ /tmp/ser_fifo 16(6427) DEBUG: fifo /tmp/ser_fifo opened, mode=432 17(0) INFO: fifo process starting: 6428 . . in fact I do not know if there are more, please see my attached files (startSer.txt and callDebug.txt),
thank you Rafael
Jan Janak jan@iptel.org escribió:
Are there any error messages in ser logs ?
Jan.
On 07-06 13:14, Rafael J. Risco G.V. wrote:
hello
I?m still having problems with radius accounting module, ...I can see
that authentication process works well but I did not see any "Accounting Report" in /var/log/radius/radacct/ or neither in radiusd -X debug , please can someone share an example of its ser.cfg file for this function?
thanks Rafael
PS: my current ser.cfg configuration is shown below, freeradius it?s
installed
in the same host (SuSe Linux 9.0) and I have included setflag(1) for
all transactions as Klaus D. recommend me some days ago...
ser:/var/log/radius/radacct# more /etc/ser/ser.cfg
# simple quick-start config script #
# ----------- global configuration parameters
#debug=3 # debug level (cmd line: -dddddddddd) #fork=yes #log_stderror=no # (cmd line: -E)
#/* Uncomment these lines to enter debugging mode debug=9 fork=yes log_stderror=yes #*/
check_via=no # (cmd. line: -v) dns=no # (cmd. line: -r) rev_dns=no # (cmd. line: -R) #port=5060 #children=4 fifo="/tmp/ser_fifo"
# ------------------ module loading
# Uncomment this if you want to use SQL database #loadmodule "//lib/ser/modules/mysql.so"
loadmodule "//lib/ser/modules/sl.so" loadmodule "//lib/ser/modules/tm.so" loadmodule "//lib/ser/modules/rr.so" loadmodule "//lib/ser/modules/maxfwd.so" loadmodule "//lib/ser/modules/usrloc.so" loadmodule "//lib/ser/modules/registrar.so" loadmodule "//lib/ser/modules/group_radius.so" #loadmodule "//lib/ser/modules/group.so" # Uncomment this if you want digest authentication # mysql.so must be loaded ! loadmodule "//lib/ser/modules/auth.so" #loadmodule "//lib/ser/modules/auth_db.so" loadmodule "//lib/ser/modules/auth_radius.so" loadmodule "//lib/ser/modules/acc.so" #loadmodule "//lib/ser/modules/uri.so" # ----------------- setting module-specific parameters
# -- usrloc params -- #modparam("usrloc", "db_mode", 0) # Uncomment this if you want to use SQL database # for persistent storage and comment the previous line #modparam("usrloc", "db_mode", 2) # -- auth params -- # Uncomment if you are using auth module # #modparam("auth_db", "calculate_ha1", yes) # # If you set "calculate_ha1" parameter to yes (which true in this
config),
# uncomment also the following parameter) # #modparam("auth_db", "password_column", "password") # -- rr params -- # add value to ;lr param to make some broken UAs happy
modparam("rr", "enable_full_lr", 1)
modparam("auth_radius","radius_config","/etc/radiusclient/radiusclient.conf")
modparam("auth_radius","service_type",15) modparam("acc", "log_level", 1) modparam("acc",
"radius_config","/etc/radiusclient/radiusclient.conf")
modparam("acc", "service_type", 15) modparam("acc", "radius_flag", 1) modparam("acc", "radius_missed_flag", 3)
# ------------------------- request routing logic
# main routing logic
route{
setflag(1); if (method=="REGISTER") log(1, "REGISTER message received\n");
if (method=="INVITE") log(1, "INVITE message received\n"); if (method=="ACK") log(1, "ACK message received\n"); if (method=="BYE") log(1, "BYE message received\n"); if (method=="CANCEL") log(1, "CANCEL message received\n"); if (method=="SUBSCRIBE") log(1, "SUBSCRIBE message received\n"); if (method=="NOTIFY") log(1, "NOTIFY message received\n"); if (method=="OPTIONS") log(1, "OPTIONS message received\n"); if (method=="INFO") log(1, "INFO message received\n"); if (method=="MESSAGE") log(1, "MESSAGE message received\n"); if (method=="REFER") log(1, "REFER message received\n"); # initial sanity checks -- messages with # max_forwards==0, or excessively long requests if (!mf_process_maxfwd_header("10")) { sl_send_reply("483","Too Many Hops"); break; }; if ( msg:len > max_len ) { sl_send_reply("513", "Message too big"); break; }; # we record-route all messages -- to make sure that # subsequent messages will go through our proxy; that's # particularly good if upstream and downstream entities # use different transport protocol record_route(); # loose-route processing if (loose_route()) { t_relay(); break; }; # if the request is for other domain use UsrLoc # (in case, it does not work, use the following command # with proper names and addresses in it) if (uri==myself) { if (method=="REGISTER") {
# Uncomment this if you want to use digest authentication if (!radius_www_authorize("")) { www_challenge("", "1"); break; };
save("location"); break; };
#Labeled transactions for accounting #if (method =="INVITE" | method == "BYE") # { # log(1,"INVITE or BYE\n"); # setflag(1); # }; #if (method=="MESSAGE") { # log(1,"MESSAGE\n"); # setflag(1); # }; #if (method=="BYE"){ # log (1, "BYEd or CANCEL\n"); # setflag(1); # }; #if (method=="CANCEL"){ # log (1, "BYEe or CANCEL\n"); # setflag(1); # };
# native SIP destinations are handled using our USRLOC
DB
if (!lookup("location")) { sl_send_reply("404", "Not Found"); break; }; }; # forward to current uri now; use stateful forwarding; that # works reliably even if we forward from TCP to UDP if (!t_relay()) { sl_reply_error(); };
}
ser:/var/log/radius/radacct #
[Serusers] Still trying to get radius Accounting!!!!!!!!!!
Klaus Darilion klaus.mailinglists@pernau.at escribi?:
try setflag(1); for the transactions you want to account!
klaus
Rafael J. Risco G.V. wrote:
hello serusers! I have followed these instructions carefully
again(http://iptel.org/ser/doc/ser_radius/ser_radius.html) and now I
can
see that authentication process works well but I did not see any "Accounting Report" in /var/log/radius/radacct/ or neither in
radiusd -X
debug, please can someone send me an example of ser.cfg
configuration
for this purpose?
thanks Rafael
PS: my current ser.cfg configuration is shown below, freeradius it
is
installed in the same host (SuSe Linux 9.0):
ser:/var/log/radius/radacct # more /etc/ser/ser.cfg # # $Id: ser.cfg,v 1.21.4.1 2003/11/10 15:35:15 andrei Exp $ # # simple quick-start config script #
# ----------- global configuration parameters
#debug=3 # debug level (cmd line: -dddddddddd) #fork=yes #log_stderror=no # (cmd line: -E)
#/* Uncomment these lines to enter debugging mode debug=9 fork=yes log_stderror=yes #*/
check_via=no # (cmd. line: -v) dns=no # (cmd. line: -r) rev_dns=no # (cmd. line: -R) #port=5060 #children=4 fifo="/tmp/ser_fifo"
# ------------------ module loading
# Uncomment this if you want to use SQL database #loadmodule "//lib/ser/modules/mysql.so"
loadmodule "//lib/ser/modules/sl.so" loadmodule "//lib/ser/modules/tm.so" loadmodule "//lib/ser/modules/rr.so" loadmodule "//lib/ser/modules/maxfwd.so" loadmodule "//lib/ser/modules/usrloc.so" loadmodule "//lib/ser/modules/registrar.so" loadmodule "//lib/ser/modules/group_radius.so"
#loadmodule "//lib/ser/modules/group.so" # Uncomment this if you want digest authentication # mysql.so must be loaded !
loadmodule "//lib/ser/modules/auth.so"
#loadmodule "//lib/ser/modules/auth_db.so"
loadmodule "//lib/ser/modules/auth_radius.so" loadmodule "//lib/ser/modules/acc.so"
#loadmodule "//lib/ser/modules/uri.so"
# ----------------- setting module-specific parameters
# -- usrloc params -- #modparam("usrloc", "db_mode", 0) # Uncomment this if you want to use SQL database # for persistent storage and comment the previous line #modparam("usrloc", "db_mode", 2) # -- auth params -- # Uncomment if you are using auth module # #modparam("auth_db", "calculate_ha1", yes) # # If you set "calculate_ha1" parameter to yes (which true in this
config),
# uncomment also the following parameter) # #modparam("auth_db", "password_column", "password")
# -- rr params -- # add value to ;lr param to make some broken UAs happy
modparam("rr", "enable_full_lr", 1)
modparam("auth_radius","radius_config","/etc/radiusclient/radiusclient.conf")
modparam("auth_radius","service_type",15) modparam("acc",
"radius_config","/etc/radiusclient/radiusclient.conf")
modparam("acc", "service_type", 15) modparam("acc", "radius_flag", 1) modparam("acc", "radius_missed_flag", 3)
# ------------------------- request routing logic
# main routing logic
route{
# initial sanity checks -- messages with # max_forwards==0, or excessively long requests if (!mf_process_maxfwd_header("10")) { sl_send_reply("483","Too Many Hops"); break; }; if ( msg:len > max_len ) { sl_send_reply("513", "Message too big"); break; }; # we record-route all messages -- to make sure that # subsequent messages will go through our proxy; that's # particularly good if upstream and downstream entities # use different transport protocol record_route(); # loose-route processing if (loose_route()) { t_relay(); break; }; # if the request is for other domain use UsrLoc # (in case, it does not work, use the following command # with proper names and addresses in it) if (uri==myself) { if (method=="REGISTER") {
# Uncomment this if you want to use digest authentication if (!radius_www_authorize("")) { www_challenge("", "0"); break; };
save("location"); break; }; # native SIP destinations are handled using our
USRLOC
DB
if (!lookup("location")) { sl_send_reply("404", "Not Found"); break; }; }; # forward to current uri now; use stateful forwarding;
that
# works reliably even if we forward from TCP to UDP if (!t_relay()) { sl_reply_error(); };
} ser:/var/log/radius/radacct #
Serusers mailing list serusers@lists.iptel.org http://lists.iptel.org/mailman/listinfo/serusers
Serusers mailing list serusers@lists.iptel.org http://lists.iptel.org/mailman/listinfo/serusers
ser:/ # ser:/ # ser:/ # ser:/ # ser:/ # /etc/init.d/ser start Starting SIP Express Router 0(6409) loading module //lib/ser/modules/sl.so 0(6409) loading module //lib/ser/modules/tm.so 0(6409) loading module //lib/ser/modules/rr.so 0(6409) loading module //lib/ser/modules/maxfwd.so 0(6409) loading module //lib/ser/modules/usrloc.so 0(6409) loading module //lib/ser/modules/registrar.so 0(6409) loading module //lib/ser/modules/group_radius.so 0(6409) loading module //lib/ser/modules/auth.so 0(6409) loading module //lib/ser/modules/auth_radius.so 0(6409) loading module //lib/ser/modules/acc.so 0(6409) set_mod_param_regex: rr matches module rr 0(6409) set_mod_param_regex: found <enable_full_lr> in module rr [//lib/ser/modules/rr.so] 0(6409) set_mod_param_regex: auth_radius matches module auth_radius 0(6409) set_mod_param_regex: found <radius_config> in module auth_radius [//lib/ser/modules/auth_radius.so] 0(6409) set_mod_param_regex: auth_radius matches module auth_radius 0(6409) set_mod_param_regex: found <service_type> in module auth_radius [//lib/ser/modules/auth_radius.so] 0(6409) set_mod_param_regex: acc matches module acc 0(6409) set_mod_param_regex: found <log_level> in module acc [//lib/ser/modules/acc.so] 0(6409) set_mod_param_regex: acc matches module acc 0(6409) set_mod_param_regex: found <radius_config> in module acc [//lib/ser/modules/acc.so] 0(6409) set_mod_param_regex: acc matches module acc 0(6409) set_mod_param_regex: found <radius_flag> in module acc [//lib/ser/modules/acc.so] 0(6409) set_mod_param_regex: acc matches module acc 0(6409) set_mod_param_regex: found <radius_missed_flag> in module acc [//lib/ser/modules/acc.so] 0(6409) find_export: found <mf_process_maxfwd_header> in module maxfwd_module [//lib/ser/modules/maxfwd.so] 0(6409) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6409) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6409) find_export: found <record_route> in module rr [//lib/ser/modules/rr.so] 0(6409) find_export: found <loose_route> in module rr [//lib/ser/modules/rr.so] 0(6409) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so] 0(6409) find_export: found <radius_www_authorize> in module auth_radius [//lib/ser/modules/auth_radius.so] 0(6409) find_export: found <www_challenge> in module auth [//lib/ser/modules/auth.so] 0(6409) find_export: found <save> in module registrar [//lib/ser/modules/registrar.so] 0(6409) find_export: found <lookup> in module registrar [//lib/ser/modules/registrar.so] 0(6409) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6409) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so] 0(6409) find_export: found <sl_reply_error> in module sl_module [//lib/ser/modules/sl.so] 0(6409) routing table 0: 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421a9c30> 0(6409) , "10" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421a9c30> 0(6409) , "10" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "483" 0(6409) , "Too Many Hops" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) UNKNOWN 0(6409) <UNKNOWN> 0(6409) 65535 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "513" 0(6409) , "Message too big" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) ); 0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) UNKNOWN 0(6409) <UNKNOWN> 0(6409) 65535 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "513" 0(6409) , "Message too big" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) ); 0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) ); 0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) Listening on 127.0.0.1 [127.0.0.1]:5060 200.110.2.132 [200.110.2.132]:5060 Aliases: ser:5060 ser.local:5060 localhost:5060 0(6411) DEBUG: init_mod: sl_module stateless - initializing 0(6411) DEBUG: register_fifo_cmd: new command (sl_stats) registered 0(6411) DEBUG: MD5 calculated: b27e1a1d33761e85846fc98f5f3a7e58 0(6411) DEBUG: init_mod: tm 0(6411) TM - initializing... 0(6411) Call-ID initialization: '7edfe76a' 0(6411) DEBUG: register_fifo_cmd: new command (t_uac_dlg) registered 0(6411) DEBUG: register_fifo_cmd: new command (t_hash) registered 0(6411) DEBUG: lock_initialize: lock initialization started done ser:/ # 0(6411) DEBUG: register_fifo_cmd: new command (t_stats) registered 0(6411) DEBUG: MD5 calculated: 533cb9e91f4b999cf76861cbb9ed54ed 0(6411) DEBUG: MD5 calculated: a6a1c5f60faecf035a1ae5b6e96e979a 0(6411) DEBUG: init_mod: rr 0(6411) rr - initializing 0(6411) DEBUG: init_mod: maxfwd_module Maxfwd module- initializing 0(6411) DEBUG: init_mod: usrloc 0(6411) usrloc - initializing 0(6411) DEBUG: register_fifo_cmd: new command (ul_stats) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_rm) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_rm_contact) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_dump) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_flush) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_add) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_show_contact) registered 0(6411) DEBUG: init_mod: registrar 0(6411) registrar - initializing 0(6411) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6411) find_export: found <ul_bind_usrloc> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_register_udomain> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_get_all_ucontacts> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_insert_urecord> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_delete_urecord> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_get_urecord> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_lock_udomain> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_unlock_udomain> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_release_urecord> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_insert_ucontact> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_delete_ucontact> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_get_ucontact> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_update_ucontact> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) DEBUG: init_mod: group_radius 0(6411) group_radius - initializing 0(6411) DEBUG: init_mod: auth 0(6411) auth module - initializing 0(6411) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6411) DEBUG: init_mod: auth_radius 0(6411) auth_radius - Initializing 0(6411) find_export: found <pre_auth> in module auth [//lib/ser/modules/auth.so] 0(6411) find_export: found <post_auth> in module auth [//lib/ser/modules/auth.so] 0(6411) DEBUG: init_mod: acc acc - initializing 0(6411) find_export: found <load_tm> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <register_tmcb> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_relay_to_tcp> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_relay_to_udp> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_reply> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_reply_with_body> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_is_local> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_get_trans_ident> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_lookup_ident> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_add_blind> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_forward_nonack> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_request_within> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_request_outside> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_request> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <new_dlg_uac> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <dlg_response_uac> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <new_dlg_uas> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <dlg_request_uas> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <free_dlg> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <print_dlg> in module tm [//lib/ser/modules/tm.so] 0(0) fixing //lib/ser/modules/maxfwd.so mf_process_maxfwd_header 0(0) fixing //lib/ser/modules/sl.so sl_send_reply 0(0) fixing //lib/ser/modules/sl.so sl_send_reply 0(0) fixing //lib/ser/modules/rr.so record_route 0(0) fixing //lib/ser/modules/rr.so loose_route 0(0) fixing //lib/ser/modules/tm.so t_relay 0(0) fixing //lib/ser/modules/auth_radius.so radius_www_authorize 0(0) fixing //lib/ser/modules/auth.so www_challenge 0(0) fixing //lib/ser/modules/registrar.so save 0(0) fixing //lib/ser/modules/registrar.so lookup 0(0) fixing //lib/ser/modules/sl.so sl_send_reply 0(0) fixing //lib/ser/modules/tm.so t_relay 0(0) fixing //lib/ser/modules/sl.so sl_reply_error 0(0) INFO: udp_init: SO_RCVBUF is initially 65535 0(0) DEBUG: udp_init: trying SO_RCVBUF: 131070 0(0) DEBUG: setting SO_RCVBUF; set=131070,verify=131070 0(0) DEBUG: udp_init: trying SO_RCVBUF: 262140 0(0) DEBUG: setting SO_RCVBUF; set=262140,verify=131070 0(0) DEBUG: setting SO_RCVBUF has no effect 0(0) DEBUG: udp_init: trying SO_RCVBUF: 133118 0(0) DEBUG: setting SO_RCVBUF; set=133118,verify=131070 0(0) DEBUG: setting SO_RCVBUF has no effect 0(0) INFO: udp_init: SO_RCVBUF is finally 131070 0(0) INFO: udp_init: SO_RCVBUF is initially 65535 0(0) DEBUG: udp_init: trying SO_RCVBUF: 131070 0(0) DEBUG: setting SO_RCVBUF; set=131070,verify=131070 0(0) DEBUG: udp_init: trying SO_RCVBUF: 262140 0(0) DEBUG: setting SO_RCVBUF; set=262140,verify=131070 0(0) DEBUG: setting SO_RCVBUF has no effect 0(0) DEBUG: udp_init: trying SO_RCVBUF: 133118 0(0) DEBUG: setting SO_RCVBUF; set=133118,verify=131070 0(0) DEBUG: setting SO_RCVBUF has no effect 0(0) INFO: udp_init: SO_RCVBUF is finally 131070 1(0) DEBUG: init_mod_child (1): tm 1(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 1(0) DEBUG: init_mod_child (1): usrloc 1(0) DEBUG: init_mod_child (1): acc 2(0) DEBUG: init_mod_child (2): tm 2(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 2(0) DEBUG: init_mod_child (2): usrloc 2(0) DEBUG: init_mod_child (2): acc 3(0) DEBUG: init_mod_child (3): tm 3(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 3(0) DEBUG: init_mod_child (3): usrloc 3(0) DEBUG: init_mod_child (3): acc 4(0) DEBUG: init_mod_child (4): tm 4(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 4(0) DEBUG: init_mod_child (4): usrloc 4(0) DEBUG: init_mod_child (4): acc 5(0) DEBUG: init_mod_child (5): tm 5(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 5(0) DEBUG: init_mod_child (5): usrloc 5(0) DEBUG: init_mod_child (5): acc 6(0) DEBUG: init_mod_child (6): tm 6(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 6(0) DEBUG: init_mod_child (6): usrloc 6(0) DEBUG: init_mod_child (6): acc 7(0) DEBUG: init_mod_child (7): tm 7(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 7(0) DEBUG: init_mod_child (7): usrloc 7(0) DEBUG: init_mod_child (7): acc 8(0) DEBUG: init_mod_child (8): tm 8(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 8(0) DEBUG: init_mod_child (8): usrloc 8(0) DEBUG: init_mod_child (8): acc 9(0) DEBUG: init_mod_child (1): tm 9(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 9(0) DEBUG: init_mod_child (1): usrloc 9(0) DEBUG: init_mod_child (1): acc 10(0) DEBUG: init_mod_child (2): tm 10(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 10(0) DEBUG: init_mod_child (2): usrloc 10(0) DEBUG: init_mod_child (2): acc 11(0) DEBUG: init_mod_child (3): tm 11(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 11(0) DEBUG: init_mod_child (3): usrloc 11(0) DEBUG: init_mod_child (3): acc 12(0) DEBUG: init_mod_child (4): tm 12(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 12(0) DEBUG: init_mod_child (4): usrloc 12(0) DEBUG: init_mod_child (4): acc 13(0) DEBUG: init_mod_child (5): tm 13(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 13(0) DEBUG: init_mod_child (5): usrloc 13(0) DEBUG: init_mod_child (5): acc 14(0) DEBUG: init_mod_child (6): tm 14(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 14(0) DEBUG: init_mod_child (6): usrloc 14(0) DEBUG: init_mod_child (6): acc 15(0) DEBUG: init_mod_child (7): tm 15(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 15(0) DEBUG: init_mod_child (7): usrloc 15(0) DEBUG: init_mod_child (7): acc 16(0) DEBUG: init_mod_child (8): tm 16(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 16(0) DEBUG: init_mod_child (8): usrloc 16(0) DEBUG: init_mod_child (8): acc 16(6427) DBG: open_uac_fifo: opening fifo... 16(6427) DEBUG: open_fifo_server: FIFO stat failed: Bad file descriptor 16(6427) DEBUG: FIFO created @ /tmp/ser_fifo 16(6427) DEBUG: fifo /tmp/ser_fifo opened, mode=432 17(0) INFO: fifo process starting: 6428 17(0) DEBUG: init_mod_child (-2): tm 17(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 17(0) DEBUG: init_mod_child (-2): usrloc 17(0) DEBUG: init_mod_child (-2): acc 18(0) DEBUG: init_mod_child (-1): tm 18(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 18(0) DEBUG: init_mod_child (-1): usrloc 18(0) DEBUG: init_mod_child (-1): acc 17(6428) SER: open_uac_fifo: fifo server up at /tmp/ser_fifo... 19(0) DEBUG: init_mod_child (9): tm 19(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 19(0) DEBUG: init_mod_child (9): usrloc 19(0) DEBUG: init_mod_child (9): acc 20(0) DEBUG: init_mod_child (10): tm 20(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 20(0) DEBUG: init_mod_child (10): usrloc 20(0) DEBUG: init_mod_child (10): acc 21(0) DEBUG: init_mod_child (11): tm 21(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 21(0) DEBUG: init_mod_child (11): usrloc 21(0) DEBUG: init_mod_child (11): acc 22(0) DEBUG: init_mod_child (12): tm 22(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 22(0) DEBUG: init_mod_child (12): usrloc 22(0) DEBUG: init_mod_child (12): acc 23(0) DEBUG: init_mod_child (13): tm 23(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 23(0) DEBUG: init_mod_child (13): usrloc 23(0) DEBUG: init_mod_child (13): acc 24(0) DEBUG: init_mod_child (14): tm 24(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 24(0) DEBUG: init_mod_child (14): usrloc 24(0) DEBUG: init_mod_child (14): acc 25(0) DEBUG: init_mod_child (15): tm 25(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 25(0) DEBUG: init_mod_child (15): usrloc 25(0) DEBUG: init_mod_child (15): acc 26(0) DEBUG: init_mod_child (16): tm 26(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 26(0) DEBUG: init_mod_child (16): usrloc 26(0) DEBUG: init_mod_child (16): acc 27(0) DEBUG: init_mod_child (-4): tm 27(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 27(0) DEBUG: init_mod_child (-4): usrloc 27(0) DEBUG: init_mod_child (-4): acc 0(6411) DEBUG: init_mod_child (0): tm 0(6411) DEBUG: callid: '7edfe76a-6411@127.0.0.1' 0(6411) DEBUG: init_mod_child (0): usrloc 0(6411) DEBUG: init_mod_child (0): acc
ser:/ # ser:/ # 13(6424) SIP Request: 13(6424) method: <INVITE> 13(6424) uri: sip:6604000@200.110.2.132 13(6424) version: <SIP/2.0> 13(6424) parse_headers: flags=1 13(6424) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16 13(6424) end of header reached, state=5 13(6424) parse_headers: Via found, flags=1 13(6424) parse_headers: this is the first via 13(6424) After parse_msg... 13(6424) preparing to run routing scripts... 13(6424) DEBUG : is_maxfwd_present: searching for max_forwards header 13(6424) parse_headers: flags=128 13(6424) end of header reached, state=9 13(6424) DEBUG: get_hdr_field: <To> [29]; uri=[sip:6604000@200.110.2.132] 13(6424) DEBUG: to body [sip:6604000@200.110.2.132 ] 13(6424) get_hdr_field: cseq <CSeq>: <180> <INVITE> 13(6424) DEBUG: get_hdr_body : content_length=137 13(6424) DEBUG: is_maxfwd_present: value = 70 13(6424) DEBUG: add_param: tag=6e00fdeaa4 13(6424) end of header reached, state=29 13(6424) parse_headers: flags=256 13(6424) found end of header 13(6424) find_first_route(): No Route headers found 13(6424) loose_route(): There is no Route HF 13(6424) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 13(6424) check_self - checking if port 5060 matches port 5060 13(6424) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 13(6424) check_self - checking if port 5060 matches port 5060 13(6424) INVITE or BYE 13(6424) rwrite(): Rewriting Request-URI with 'sip:6604000@200.110.6.58' 13(6424) DEBUG: t_addifnew: msg id=4 , global msg id=0 , T on entrance=0xffffffff 13(6424) parse_headers: flags=-1 13(6424) parse_headers: flags=60 13(6424) t_lookup_request: start searching: hash=28567, isACK=0 13(6424) DEBUG: RFC3261 transaction matching failed 13(6424) DEBUG: t_lookup_request: no transaction found 13(6424) DBG: callback type 2, id 3 entered 13(6424) parse_headers: flags=44 13(6424) DEBUG: noisy_timer set for accounting 13(6424) SER: new INVITE 13(6424) parse_headers: flags=-1 13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0) 13(6424) WARNING:vqm_resize: resize(0) called 13(6424) DEBUG: reply sent out. buf=0x80cb880: SIP/2.0 1..., shmem=0x402f6b10: SIP/2.0 1 13(6424) DEBUG: t_reply: finished 13(6424) DEBUG: mk_proxy: doing DNS lookup... 13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0) 13(6424) DEBUG: add_to_tail_of_timer[4]: 0x402f5574 13(6424) DEBUG: add_to_tail_of_timer[0]: 0x402f5588 13(6424) SER: new transaction fwd'ed 13(6424) receive_msg: cleaning up 15(6426) SIP Reply (status): 15(6426) version: <SIP/2.0> 15(6426) status: <100> 15(6426) reason: <Trying> 15(6426) parse_headers: flags=1 15(6426) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16 15(6426) end of header reached, state=5 15(6426) parse_headers: Via found, flags=1 15(6426) parse_headers: this is the first via 15(6426) After parse_msg... 15(6426) forward_reply: found module tm, passing reply to it 15(6426) DEBUG: t_check: msg id=5 global id=0 T start=0xffffffff 15(6426) parse_headers: flags=17 15(6426) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16 15(6426) end of header reached, state=5 15(6426) parse_headers: Via found, flags=17 15(6426) parse_headers: this is the second via 15(6426) end of header reached, state=9 15(6426) DEBUG: get_hdr_field: <To> [29]; uri=[sip:6604000@200.110.2.132] 15(6426) DEBUG: to body [sip:6604000@200.110.2.132 ] 15(6426) get_hdr_field: cseq <CSeq>: <180> <INVITE> 15(6426) parse_headers: flags=4 15(6426) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0 15(6426) DEBUG: t_reply_matching: reply matched (T=0x402f5450)! 15(6426) DBG: callback type 1, id 5 entered 15(6426) DEBUG: t_check: msg id=5 global id=5 T end=0x402f5450 15(6426) DEBUG: t_on_reply: org. status uas=100, uac[0]=0 local=0 is_invite=1) 15(6426) ->>>>>>>>> T_code=100, new_code=100 15(6426) DEBUG: relay_reply: branch=0, save=0, relay=-1 15(6426) DEBUG: add_to_tail_of_timer[1]: 0x402f5588 15(6426) receive_msg: cleaning up 10(6421) SIP Reply (status): 10(6421) version: <SIP/2.0> 10(6421) status: <180> 10(6421) reason: <Ringing> 10(6421) parse_headers: flags=1 10(6421) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16 10(6421) end of header reached, state=5 10(6421) parse_headers: Via found, flags=1 10(6421) parse_headers: this is the first via 10(6421) After parse_msg... 10(6421) forward_reply: found module tm, passing reply to it 10(6421) DEBUG: t_check: msg id=4 global id=0 T start=0xffffffff 10(6421) parse_headers: flags=17 10(6421) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16 10(6421) end of header reached, state=5 10(6421) parse_headers: Via found, flags=17 10(6421) parse_headers: this is the second via 10(6421) DEBUG: add_param: tag=218f2c81a4 10(6421) end of header reached, state=29 10(6421) DEBUG: get_hdr_field: <To> [44]; uri=[sip:6604000@200.110.2.132] 10(6421) DEBUG: to body [sip:6604000@200.110.2.132] 10(6421) get_hdr_field: cseq <CSeq>: <180> <INVITE> 10(6421) parse_headers: flags=4 10(6421) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0 10(6421) DEBUG: t_reply_matching: reply matched (T=0x402f5450)! 10(6421) DBG: callback type 1, id 5 entered 10(6421) DEBUG: t_check: msg id=4 global id=4 T end=0x402f5450 10(6421) DEBUG: t_on_reply: org. status uas=100, uac[0]=100 local=0 is_invite=1) 10(6421) ->>>>>>>>> T_code=100, new_code=180 10(6421) DEBUG: relay_reply: branch=0, save=0, relay=0 10(6421) old size: 472, new size: 410 10(6421) build_res_from_sip_res: copied size: orig:83, new: 21, rest: 389 msg= SIP/2.0 180 Ringing Via: SIP/2.0/UDP 10.0.0.236:5060;branch=z9hG4bK6e00fdeaa4180 From: sip:6603000@200.110.2.132;tag=6e00fdeaa4 To: sip:6604000@200.110.2.132;tag=218f2c81a4 Call-ID: 6e124000-5d1c-fd5d-80ea-0002a40055b2@10.0.0.236 CSeq: 180 INVITE User-Agent: AddPac SIP Gateway Contact: sip:6604000@200.110.6.58 Content-Length: 0 Record-Route: sip:6604000@200.110.2.132;ftag=6e00fdeaa4;lr=on
10(6421) DEBUG: reply relayed. buf=0x80cb900: SIP/2.0 1..., shmem=0x402f6b10: SIP/2.0 1 10(6421) DBG: callback type 7, id 1 entered 10(6421) DEBUG: add_to_tail_of_timer[1]: 0x402f5588 10(6421) receive_msg: cleaning up 12(6423) SIP Request: 12(6423) method: <REGISTER> 12(6423) uri: sip:200.110.2.132 12(6423) version: <SIP/2.0> 12(6423) parse_headers: flags=1 12(6423) Found param type 232, <branch> = <z9hG4bK2f003c00a422890>; state=16 12(6423) end of header reached, state=5 12(6423) parse_headers: Via found, flags=1 12(6423) parse_headers: this is the first via 12(6423) After parse_msg... 12(6423) preparing to run routing scripts... 12(6423) DEBUG : is_maxfwd_present: searching for max_forwards header 12(6423) parse_headers: flags=128 12(6423) end of header reached, state=8 12(6423) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6600020@200.110.2.132] 12(6423) DEBUG: to body [sip:6600020@200.110.2.132 ] 12(6423) get_hdr_field: cseq <CSeq>: <22890> <REGISTER> 12(6423) DEBUG: get_hdr_body : content_length=0 12(6423) DEBUG: is_maxfwd_present: value = 70 12(6423) DEBUG: add_param: tag=2f003c00a4 12(6423) end of header reached, state=29 12(6423) parse_headers: flags=256 12(6423) found end of header 12(6423) find_first_route(): No Route headers found 12(6423) loose_route(): There is no Route HF 12(6423) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 12(6423) check_self - checking if port 5060 matches port 5060 12(6423) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 12(6423) check_self - checking if port 5060 matches port 5060 12(6423) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354] 12(6423) radius_authorize_sterman(): Success 12(6423) save_rpid(): rpid value is '' 12(6423) parse_headers: flags=-1 12(6423) parse_headers: flags=-1 12(6423) check_via_address(10.0.0.236, 10.0.0.236, 0) 12(6423) receive_msg: cleaning up 13(6424) SIP Request: 13(6424) method: <REGISTER> 13(6424) uri: sip:200.110.2.132 13(6424) version: <SIP/2.0> 13(6424) parse_headers: flags=1 13(6424) Found param type 232, <branch> = <z9hG4bK2f003c00a422891>; state=16 13(6424) end of header reached, state=5 13(6424) parse_headers: Via found, flags=1 13(6424) parse_headers: this is the first via 13(6424) After parse_msg... 13(6424) preparing to run routing scripts... 13(6424) DEBUG : is_maxfwd_present: searching for max_forwards header 13(6424) parse_headers: flags=128 13(6424) end of header reached, state=8 13(6424) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6603000@200.110.2.132] 13(6424) DEBUG: to body [sip:6603000@200.110.2.132 ] 13(6424) get_hdr_field: cseq <CSeq>: <22891> <REGISTER> 13(6424) DEBUG: get_hdr_body : content_length=0 13(6424) DEBUG: is_maxfwd_present: value = 70 13(6424) DEBUG: add_param: tag=2f003c00a4 13(6424) end of header reached, state=29 13(6424) parse_headers: flags=256 13(6424) found end of header 13(6424) find_first_route(): No Route headers found 13(6424) loose_route(): There is no Route HF 13(6424) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 13(6424) check_self - checking if port 5060 matches port 5060 13(6424) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 13(6424) check_self - checking if port 5060 matches port 5060 13(6424) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354] 13(6424) radius_authorize_sterman(): Success 13(6424) save_rpid(): rpid value is '' 13(6424) parse_headers: flags=-1 13(6424) parse_headers: flags=-1 13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0) 13(6424) receive_msg: cleaning up 18(6429) DEBUG: timer routine:4,tl=0x402f5574 next=(nil) 16(6427) SIP Request: 16(6427) method: <REGISTER> 16(6427) uri: sip:200.110.2.132 16(6427) version: <SIP/2.0> 16(6427) parse_headers: flags=1 16(6427) Found param type 232, <branch> = <z9hG4bK2f003c00a422892>; state=16 16(6427) end of header reached, state=5 16(6427) parse_headers: Via found, flags=1 16(6427) parse_headers: this is the first via 16(6427) After parse_msg... 16(6427) preparing to run routing scripts... 16(6427) DEBUG : is_maxfwd_present: searching for max_forwards header 16(6427) parse_headers: flags=128 16(6427) end of header reached, state=8 16(6427) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6600020@200.110.2.132] 16(6427) DEBUG: to body [sip:6600020@200.110.2.132 ] 16(6427) get_hdr_field: cseq <CSeq>: <22892> <REGISTER> 16(6427) DEBUG: get_hdr_body : content_length=0 16(6427) DEBUG: is_maxfwd_present: value = 70 16(6427) DEBUG: add_param: tag=2f003c00a4 16(6427) end of header reached, state=29 16(6427) parse_headers: flags=256 16(6427) found end of header 16(6427) find_first_route(): No Route headers found 16(6427) loose_route(): There is no Route HF 16(6427) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 16(6427) check_self - checking if port 5060 matches port 5060 16(6427) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 16(6427) check_self - checking if port 5060 matches port 5060 16(6427) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354] 16(6427) radius_authorize_sterman(): Success 16(6427) save_rpid(): rpid value is '' 16(6427) parse_headers: flags=-1 16(6427) parse_headers: flags=-1 16(6427) check_via_address(10.0.0.236, 10.0.0.236, 0) 16(6427) receive_msg: cleaning up 10(6421) SIP Request: 10(6421) method: <REGISTER> 10(6421) uri: sip:200.110.2.132 10(6421) version: <SIP/2.0> 10(6421) parse_headers: flags=1 10(6421) Found param type 232, <branch> = <z9hG4bK2f003c00a422893>; state=16 10(6421) end of header reached, state=5 10(6421) parse_headers: Via found, flags=1 10(6421) parse_headers: this is the first via 10(6421) After parse_msg... 10(6421) preparing to run routing scripts... 10(6421) DEBUG : is_maxfwd_present: searching for max_forwards header 10(6421) parse_headers: flags=128 10(6421) end of header reached, state=8 10(6421) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6603000@200.110.2.132] 10(6421) DEBUG: to body [sip:6603000@200.110.2.132 ] 10(6421) get_hdr_field: cseq <CSeq>: <22893> <REGISTER> 10(6421) DEBUG: get_hdr_body : content_length=0 10(6421) DEBUG: is_maxfwd_present: value = 70 10(6421) DEBUG: add_param: tag=2f003c00a4 10(6421) end of header reached, state=29 10(6421) parse_headers: flags=256 10(6421) found end of header 10(6421) find_first_route(): No Route headers found 10(6421) loose_route(): There is no Route HF 10(6421) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 10(6421) check_self - checking if port 5060 matches port 5060 10(6421) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 10(6421) check_self - checking if port 5060 matches port 5060 10(6421) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354] 10(6421) radius_authorize_sterman(): Success 10(6421) save_rpid(): rpid value is '' 10(6421) parse_headers: flags=-1 10(6421) parse_headers: flags=-1 10(6421) check_via_address(10.0.0.236, 10.0.0.236, 0) 10(6421) receive_msg: cleaning up 11(6422) SIP Reply (status): 11(6422) version: <SIP/2.0> 11(6422) status: <200> 11(6422) reason: <OK> 11(6422) parse_headers: flags=1 11(6422) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16 11(6422) end of header reached, state=5 11(6422) parse_headers: Via found, flags=1 11(6422) parse_headers: this is the first via 11(6422) After parse_msg... 11(6422) forward_reply: found module tm, passing reply to it 11(6422) DEBUG: t_check: msg id=6 global id=0 T start=0xffffffff 11(6422) parse_headers: flags=17 11(6422) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16 11(6422) end of header reached, state=5 11(6422) parse_headers: Via found, flags=17 11(6422) parse_headers: this is the second via 11(6422) DEBUG: add_param: tag=218f2c81a4 11(6422) end of header reached, state=29 11(6422) DEBUG: get_hdr_field: <To> [44]; uri=[sip:6604000@200.110.2.132] 11(6422) DEBUG: to body [sip:6604000@200.110.2.132] 11(6422) get_hdr_field: cseq <CSeq>: <180> <INVITE> 11(6422) parse_headers: flags=4 11(6422) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0 11(6422) DEBUG: t_reply_matching: reply matched (T=0x402f5450)! 11(6422) parse_headers: flags=4 11(6422) DBG: callback type 1, id 5 entered 11(6422) parse_headers: flags=4 11(6422) DEBUG: t_check: msg id=6 global id=6 T end=0x402f5450 11(6422) DEBUG: t_on_reply: org. status uas=180, uac[0]=180 local=0 is_invite=1) 11(6422) ->>>>>>>>> T_code=180, new_code=200 11(6422) DEBUG: relay_reply: branch=0, save=0, relay=0 11(6422) old size: 682, new size: 620 11(6422) build_res_from_sip_res: copied size: orig:78, new: 16, rest: 604 msg= SIP/2.0 200 OK Via: SIP/2.0/UDP 10.0.0.236:5060;branch=z9hG4bK6e00fdeaa4180 From: sip:6603000@200.110.2.132;tag=6e00fdeaa4 To: sip:6604000@200.110.2.132;tag=218f2c81a4 Call-ID: 6e124000-5d1c-fd5d-80ea-0002a40055b2@10.0.0.236 CSeq: 180 INVITE Session-Expires: 1800;refresher=uac User-Agent: AddPac SIP Gateway Contact: sip:6604000@200.110.6.58 Require: timer Content-Type: application/sdp Content-Length: 129 Record-Route: sip:6604000@200.110.2.132;ftag=6e00fdeaa4;lr=on
v=0 o=AddpacTechSIP-GW-UserAgent 0 0 IN IP4 200.110.6.58 s=SIP Session c=IN IP4 200.110.6.58 t=0 0 m=audio 23120 RTP/AVP 4
11(6422) DEBUG: update_totag_set: new totag 11(6422) DEBUG: reply relayed. buf=0x80cbda0: SIP/2.0 2..., shmem=0x402f70d8: SIP/2.0 2 11(6422) DBG: callback type 7, id 1 entered 18(6429) DEBUG: timer routine:1,tl=0x402f5588 next=(nil)
The error is not related to radius. I went through your logs and did not find any errors. Given the fact that radius authentication works, I suppose there is no problem on radius side, so make sure that the corresponding flag is set, that you restarted your server when you changed the config file, try to see if there are any radius accounting requests from ser on the radius server side.
Jan.
On 08-06 12:17, Rafael J. Risco G.V. wrote:
Hi
About my problem with radius accounting I?ve seen some errors in debug mode when starting ser: . . 16(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 16(0) DEBUG: init_mod_child (8): usrloc 16(0) DEBUG: init_mod_child (8): acc 16(6427) DBG: open_uac_fifo: opening fifo... 16(6427) DEBUG: open_fifo_server: FIFO stat failed: Bad file descriptor 16(6427) DEBUG: FIFO created @ /tmp/ser_fifo 16(6427) DEBUG: fifo /tmp/ser_fifo opened, mode=432 17(0) INFO: fifo process starting: 6428 . . in fact I do not know if there are more, please see my attached files (startSer.txt and callDebug.txt),
thank you Rafael
Jan Janak jan@iptel.org escribi?:
Are there any error messages in ser logs ?
Jan.
On 07-06 13:14, Rafael J. Risco G.V. wrote:
hello
I?m still having problems with radius accounting module, ...I can see
that authentication process works well but I did not see any "Accounting Report" in /var/log/radius/radacct/ or neither in radiusd -X debug , please can someone share an example of its ser.cfg file for this function?
thanks Rafael
PS: my current ser.cfg configuration is shown below, freeradius it?s
installed
in the same host (SuSe Linux 9.0) and I have included setflag(1) for
all transactions as Klaus D. recommend me some days ago...
ser:/var/log/radius/radacct# more /etc/ser/ser.cfg
# simple quick-start config script #
# ----------- global configuration parameters
#debug=3 # debug level (cmd line: -dddddddddd) #fork=yes #log_stderror=no # (cmd line: -E)
#/* Uncomment these lines to enter debugging mode debug=9 fork=yes log_stderror=yes #*/
check_via=no # (cmd. line: -v) dns=no # (cmd. line: -r) rev_dns=no # (cmd. line: -R) #port=5060 #children=4 fifo="/tmp/ser_fifo"
# ------------------ module loading
# Uncomment this if you want to use SQL database #loadmodule "//lib/ser/modules/mysql.so"
loadmodule "//lib/ser/modules/sl.so" loadmodule "//lib/ser/modules/tm.so" loadmodule "//lib/ser/modules/rr.so" loadmodule "//lib/ser/modules/maxfwd.so" loadmodule "//lib/ser/modules/usrloc.so" loadmodule "//lib/ser/modules/registrar.so" loadmodule "//lib/ser/modules/group_radius.so" #loadmodule "//lib/ser/modules/group.so" # Uncomment this if you want digest authentication # mysql.so must be loaded ! loadmodule "//lib/ser/modules/auth.so" #loadmodule "//lib/ser/modules/auth_db.so" loadmodule "//lib/ser/modules/auth_radius.so" loadmodule "//lib/ser/modules/acc.so" #loadmodule "//lib/ser/modules/uri.so" # ----------------- setting module-specific parameters
# -- usrloc params -- #modparam("usrloc", "db_mode", 0) # Uncomment this if you want to use SQL database # for persistent storage and comment the previous line #modparam("usrloc", "db_mode", 2) # -- auth params -- # Uncomment if you are using auth module # #modparam("auth_db", "calculate_ha1", yes) # # If you set "calculate_ha1" parameter to yes (which true in this
config),
# uncomment also the following parameter) # #modparam("auth_db", "password_column", "password") # -- rr params -- # add value to ;lr param to make some broken UAs happy
modparam("rr", "enable_full_lr", 1)
modparam("auth_radius","radius_config","/etc/radiusclient/radiusclient.conf")
modparam("auth_radius","service_type",15) modparam("acc", "log_level", 1) modparam("acc",
"radius_config","/etc/radiusclient/radiusclient.conf")
modparam("acc", "service_type", 15) modparam("acc", "radius_flag", 1) modparam("acc", "radius_missed_flag", 3)
# ------------------------- request routing logic
# main routing logic
route{
setflag(1); if (method=="REGISTER") log(1, "REGISTER message received\n");
if (method=="INVITE") log(1, "INVITE message received\n"); if (method=="ACK") log(1, "ACK message received\n"); if (method=="BYE") log(1, "BYE message received\n"); if (method=="CANCEL") log(1, "CANCEL message received\n"); if (method=="SUBSCRIBE") log(1, "SUBSCRIBE message received\n"); if (method=="NOTIFY") log(1, "NOTIFY message received\n"); if (method=="OPTIONS") log(1, "OPTIONS message received\n"); if (method=="INFO") log(1, "INFO message received\n"); if (method=="MESSAGE") log(1, "MESSAGE message received\n"); if (method=="REFER") log(1, "REFER message received\n"); # initial sanity checks -- messages with # max_forwards==0, or excessively long requests if (!mf_process_maxfwd_header("10")) { sl_send_reply("483","Too Many Hops"); break; }; if ( msg:len > max_len ) { sl_send_reply("513", "Message too big"); break; }; # we record-route all messages -- to make sure that # subsequent messages will go through our proxy; that's # particularly good if upstream and downstream entities # use different transport protocol record_route(); # loose-route processing if (loose_route()) { t_relay(); break; }; # if the request is for other domain use UsrLoc # (in case, it does not work, use the following command # with proper names and addresses in it) if (uri==myself) { if (method=="REGISTER") {
# Uncomment this if you want to use digest authentication if (!radius_www_authorize("")) { www_challenge("", "1"); break; };
save("location"); break; };
#Labeled transactions for accounting #if (method =="INVITE" | method == "BYE") # { # log(1,"INVITE or BYE\n"); # setflag(1); # }; #if (method=="MESSAGE") { # log(1,"MESSAGE\n"); # setflag(1); # }; #if (method=="BYE"){ # log (1, "BYEd or CANCEL\n"); # setflag(1); # }; #if (method=="CANCEL"){ # log (1, "BYEe or CANCEL\n"); # setflag(1); # };
# native SIP destinations are handled using our USRLOC
DB
if (!lookup("location")) { sl_send_reply("404", "Not Found"); break; }; }; # forward to current uri now; use stateful forwarding; that # works reliably even if we forward from TCP to UDP if (!t_relay()) { sl_reply_error(); };
}
ser:/var/log/radius/radacct #
[Serusers] Still trying to get radius Accounting!!!!!!!!!!
Klaus Darilion klaus.mailinglists@pernau.at escribi?:
try setflag(1); for the transactions you want to account!
klaus
Rafael J. Risco G.V. wrote:
hello serusers! I have followed these instructions carefully
again(http://iptel.org/ser/doc/ser_radius/ser_radius.html) and now I
can
see that authentication process works well but I did not see any "Accounting Report" in /var/log/radius/radacct/ or neither in
radiusd -X
debug, please can someone send me an example of ser.cfg
configuration
for this purpose?
thanks Rafael
PS: my current ser.cfg configuration is shown below, freeradius it
is
installed in the same host (SuSe Linux 9.0):
ser:/var/log/radius/radacct # more /etc/ser/ser.cfg # # $Id: ser.cfg,v 1.21.4.1 2003/11/10 15:35:15 andrei Exp $ # # simple quick-start config script #
# ----------- global configuration parameters
#debug=3 # debug level (cmd line: -dddddddddd) #fork=yes #log_stderror=no # (cmd line: -E)
#/* Uncomment these lines to enter debugging mode debug=9 fork=yes log_stderror=yes #*/
check_via=no # (cmd. line: -v) dns=no # (cmd. line: -r) rev_dns=no # (cmd. line: -R) #port=5060 #children=4 fifo="/tmp/ser_fifo"
# ------------------ module loading
# Uncomment this if you want to use SQL database #loadmodule "//lib/ser/modules/mysql.so"
loadmodule "//lib/ser/modules/sl.so" loadmodule "//lib/ser/modules/tm.so" loadmodule "//lib/ser/modules/rr.so" loadmodule "//lib/ser/modules/maxfwd.so" loadmodule "//lib/ser/modules/usrloc.so" loadmodule "//lib/ser/modules/registrar.so" loadmodule "//lib/ser/modules/group_radius.so"
#loadmodule "//lib/ser/modules/group.so" # Uncomment this if you want digest authentication # mysql.so must be loaded !
loadmodule "//lib/ser/modules/auth.so"
#loadmodule "//lib/ser/modules/auth_db.so"
loadmodule "//lib/ser/modules/auth_radius.so" loadmodule "//lib/ser/modules/acc.so"
#loadmodule "//lib/ser/modules/uri.so"
# ----------------- setting module-specific parameters
# -- usrloc params -- #modparam("usrloc", "db_mode", 0) # Uncomment this if you want to use SQL database # for persistent storage and comment the previous line #modparam("usrloc", "db_mode", 2) # -- auth params -- # Uncomment if you are using auth module # #modparam("auth_db", "calculate_ha1", yes) # # If you set "calculate_ha1" parameter to yes (which true in this
config),
# uncomment also the following parameter) # #modparam("auth_db", "password_column", "password")
# -- rr params -- # add value to ;lr param to make some broken UAs happy
modparam("rr", "enable_full_lr", 1)
modparam("auth_radius","radius_config","/etc/radiusclient/radiusclient.conf")
modparam("auth_radius","service_type",15) modparam("acc",
"radius_config","/etc/radiusclient/radiusclient.conf")
modparam("acc", "service_type", 15) modparam("acc", "radius_flag", 1) modparam("acc", "radius_missed_flag", 3)
# ------------------------- request routing logic
# main routing logic
route{
# initial sanity checks -- messages with # max_forwards==0, or excessively long requests if (!mf_process_maxfwd_header("10")) { sl_send_reply("483","Too Many Hops"); break; }; if ( msg:len > max_len ) { sl_send_reply("513", "Message too big"); break; }; # we record-route all messages -- to make sure that # subsequent messages will go through our proxy; that's # particularly good if upstream and downstream entities # use different transport protocol record_route(); # loose-route processing if (loose_route()) { t_relay(); break; }; # if the request is for other domain use UsrLoc # (in case, it does not work, use the following command # with proper names and addresses in it) if (uri==myself) { if (method=="REGISTER") {
# Uncomment this if you want to use digest authentication if (!radius_www_authorize("")) { www_challenge("", "0"); break; };
save("location"); break; }; # native SIP destinations are handled using our
USRLOC
DB
if (!lookup("location")) { sl_send_reply("404", "Not Found"); break; }; }; # forward to current uri now; use stateful forwarding;
that
# works reliably even if we forward from TCP to UDP if (!t_relay()) { sl_reply_error(); };
} ser:/var/log/radius/radacct #
Serusers mailing list serusers@lists.iptel.org http://lists.iptel.org/mailman/listinfo/serusers
Serusers mailing list serusers@lists.iptel.org http://lists.iptel.org/mailman/listinfo/serusers
ser:/ # ser:/ # ser:/ # ser:/ # ser:/ # /etc/init.d/ser start Starting SIP Express Router 0(6409) loading module //lib/ser/modules/sl.so 0(6409) loading module //lib/ser/modules/tm.so 0(6409) loading module //lib/ser/modules/rr.so 0(6409) loading module //lib/ser/modules/maxfwd.so 0(6409) loading module //lib/ser/modules/usrloc.so 0(6409) loading module //lib/ser/modules/registrar.so 0(6409) loading module //lib/ser/modules/group_radius.so 0(6409) loading module //lib/ser/modules/auth.so 0(6409) loading module //lib/ser/modules/auth_radius.so 0(6409) loading module //lib/ser/modules/acc.so 0(6409) set_mod_param_regex: rr matches module rr 0(6409) set_mod_param_regex: found <enable_full_lr> in module rr [//lib/ser/modules/rr.so] 0(6409) set_mod_param_regex: auth_radius matches module auth_radius 0(6409) set_mod_param_regex: found <radius_config> in module auth_radius [//lib/ser/modules/auth_radius.so] 0(6409) set_mod_param_regex: auth_radius matches module auth_radius 0(6409) set_mod_param_regex: found <service_type> in module auth_radius [//lib/ser/modules/auth_radius.so] 0(6409) set_mod_param_regex: acc matches module acc 0(6409) set_mod_param_regex: found <log_level> in module acc [//lib/ser/modules/acc.so] 0(6409) set_mod_param_regex: acc matches module acc 0(6409) set_mod_param_regex: found <radius_config> in module acc [//lib/ser/modules/acc.so] 0(6409) set_mod_param_regex: acc matches module acc 0(6409) set_mod_param_regex: found <radius_flag> in module acc [//lib/ser/modules/acc.so] 0(6409) set_mod_param_regex: acc matches module acc 0(6409) set_mod_param_regex: found <radius_missed_flag> in module acc [//lib/ser/modules/acc.so] 0(6409) find_export: found <mf_process_maxfwd_header> in module maxfwd_module [//lib/ser/modules/maxfwd.so] 0(6409) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6409) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6409) find_export: found <record_route> in module rr [//lib/ser/modules/rr.so] 0(6409) find_export: found <loose_route> in module rr [//lib/ser/modules/rr.so] 0(6409) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so] 0(6409) find_export: found <radius_www_authorize> in module auth_radius [//lib/ser/modules/auth_radius.so] 0(6409) find_export: found <www_challenge> in module auth [//lib/ser/modules/auth.so] 0(6409) find_export: found <save> in module registrar [//lib/ser/modules/registrar.so] 0(6409) find_export: found <lookup> in module registrar [//lib/ser/modules/registrar.so] 0(6409) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6409) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so] 0(6409) find_export: found <sl_reply_error> in module sl_module [//lib/ser/modules/sl.so] 0(6409) routing table 0: 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421a9c30> 0(6409) , "10" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421a9c30> 0(6409) , "10" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "483" 0(6409) , "Too Many Hops" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) UNKNOWN 0(6409) <UNKNOWN> 0(6409) 65535 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "513" 0(6409) , "Message too big" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) ); 0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) UNKNOWN 0(6409) <UNKNOWN> 0(6409) 65535 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "513" 0(6409) , "Message too big" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) ); 0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) ); 0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL " 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) Listening on 127.0.0.1 [127.0.0.1]:5060 200.110.2.132 [200.110.2.132]:5060 Aliases: ser:5060 ser.local:5060 localhost:5060 0(6411) DEBUG: init_mod: sl_module stateless - initializing 0(6411) DEBUG: register_fifo_cmd: new command (sl_stats) registered 0(6411) DEBUG: MD5 calculated: b27e1a1d33761e85846fc98f5f3a7e58 0(6411) DEBUG: init_mod: tm 0(6411) TM - initializing... 0(6411) Call-ID initialization: '7edfe76a' 0(6411) DEBUG: register_fifo_cmd: new command (t_uac_dlg) registered 0(6411) DEBUG: register_fifo_cmd: new command (t_hash) registered 0(6411) DEBUG: lock_initialize: lock initialization started done ser:/ # 0(6411) DEBUG: register_fifo_cmd: new command (t_stats) registered 0(6411) DEBUG: MD5 calculated: 533cb9e91f4b999cf76861cbb9ed54ed 0(6411) DEBUG: MD5 calculated: a6a1c5f60faecf035a1ae5b6e96e979a 0(6411) DEBUG: init_mod: rr 0(6411) rr - initializing 0(6411) DEBUG: init_mod: maxfwd_module Maxfwd module- initializing 0(6411) DEBUG: init_mod: usrloc 0(6411) usrloc - initializing 0(6411) DEBUG: register_fifo_cmd: new command (ul_stats) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_rm) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_rm_contact) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_dump) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_flush) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_add) registered 0(6411) DEBUG: register_fifo_cmd: new command (ul_show_contact) registered 0(6411) DEBUG: init_mod: registrar 0(6411) registrar - initializing 0(6411) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6411) find_export: found <ul_bind_usrloc> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_register_udomain> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_get_all_ucontacts> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_insert_urecord> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_delete_urecord> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_get_urecord> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_lock_udomain> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_unlock_udomain> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_release_urecord> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_insert_ucontact> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_delete_ucontact> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_get_ucontact> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) find_export: found <ul_update_ucontact> in module usrloc [//lib/ser/modules/usrloc.so] 0(6411) DEBUG: init_mod: group_radius 0(6411) group_radius - initializing 0(6411) DEBUG: init_mod: auth 0(6411) auth module - initializing 0(6411) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so] 0(6411) DEBUG: init_mod: auth_radius 0(6411) auth_radius - Initializing 0(6411) find_export: found <pre_auth> in module auth [//lib/ser/modules/auth.so] 0(6411) find_export: found <post_auth> in module auth [//lib/ser/modules/auth.so] 0(6411) DEBUG: init_mod: acc acc - initializing 0(6411) find_export: found <load_tm> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <register_tmcb> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_relay_to_tcp> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_relay_to_udp> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_reply> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_reply_with_body> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_is_local> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_get_trans_ident> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_lookup_ident> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_add_blind> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_forward_nonack> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_request_within> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_request_outside> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <t_request> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <new_dlg_uac> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <dlg_response_uac> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <new_dlg_uas> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <dlg_request_uas> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <free_dlg> in module tm [//lib/ser/modules/tm.so] 0(6411) find_export: found <print_dlg> in module tm [//lib/ser/modules/tm.so] 0(0) fixing //lib/ser/modules/maxfwd.so mf_process_maxfwd_header 0(0) fixing //lib/ser/modules/sl.so sl_send_reply 0(0) fixing //lib/ser/modules/sl.so sl_send_reply 0(0) fixing //lib/ser/modules/rr.so record_route 0(0) fixing //lib/ser/modules/rr.so loose_route 0(0) fixing //lib/ser/modules/tm.so t_relay 0(0) fixing //lib/ser/modules/auth_radius.so radius_www_authorize 0(0) fixing //lib/ser/modules/auth.so www_challenge 0(0) fixing //lib/ser/modules/registrar.so save 0(0) fixing //lib/ser/modules/registrar.so lookup 0(0) fixing //lib/ser/modules/sl.so sl_send_reply 0(0) fixing //lib/ser/modules/tm.so t_relay 0(0) fixing //lib/ser/modules/sl.so sl_reply_error 0(0) INFO: udp_init: SO_RCVBUF is initially 65535 0(0) DEBUG: udp_init: trying SO_RCVBUF: 131070 0(0) DEBUG: setting SO_RCVBUF; set=131070,verify=131070 0(0) DEBUG: udp_init: trying SO_RCVBUF: 262140 0(0) DEBUG: setting SO_RCVBUF; set=262140,verify=131070 0(0) DEBUG: setting SO_RCVBUF has no effect 0(0) DEBUG: udp_init: trying SO_RCVBUF: 133118 0(0) DEBUG: setting SO_RCVBUF; set=133118,verify=131070 0(0) DEBUG: setting SO_RCVBUF has no effect 0(0) INFO: udp_init: SO_RCVBUF is finally 131070 0(0) INFO: udp_init: SO_RCVBUF is initially 65535 0(0) DEBUG: udp_init: trying SO_RCVBUF: 131070 0(0) DEBUG: setting SO_RCVBUF; set=131070,verify=131070 0(0) DEBUG: udp_init: trying SO_RCVBUF: 262140 0(0) DEBUG: setting SO_RCVBUF; set=262140,verify=131070 0(0) DEBUG: setting SO_RCVBUF has no effect 0(0) DEBUG: udp_init: trying SO_RCVBUF: 133118 0(0) DEBUG: setting SO_RCVBUF; set=133118,verify=131070 0(0) DEBUG: setting SO_RCVBUF has no effect 0(0) INFO: udp_init: SO_RCVBUF is finally 131070 1(0) DEBUG: init_mod_child (1): tm 1(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 1(0) DEBUG: init_mod_child (1): usrloc 1(0) DEBUG: init_mod_child (1): acc 2(0) DEBUG: init_mod_child (2): tm 2(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 2(0) DEBUG: init_mod_child (2): usrloc 2(0) DEBUG: init_mod_child (2): acc 3(0) DEBUG: init_mod_child (3): tm 3(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 3(0) DEBUG: init_mod_child (3): usrloc 3(0) DEBUG: init_mod_child (3): acc 4(0) DEBUG: init_mod_child (4): tm 4(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 4(0) DEBUG: init_mod_child (4): usrloc 4(0) DEBUG: init_mod_child (4): acc 5(0) DEBUG: init_mod_child (5): tm 5(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 5(0) DEBUG: init_mod_child (5): usrloc 5(0) DEBUG: init_mod_child (5): acc 6(0) DEBUG: init_mod_child (6): tm 6(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 6(0) DEBUG: init_mod_child (6): usrloc 6(0) DEBUG: init_mod_child (6): acc 7(0) DEBUG: init_mod_child (7): tm 7(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 7(0) DEBUG: init_mod_child (7): usrloc 7(0) DEBUG: init_mod_child (7): acc 8(0) DEBUG: init_mod_child (8): tm 8(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 8(0) DEBUG: init_mod_child (8): usrloc 8(0) DEBUG: init_mod_child (8): acc 9(0) DEBUG: init_mod_child (1): tm 9(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 9(0) DEBUG: init_mod_child (1): usrloc 9(0) DEBUG: init_mod_child (1): acc 10(0) DEBUG: init_mod_child (2): tm 10(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 10(0) DEBUG: init_mod_child (2): usrloc 10(0) DEBUG: init_mod_child (2): acc 11(0) DEBUG: init_mod_child (3): tm 11(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 11(0) DEBUG: init_mod_child (3): usrloc 11(0) DEBUG: init_mod_child (3): acc 12(0) DEBUG: init_mod_child (4): tm 12(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 12(0) DEBUG: init_mod_child (4): usrloc 12(0) DEBUG: init_mod_child (4): acc 13(0) DEBUG: init_mod_child (5): tm 13(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 13(0) DEBUG: init_mod_child (5): usrloc 13(0) DEBUG: init_mod_child (5): acc 14(0) DEBUG: init_mod_child (6): tm 14(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 14(0) DEBUG: init_mod_child (6): usrloc 14(0) DEBUG: init_mod_child (6): acc 15(0) DEBUG: init_mod_child (7): tm 15(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 15(0) DEBUG: init_mod_child (7): usrloc 15(0) DEBUG: init_mod_child (7): acc 16(0) DEBUG: init_mod_child (8): tm 16(0) DEBUG: callid: '7edfe76a-0@200.110.2.132' 16(0) DEBUG: init_mod_child (8): usrloc 16(0) DEBUG: init_mod_child (8): acc 16(6427) DBG: open_uac_fifo: opening fifo... 16(6427) DEBUG: open_fifo_server: FIFO stat failed: Bad file descriptor 16(6427) DEBUG: FIFO created @ /tmp/ser_fifo 16(6427) DEBUG: fifo /tmp/ser_fifo opened, mode=432 17(0) INFO: fifo process starting: 6428 17(0) DEBUG: init_mod_child (-2): tm 17(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 17(0) DEBUG: init_mod_child (-2): usrloc 17(0) DEBUG: init_mod_child (-2): acc 18(0) DEBUG: init_mod_child (-1): tm 18(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 18(0) DEBUG: init_mod_child (-1): usrloc 18(0) DEBUG: init_mod_child (-1): acc 17(6428) SER: open_uac_fifo: fifo server up at /tmp/ser_fifo... 19(0) DEBUG: init_mod_child (9): tm 19(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 19(0) DEBUG: init_mod_child (9): usrloc 19(0) DEBUG: init_mod_child (9): acc 20(0) DEBUG: init_mod_child (10): tm 20(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 20(0) DEBUG: init_mod_child (10): usrloc 20(0) DEBUG: init_mod_child (10): acc 21(0) DEBUG: init_mod_child (11): tm 21(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 21(0) DEBUG: init_mod_child (11): usrloc 21(0) DEBUG: init_mod_child (11): acc 22(0) DEBUG: init_mod_child (12): tm 22(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 22(0) DEBUG: init_mod_child (12): usrloc 22(0) DEBUG: init_mod_child (12): acc 23(0) DEBUG: init_mod_child (13): tm 23(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 23(0) DEBUG: init_mod_child (13): usrloc 23(0) DEBUG: init_mod_child (13): acc 24(0) DEBUG: init_mod_child (14): tm 24(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 24(0) DEBUG: init_mod_child (14): usrloc 24(0) DEBUG: init_mod_child (14): acc 25(0) DEBUG: init_mod_child (15): tm 25(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 25(0) DEBUG: init_mod_child (15): usrloc 25(0) DEBUG: init_mod_child (15): acc 26(0) DEBUG: init_mod_child (16): tm 26(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 26(0) DEBUG: init_mod_child (16): usrloc 26(0) DEBUG: init_mod_child (16): acc 27(0) DEBUG: init_mod_child (-4): tm 27(0) DEBUG: callid: '7edfe76a-0@127.0.0.1' 27(0) DEBUG: init_mod_child (-4): usrloc 27(0) DEBUG: init_mod_child (-4): acc 0(6411) DEBUG: init_mod_child (0): tm 0(6411) DEBUG: callid: '7edfe76a-6411@127.0.0.1' 0(6411) DEBUG: init_mod_child (0): usrloc 0(6411) DEBUG: init_mod_child (0): acc
ser:/ # ser:/ # 13(6424) SIP Request: 13(6424) method: <INVITE> 13(6424) uri: sip:6604000@200.110.2.132 13(6424) version: <SIP/2.0> 13(6424) parse_headers: flags=1 13(6424) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16 13(6424) end of header reached, state=5 13(6424) parse_headers: Via found, flags=1 13(6424) parse_headers: this is the first via 13(6424) After parse_msg... 13(6424) preparing to run routing scripts... 13(6424) DEBUG : is_maxfwd_present: searching for max_forwards header 13(6424) parse_headers: flags=128 13(6424) end of header reached, state=9 13(6424) DEBUG: get_hdr_field: <To> [29]; uri=[sip:6604000@200.110.2.132] 13(6424) DEBUG: to body [sip:6604000@200.110.2.132 ] 13(6424) get_hdr_field: cseq <CSeq>: <180> <INVITE> 13(6424) DEBUG: get_hdr_body : content_length=137 13(6424) DEBUG: is_maxfwd_present: value = 70 13(6424) DEBUG: add_param: tag=6e00fdeaa4 13(6424) end of header reached, state=29 13(6424) parse_headers: flags=256 13(6424) found end of header 13(6424) find_first_route(): No Route headers found 13(6424) loose_route(): There is no Route HF 13(6424) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 13(6424) check_self - checking if port 5060 matches port 5060 13(6424) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 13(6424) check_self - checking if port 5060 matches port 5060 13(6424) INVITE or BYE 13(6424) rwrite(): Rewriting Request-URI with 'sip:6604000@200.110.6.58' 13(6424) DEBUG: t_addifnew: msg id=4 , global msg id=0 , T on entrance=0xffffffff 13(6424) parse_headers: flags=-1 13(6424) parse_headers: flags=60 13(6424) t_lookup_request: start searching: hash=28567, isACK=0 13(6424) DEBUG: RFC3261 transaction matching failed 13(6424) DEBUG: t_lookup_request: no transaction found 13(6424) DBG: callback type 2, id 3 entered 13(6424) parse_headers: flags=44 13(6424) DEBUG: noisy_timer set for accounting 13(6424) SER: new INVITE 13(6424) parse_headers: flags=-1 13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0) 13(6424) WARNING:vqm_resize: resize(0) called 13(6424) DEBUG: reply sent out. buf=0x80cb880: SIP/2.0 1..., shmem=0x402f6b10: SIP/2.0 1 13(6424) DEBUG: t_reply: finished 13(6424) DEBUG: mk_proxy: doing DNS lookup... 13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0) 13(6424) DEBUG: add_to_tail_of_timer[4]: 0x402f5574 13(6424) DEBUG: add_to_tail_of_timer[0]: 0x402f5588 13(6424) SER: new transaction fwd'ed 13(6424) receive_msg: cleaning up 15(6426) SIP Reply (status): 15(6426) version: <SIP/2.0> 15(6426) status: <100> 15(6426) reason: <Trying> 15(6426) parse_headers: flags=1 15(6426) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16 15(6426) end of header reached, state=5 15(6426) parse_headers: Via found, flags=1 15(6426) parse_headers: this is the first via 15(6426) After parse_msg... 15(6426) forward_reply: found module tm, passing reply to it 15(6426) DEBUG: t_check: msg id=5 global id=0 T start=0xffffffff 15(6426) parse_headers: flags=17 15(6426) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16 15(6426) end of header reached, state=5 15(6426) parse_headers: Via found, flags=17 15(6426) parse_headers: this is the second via 15(6426) end of header reached, state=9 15(6426) DEBUG: get_hdr_field: <To> [29]; uri=[sip:6604000@200.110.2.132] 15(6426) DEBUG: to body [sip:6604000@200.110.2.132 ] 15(6426) get_hdr_field: cseq <CSeq>: <180> <INVITE> 15(6426) parse_headers: flags=4 15(6426) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0 15(6426) DEBUG: t_reply_matching: reply matched (T=0x402f5450)! 15(6426) DBG: callback type 1, id 5 entered 15(6426) DEBUG: t_check: msg id=5 global id=5 T end=0x402f5450 15(6426) DEBUG: t_on_reply: org. status uas=100, uac[0]=0 local=0 is_invite=1) 15(6426) ->>>>>>>>> T_code=100, new_code=100 15(6426) DEBUG: relay_reply: branch=0, save=0, relay=-1 15(6426) DEBUG: add_to_tail_of_timer[1]: 0x402f5588 15(6426) receive_msg: cleaning up 10(6421) SIP Reply (status): 10(6421) version: <SIP/2.0> 10(6421) status: <180> 10(6421) reason: <Ringing> 10(6421) parse_headers: flags=1 10(6421) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16 10(6421) end of header reached, state=5 10(6421) parse_headers: Via found, flags=1 10(6421) parse_headers: this is the first via 10(6421) After parse_msg... 10(6421) forward_reply: found module tm, passing reply to it 10(6421) DEBUG: t_check: msg id=4 global id=0 T start=0xffffffff 10(6421) parse_headers: flags=17 10(6421) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16 10(6421) end of header reached, state=5 10(6421) parse_headers: Via found, flags=17 10(6421) parse_headers: this is the second via 10(6421) DEBUG: add_param: tag=218f2c81a4 10(6421) end of header reached, state=29 10(6421) DEBUG: get_hdr_field: <To> [44]; uri=[sip:6604000@200.110.2.132] 10(6421) DEBUG: to body [sip:6604000@200.110.2.132] 10(6421) get_hdr_field: cseq <CSeq>: <180> <INVITE> 10(6421) parse_headers: flags=4 10(6421) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0 10(6421) DEBUG: t_reply_matching: reply matched (T=0x402f5450)! 10(6421) DBG: callback type 1, id 5 entered 10(6421) DEBUG: t_check: msg id=4 global id=4 T end=0x402f5450 10(6421) DEBUG: t_on_reply: org. status uas=100, uac[0]=100 local=0 is_invite=1) 10(6421) ->>>>>>>>> T_code=100, new_code=180 10(6421) DEBUG: relay_reply: branch=0, save=0, relay=0 10(6421) old size: 472, new size: 410 10(6421) build_res_from_sip_res: copied size: orig:83, new: 21, rest: 389 msg= SIP/2.0 180 Ringing Via: SIP/2.0/UDP 10.0.0.236:5060;branch=z9hG4bK6e00fdeaa4180 From: sip:6603000@200.110.2.132;tag=6e00fdeaa4 To: sip:6604000@200.110.2.132;tag=218f2c81a4 Call-ID: 6e124000-5d1c-fd5d-80ea-0002a40055b2@10.0.0.236 CSeq: 180 INVITE User-Agent: AddPac SIP Gateway Contact: sip:6604000@200.110.6.58 Content-Length: 0 Record-Route: sip:6604000@200.110.2.132;ftag=6e00fdeaa4;lr=on
10(6421) DEBUG: reply relayed. buf=0x80cb900: SIP/2.0 1..., shmem=0x402f6b10: SIP/2.0 1 10(6421) DBG: callback type 7, id 1 entered 10(6421) DEBUG: add_to_tail_of_timer[1]: 0x402f5588 10(6421) receive_msg: cleaning up 12(6423) SIP Request: 12(6423) method: <REGISTER> 12(6423) uri: sip:200.110.2.132 12(6423) version: <SIP/2.0> 12(6423) parse_headers: flags=1 12(6423) Found param type 232, <branch> = <z9hG4bK2f003c00a422890>; state=16 12(6423) end of header reached, state=5 12(6423) parse_headers: Via found, flags=1 12(6423) parse_headers: this is the first via 12(6423) After parse_msg... 12(6423) preparing to run routing scripts... 12(6423) DEBUG : is_maxfwd_present: searching for max_forwards header 12(6423) parse_headers: flags=128 12(6423) end of header reached, state=8 12(6423) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6600020@200.110.2.132] 12(6423) DEBUG: to body [sip:6600020@200.110.2.132 ] 12(6423) get_hdr_field: cseq <CSeq>: <22890> <REGISTER> 12(6423) DEBUG: get_hdr_body : content_length=0 12(6423) DEBUG: is_maxfwd_present: value = 70 12(6423) DEBUG: add_param: tag=2f003c00a4 12(6423) end of header reached, state=29 12(6423) parse_headers: flags=256 12(6423) found end of header 12(6423) find_first_route(): No Route headers found 12(6423) loose_route(): There is no Route HF 12(6423) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 12(6423) check_self - checking if port 5060 matches port 5060 12(6423) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 12(6423) check_self - checking if port 5060 matches port 5060 12(6423) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354] 12(6423) radius_authorize_sterman(): Success 12(6423) save_rpid(): rpid value is '' 12(6423) parse_headers: flags=-1 12(6423) parse_headers: flags=-1 12(6423) check_via_address(10.0.0.236, 10.0.0.236, 0) 12(6423) receive_msg: cleaning up 13(6424) SIP Request: 13(6424) method: <REGISTER> 13(6424) uri: sip:200.110.2.132 13(6424) version: <SIP/2.0> 13(6424) parse_headers: flags=1 13(6424) Found param type 232, <branch> = <z9hG4bK2f003c00a422891>; state=16 13(6424) end of header reached, state=5 13(6424) parse_headers: Via found, flags=1 13(6424) parse_headers: this is the first via 13(6424) After parse_msg... 13(6424) preparing to run routing scripts... 13(6424) DEBUG : is_maxfwd_present: searching for max_forwards header 13(6424) parse_headers: flags=128 13(6424) end of header reached, state=8 13(6424) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6603000@200.110.2.132] 13(6424) DEBUG: to body [sip:6603000@200.110.2.132 ] 13(6424) get_hdr_field: cseq <CSeq>: <22891> <REGISTER> 13(6424) DEBUG: get_hdr_body : content_length=0 13(6424) DEBUG: is_maxfwd_present: value = 70 13(6424) DEBUG: add_param: tag=2f003c00a4 13(6424) end of header reached, state=29 13(6424) parse_headers: flags=256 13(6424) found end of header 13(6424) find_first_route(): No Route headers found 13(6424) loose_route(): There is no Route HF 13(6424) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 13(6424) check_self - checking if port 5060 matches port 5060 13(6424) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 13(6424) check_self - checking if port 5060 matches port 5060 13(6424) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354] 13(6424) radius_authorize_sterman(): Success 13(6424) save_rpid(): rpid value is '' 13(6424) parse_headers: flags=-1 13(6424) parse_headers: flags=-1 13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0) 13(6424) receive_msg: cleaning up 18(6429) DEBUG: timer routine:4,tl=0x402f5574 next=(nil) 16(6427) SIP Request: 16(6427) method: <REGISTER> 16(6427) uri: sip:200.110.2.132 16(6427) version: <SIP/2.0> 16(6427) parse_headers: flags=1 16(6427) Found param type 232, <branch> = <z9hG4bK2f003c00a422892>; state=16 16(6427) end of header reached, state=5 16(6427) parse_headers: Via found, flags=1 16(6427) parse_headers: this is the first via 16(6427) After parse_msg... 16(6427) preparing to run routing scripts... 16(6427) DEBUG : is_maxfwd_present: searching for max_forwards header 16(6427) parse_headers: flags=128 16(6427) end of header reached, state=8 16(6427) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6600020@200.110.2.132] 16(6427) DEBUG: to body [sip:6600020@200.110.2.132 ] 16(6427) get_hdr_field: cseq <CSeq>: <22892> <REGISTER> 16(6427) DEBUG: get_hdr_body : content_length=0 16(6427) DEBUG: is_maxfwd_present: value = 70 16(6427) DEBUG: add_param: tag=2f003c00a4 16(6427) end of header reached, state=29 16(6427) parse_headers: flags=256 16(6427) found end of header 16(6427) find_first_route(): No Route headers found 16(6427) loose_route(): There is no Route HF 16(6427) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 16(6427) check_self - checking if port 5060 matches port 5060 16(6427) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 16(6427) check_self - checking if port 5060 matches port 5060 16(6427) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354] 16(6427) radius_authorize_sterman(): Success 16(6427) save_rpid(): rpid value is '' 16(6427) parse_headers: flags=-1 16(6427) parse_headers: flags=-1 16(6427) check_via_address(10.0.0.236, 10.0.0.236, 0) 16(6427) receive_msg: cleaning up 10(6421) SIP Request: 10(6421) method: <REGISTER> 10(6421) uri: sip:200.110.2.132 10(6421) version: <SIP/2.0> 10(6421) parse_headers: flags=1 10(6421) Found param type 232, <branch> = <z9hG4bK2f003c00a422893>; state=16 10(6421) end of header reached, state=5 10(6421) parse_headers: Via found, flags=1 10(6421) parse_headers: this is the first via 10(6421) After parse_msg... 10(6421) preparing to run routing scripts... 10(6421) DEBUG : is_maxfwd_present: searching for max_forwards header 10(6421) parse_headers: flags=128 10(6421) end of header reached, state=8 10(6421) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6603000@200.110.2.132] 10(6421) DEBUG: to body [sip:6603000@200.110.2.132 ] 10(6421) get_hdr_field: cseq <CSeq>: <22893> <REGISTER> 10(6421) DEBUG: get_hdr_body : content_length=0 10(6421) DEBUG: is_maxfwd_present: value = 70 10(6421) DEBUG: add_param: tag=2f003c00a4 10(6421) end of header reached, state=29 10(6421) parse_headers: flags=256 10(6421) found end of header 10(6421) find_first_route(): No Route headers found 10(6421) loose_route(): There is no Route HF 10(6421) check_self - checking if host==us: 13==9 && [200.110.2.132] == [127.0.0.1] 10(6421) check_self - checking if port 5060 matches port 5060 10(6421) check_self - checking if host==us: 13==13 && [200.110.2.132] == [200.110.2.132] 10(6421) check_self - checking if port 5060 matches port 5060 10(6421) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354] 10(6421) radius_authorize_sterman(): Success 10(6421) save_rpid(): rpid value is '' 10(6421) parse_headers: flags=-1 10(6421) parse_headers: flags=-1 10(6421) check_via_address(10.0.0.236, 10.0.0.236, 0) 10(6421) receive_msg: cleaning up 11(6422) SIP Reply (status): 11(6422) version: <SIP/2.0> 11(6422) status: <200> 11(6422) reason: <OK> 11(6422) parse_headers: flags=1 11(6422) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16 11(6422) end of header reached, state=5 11(6422) parse_headers: Via found, flags=1 11(6422) parse_headers: this is the first via 11(6422) After parse_msg... 11(6422) forward_reply: found module tm, passing reply to it 11(6422) DEBUG: t_check: msg id=6 global id=0 T start=0xffffffff 11(6422) parse_headers: flags=17 11(6422) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16 11(6422) end of header reached, state=5 11(6422) parse_headers: Via found, flags=17 11(6422) parse_headers: this is the second via 11(6422) DEBUG: add_param: tag=218f2c81a4 11(6422) end of header reached, state=29 11(6422) DEBUG: get_hdr_field: <To> [44]; uri=[sip:6604000@200.110.2.132] 11(6422) DEBUG: to body [sip:6604000@200.110.2.132] 11(6422) get_hdr_field: cseq <CSeq>: <180> <INVITE> 11(6422) parse_headers: flags=4 11(6422) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0 11(6422) DEBUG: t_reply_matching: reply matched (T=0x402f5450)! 11(6422) parse_headers: flags=4 11(6422) DBG: callback type 1, id 5 entered 11(6422) parse_headers: flags=4 11(6422) DEBUG: t_check: msg id=6 global id=6 T end=0x402f5450 11(6422) DEBUG: t_on_reply: org. status uas=180, uac[0]=180 local=0 is_invite=1) 11(6422) ->>>>>>>>> T_code=180, new_code=200 11(6422) DEBUG: relay_reply: branch=0, save=0, relay=0 11(6422) old size: 682, new size: 620 11(6422) build_res_from_sip_res: copied size: orig:78, new: 16, rest: 604 msg= SIP/2.0 200 OK Via: SIP/2.0/UDP 10.0.0.236:5060;branch=z9hG4bK6e00fdeaa4180 From: sip:6603000@200.110.2.132;tag=6e00fdeaa4 To: sip:6604000@200.110.2.132;tag=218f2c81a4 Call-ID: 6e124000-5d1c-fd5d-80ea-0002a40055b2@10.0.0.236 CSeq: 180 INVITE Session-Expires: 1800;refresher=uac User-Agent: AddPac SIP Gateway Contact: sip:6604000@200.110.6.58 Require: timer Content-Type: application/sdp Content-Length: 129 Record-Route: sip:6604000@200.110.2.132;ftag=6e00fdeaa4;lr=on
v=0 o=AddpacTechSIP-GW-UserAgent 0 0 IN IP4 200.110.6.58 s=SIP Session c=IN IP4 200.110.6.58 t=0 0 m=audio 23120 RTP/AVP 4
11(6422) DEBUG: update_totag_set: new totag 11(6422) DEBUG: reply relayed. buf=0x80cbda0: SIP/2.0 2..., shmem=0x402f70d8: SIP/2.0 2 11(6422) DBG: callback type 7, id 1 entered 18(6429) DEBUG: timer routine:1,tl=0x402f5588 next=(nil)