Hello,
I am having issues with the openser.cfg from sipwise.
The CFC does not forward the calls when set in the database. Also, I am
using the full uri as the UUID for example UUID can be
4163334444(a)proxy.domain.net.
I have modified the config for radius authentication as well.
Here is what I am trying to do:
1. Radius Authentication on register and PSTN calling
2. CFC based on user preferences in database
3. If user offline forward the asterisk vmail server
4. If user cancels call it will forward to vmail server
Here is the config I currently have:
########################################################################
# This configuration is autogenerated by sip:wizard
# (
http://www.sipwise.com/wizard) on Tue Jun 26 22:47:33 +0200 2007
# for OpenSER 1.2
#
# Copyright (C) 2007 Sipwise (support(a)sipwise.com)
########################################################################
########################################################################
# By obtaining, using, and/or copying this configuration and/or its
# associated documentation, you agree that you have read, understood,
# and will comply with the Terms of Usage provided at
#
http://www.sipwise.com/news/?page_id=6 as well as the following
# additions:
#
# Permission to use, copy, modify, and distribute this configuration and
# its associated documentation for any purpose and without fee is hereby
# granted, provided that the above copyright notice appears in all
# copies, and that both that copyright notice and this permission notice
# appear in supporting documentation, and that the name of Sipwise or
# the author will not be used in advertising or publicity pertaining to
# distribution of the configuration without specific, written prior
# permission.
########################################################################
########################################################################
# Before using this configuration, read the following prerequisites in
# order to gain the designated functionallity:
#
# base:
# You have to insert all locally served domains (i.e.
# "openserctl domain add your.domain.com").
#
# nat-mediaproxy:
# You have to install mediaproxy
# (
http://mediaproxy.ag-projects.com/) for relaying RTP traffic.
#
# usr-preferences:
# This feature relies on UUID-based provisioning. Thus, you have
# to add the uuid-column to the subscriber table ("alter table
# subscriber add column uuid varchar(64);") and populate it with a
# UUID (unique user identifier) per user, for example an
# auto-incremented id.
#
# offnet-incoming-sip:
# You have to populate the "trusted"-table with rules for
# allowed peering hosts (i.e. src_ip="1.2.3.4", proto="udp",
# from_pattern="^sip:.*@domain.of.peering.host$", tag="1234"). If
the
# feature "usr-preferences" is selected, the tag-value is used as
# caller-uuid for such calls.
#
# offnet-pstn:
# You have to add a routing entry for lcr (i.e. "openserctl lcr
# addroute '' '' 1 1"). Additionally, you have to add your
gateways
# (i.e. "openserctl lcr addgw my-test-gw 1.2.3.4 5060 sip udp 1").
#
# cfu:
# You have to provision the call-forward-unconditional as full
# SIP URI (AVP cfu as type 0) for each user in the usr_preferences
# table (i.e. uuid='1234', username='', domain='',
attribute='cfu',
# type=0, value='sip:foo@otherdomain.com'). Forwards to another user
# in the same domain or to other domains are possible.
#
# cfc:
# You have to provision the call-forward-conditional as full SIP
# URI (AVP cfc as type 0) for each user in the usr_preferences table
# (i.e. uuid='1234', username='', domain='',
attribute='cfc', type=0,
# value='sip:foo@otherdomain.com'). Forwards to another user in the
# same domain or to other domains are possible.
#
# user-aliases:
# You have to add aliases for your users (i.e. "openserctl alias
# add 01234567 sip:bob@yourdomain.com" for usrloc-based aliases or
# make entries into "dbaliases" table for db-based aliases)
#
# cli:
# You have to provision the CLI as full SIP URI (AVP cli as type
# 0) for each user in the usr_preferences table (i.e. uuid='1234',
# username='', domain='', attribute='cli', type=0,
# value='sip:01234567@yourdomain.com').
#
# clir:
# You have to provision '1' to enable CLIR and '0' to disable it
# (AVP clir as type 1) for each user in the usr_preferences table
# (i.e. uuid='1234', username='', domain='',
attribute='clir',
# type=1, value='1').
#
# acc-db:
# You have to add the columns "src_leg" and "dst_leg" to your
# acc-table ("alter table acc add column src_leg varchar(128); alter
# table acc add column dst_leg varchar(128);").
#
########################################################################
########################################################################
# Configuration 'sip:wizard - Tue Jun 26 22:47:33 +0200 2007'
########################################################################
listen = udp::x.x.x.x:5060
mpath = "/usr/local/lib/openser/modules"
children = 8
debug = 3
fork = yes
group = "openser"
user = "openser"
disable_tcp = no
log_facility = LOG_DAEMON
log_stderror = yes
tcp_children = 4
mhomed = no
server_signature = yes
sock_group = "openser"
sock_mode = 0600
sock_user = "openser"
unix_sock = "/tmp/openser.sock"
unix_sock_children = 1
reply_to_via = no
sip_warning = no
check_via = no
dns = no
rev_dns = no
disable_core_dump = no
dns_try_ipv6 = yes
dns_use_search_list = yes
loadmodule "usrloc.so"
modparam("usrloc", "user_column", "username")
modparam("usrloc", "domain_column", "domain")
modparam("usrloc", "contact_column", "contact")
modparam("usrloc", "expires_column", "expires")
modparam("usrloc", "q_column", "q")
modparam("usrloc", "callid_column", "callid")
modparam("usrloc", "cseq_column", "cseq")
modparam("usrloc", "methods_column", "methods")
modparam("usrloc", "flags_column", "flags")
modparam("usrloc", "user_agent_column", "user_agent")
modparam("usrloc", "received_column", "received")
modparam("usrloc", "socket_column", "socket")
modparam("usrloc", "use_domain", 0)
modparam("usrloc", "desc_time_order", 0)
modparam("usrloc", "timer_interval", 60)
modparam("usrloc", "db_url",
"mysql://openser:xxxx@x.x.x.x/openser")
modparam("usrloc", "db_mode", 1)
modparam("usrloc", "matching_mode", 0)
modparam("usrloc", "cseq_delay", 20)
modparam("usrloc", "nat_bflag", 6)
loadmodule "registrar.so"
modparam("registrar", "default_expires", 3600)
modparam("registrar", "min_expires", 60)
modparam("registrar", "max_expires", 0)
modparam("registrar", "default_q", 0)
modparam("registrar", "append_branches", 1)
modparam("registrar", "case_sensitive", 0)
modparam("registrar", "received_param", "received")
modparam("registrar", "max_contacts", 0)
modparam("registrar", "retry_after", 0)
modparam("registrar", "method_filtering", 0)
modparam("registrar", "path_mode", 2)
modparam("registrar", "path_use_received", 0)
modparam("registrar", "received_avp", "$avp(i:801)")
loadmodule "rr.so"
modparam("rr", "enable_full_lr", 0)
modparam("rr", "append_fromtag", 1)
modparam("rr", "enable_double_rr", 1)
modparam("rr", "add_username", 0)
loadmodule "tm.so"
modparam("tm", "fr_timer", 30)
modparam("tm", "fr_inv_timer", 120)
modparam("tm", "wt_timer", 5)
modparam("tm", "delete_timer", 2)
modparam("tm", "noisy_ctimer", 0)
modparam("tm", "ruri_matching", 1)
modparam("tm", "via1_matching", 1)
modparam("tm", "unix_tx_timeout", 2)
modparam("tm", "restart_fr_on_each_reply", 1)
modparam("tm", "pass_provisional_replies", 0)
loadmodule "xlog.so"
modparam("xlog", "buf_size", 4096)
modparam("xlog", "force_color", 0)
loadmodule "mi_fifo.so"
modparam("mi_fifo", "fifo_name", "/tmp/openser_fifo")
modparam("mi_fifo", "fifo_mode", 0660)
modparam("mi_fifo", "fifo_group", "openser")
modparam("mi_fifo", "fifo_user", "openser")
modparam("mi_fifo", "reply_dir", "/tmp/")
modparam("mi_fifo", "reply_indent", "\t")
loadmodule "domain.so"
modparam("domain", "db_url",
"mysql://openser:xxxx@x.x.x.x/openser")
modparam("domain", "db_mode", 1)
modparam("domain", "domain_table", "domain")
modparam("domain", "domain_col", "domain")
loadmodule "nathelper.so"
modparam("nathelper", "natping_interval", 0)
modparam("nathelper", "ping_nated_only", 1)
modparam("nathelper", "rtpproxy_sock",
"unix:/var/run/rtpproxy.sock")
modparam("nathelper", "rtpproxy_disable", 1)
modparam("nathelper", "rtpproxy_disable_tout", 60)
modparam("nathelper", "rtpproxy_tout", 1)
modparam("nathelper", "rtpproxy_retr", 5)
modparam("nathelper", "sipping_method", "OPTIONS")
modparam("nathelper", "received_avp", "$avp(i:801)")
loadmodule "textops.so"
loadmodule "mediaproxy.so"
modparam("mediaproxy", "mediaproxy_socket",
"/var/run/proxydispatcher.sock")
modparam("mediaproxy", "sip_asymmetrics",
"/etc/openser/sip-asymmetric-clients")
modparam("mediaproxy", "rtp_asymmetrics",
"/etc/openser/rtp-asymmetric-clients")
modparam("mediaproxy", "natping_interval", 60)
loadmodule "uri.so"
loadmodule "sl.so"
modparam("sl", "enable_stats", 1)
loadmodule "maxfwd.so"
modparam("maxfwd", "max_limit", 256)
loadmodule "mysql.so"
modparam("mysql", "ping_interval", 300)
modparam("mysql", "auto_reconnect", 1)
loadmodule "auth.so"
modparam("auth", "nonce_expire", 300)
modparam("auth", "rpid_suffix",
";party=calling;id-type=subscriber;screen=yes")
modparam("auth", "rpid_avp", "$avp(s:rpid)")
loadmodule "auth_db.so"
modparam("auth_db", "db_url",
"mysql://openser:xxxx@x.x.x.x/openser")
modparam("auth_db", "user_column", "username")
modparam("auth_db", "domain_column", "domain")
modparam("auth_db", "password_column", "password")
modparam("auth_db", "password_column_2", "ha1b")
modparam("auth_db", "calculate_ha1", 1)
modparam("auth_db", "use_domain", 0)
modparam("auth_db", "load_credentials",
"$avp(s:caller_uuid)=uuid")
loadmodule "uri_db.so"
modparam("uri_db", "db_url",
"mysql://openser:xxxx@x.x.x.x/openser")
modparam("uri_db", "uri_table", "uri")
modparam("uri_db", "uri_user_column", "username")
modparam("uri_db", "uri_domain_column", "domain")
modparam("uri_db", "uri_uriuser_column", "uri_user")
modparam("uri_db", "subscriber_table", "subscriber")
modparam("uri_db", "subscriber_user_column", "username")
modparam("uri_db", "subscriber_domain_column", "domain")
modparam("uri_db", "use_uri_table", 0)
modparam("uri_db", "use_domain", 0)
loadmodule "avpops.so"
modparam("avpops", "db_url",
"mysql://openser:xxxx@x.x.x.x/openser")
modparam("avpops", "avp_table", "usr_preferences")
modparam("avpops", "use_domain", 0)
modparam("avpops", "uuid_column", "uuid")
modparam("avpops", "username_column", "username")
modparam("avpops", "domain_column", "domain")
modparam("avpops", "attribute_column", "attribute")
modparam("avpops", "value_column", "value")
modparam("avpops", "type_column", "type")
loadmodule "permissions.so"
modparam("permissions", "default_allow_file",
"permissions.allow")
modparam("permissions", "default_deny_file",
"permissions.deny")
modparam("permissions", "check_all_branches", 1)
modparam("permissions", "allow_suffix", ".allow")
modparam("permissions", "deny_suffix", ".deny")
modparam("permissions", "db_url",
"mysql://openser:xxxx@x.x.x.x/openser")
modparam("permissions", "db_mode", 1)
modparam("permissions", "trusted_table", "trusted")
modparam("permissions", "source_col", "src_ip")
modparam("permissions", "proto_col", "proto")
modparam("permissions", "from_col", "from_pattern")
modparam("permissions", "tag_col", "tag")
modparam("permissions", "peer_tag_avp", "s:peer_uuid")
loadmodule "lcr.so"
modparam("lcr", "db_url",
"mysql://openser:xxxx@x.x.x.x/openser")
modparam("lcr", "gw_table", "gw")
modparam("lcr", "gw_name_column", "gw_name")
modparam("lcr", "ip_addr_column", "ip_addr")
modparam("lcr", "port_column", "port")
modparam("lcr", "uri_scheme_column", "uri_scheme")
modparam("lcr", "transport_column", "transport")
modparam("lcr", "grp_id_column", "grp_id")
modparam("lcr", "lcr_table", "lcr")
modparam("lcr", "strip_column", "strip")
modparam("lcr", "prefix_column", "prefix")
modparam("lcr", "from_uri_column", "from_uri")
modparam("lcr", "priority_column", "priority")
modparam("lcr", "gw_uri_avp", "1400")
modparam("lcr", "ruri_user_avp", "1402")
modparam("lcr", "contact_avp", "1401")
modparam("lcr", "fr_inv_timer_avp", "s:fr_inv_timer_avp")
modparam("lcr", "fr_inv_timer", 90)
modparam("lcr", "fr_inv_timer_next", 30)
modparam("lcr", "rpid_avp", "s:rpid")
loadmodule "alias_db.so"
modparam("alias_db", "db_url",
"mysql://openser:xxxx@x.x.x.x/openser")
modparam("alias_db", "user_column", "username")
modparam("alias_db", "domain_column", "domain")
modparam("alias_db", "alias_user_column", "alias_username")
modparam("alias_db", "alias_domain_column", "alias_domain")
modparam("alias_db", "use_domain", 0)
loadmodule "uac.so"
modparam("uac", "rr_store_param", "vsf")
modparam("uac", "from_restore_mode", "auto")
modparam("uac", "from_passwd", "s1p:Wiz4rd!")
#loadmodule "acc.so"
#modparam("acc", "early_media", 0)
#modparam("acc", "failed_transaction_flag", 24)
#modparam("acc", "report_ack", 0)
#modparam("acc", "report_cancels", 0)
#modparam("acc", "log_flag", 0)
#modparam("acc", "log_missed_flag", 0)
#modparam("acc", "log_level", 2)
loadmodule "auth_radius.so"
loadmodule "group_radius.so"
loadmodule "avp_radius.so"
modparam("auth_radius|group_radius|avp_radius",
"radius_config","/etc/radiusclient-ng/radiusclient.conf")
loadmodule "acc.so"
modparam("acc", "failed_transaction_flag", 1)
modparam("acc", "report_cancels", 0)
modparam("acc", "report_ack", 0)
modparam("acc", "early_media", 0)
modparam("acc", "log_level", 1)
modparam("acc", "log_flag", 1)
modparam("acc", "log_missed_flag", 1)
modparam("acc", "db_flag", 25)
modparam("acc", "db_missed_flag", 0)
modparam("acc", "db_table_acc", "acc")
modparam("acc", "db_table_missed_calls", "missed_calls")
modparam("acc", "db_url",
"mysql://openser:xxxx@x.x.x.x/openser")
modparam("acc", "acc_method_column", "method")
modparam("acc", "acc_callid_column", "callid")
modparam("acc", "acc_time_column", "time")
modparam("acc", "acc_totag_column", "to_tag")
modparam("acc", "acc_from_tag_column", "from_tag")
modparam("acc", "detect_direction", 1)
modparam("acc", "acc_sip_code_column", "sip_code")
modparam("acc", "acc_sip_reason_column", "sip_reason")
#modparam("acc", "multi_leg_info",
"leg_src=$avp(i:901);leg_dst=$avp(i:902)")
modparam("acc", "radius_config",
"/etc/radiusclient-ng/radiusclient.conf")
modparam("acc", "radius_flag", 1)
modparam("acc", "radius_missed_flag", 1)
#modparam("acc", "multi_leg_info",
"RAD_LEG_SRC=$avp(i:901);RAD_LEG_SRC=$avp(i:902)")
modparam("acc", "radius_extra", "Sip-RPid=$avp(s:rpid); \
Source-IP=$si; \
Source-Port=$sp; \
Canonical-URI=$ru; \
Billing-Party=$avp(s:billingparty); \
Divert-Reason=$avp(s:divert_reason); \
X-RTP-Stat=$avp(s:rtp_statistics); \
From-Header=$hdr(from); \
User-Agent=$hdr(user-agent); \
Contact=$hdr(contact); \
Calling-Station-Id=$fu; \
Called-Station-Id=$rU; \
Event=$hdr(event); \
SIP-Proxy-IP=$avp(s:sip_proxy_ip)")
# Billing-Party=$avp(s:caller_uuid); \
loadmodule "siptrace.so"
modparam("siptrace", "trace_flag", 0)
modparam("siptrace", "db_url",
"mysql://openser:xxxx@x.x.x.x/openser")
modparam("siptrace", "trace_on", 1)
modparam("siptrace", "table", "sip_trace")
modparam("siptrace", "duplicate_uri", "sip:x.x.x.x:5888")
########################################################################
# Request route 'main'
########################################################################
route[0]
{
sip_trace(); #ajp sip trace to database
xlog("L_INFO", "New request - M=$rm RURI=$ru F=$fu T=$tu IP=$si
ID=$ci\n");
force_rport();
if(msg:len > max_len)
{
xlog("L_INFO", "Message too big - M=$rm RURI=$ru F=$fu T=$tu
IP=$si ID=$ci\n");
sl_send_reply("513", "Message Too Big");
exit;
}
if (!mf_process_maxfwd_header("10"))
{
xlog("L_INFO", "Too many hops - M=$rm RURI=$ru F=$fu T=$tu
IP=$si ID=$ci\n");
sl_send_reply("483", "Too Many Hops");
exit;
}
if(!is_method("REGISTER"))
{
if(nat_uac_test("19"))
{
record_route(";nat=yes");
}
else
{
record_route();
}
}
if(is_method("CANCEL") || is_method("BYE"))
{
setflag(1);
end_media_session();
}
if(loose_route())
{
if(!has_totag())
{
xlog("L_INFO", "Initial loose-routing rejected - M=$rm
RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
sl_send_reply("403", "Initial Loose-Routing
Rejected");
exit;
}
if(nat_uac_test("19") || search("^Route:.*;nat=yes"))
{
fix_nated_contact();
setbflag(6);
}
if(is_method("BYE"))
{
setflag(24); # account failed transactions
setflag(25); # account successful transactions
}
# mark as loose-routed for acc
setflag(26);
route(12);
}
if(is_method("REGISTER"))
{
route(11);
}
setflag(24); # account failed transactions
setflag(25); # account successful transactions
if(is_method("INVITE"))
{
route(13);
}
if(is_method("CANCEL") || is_method("ACK"))
{
route(17);
}
route(18);
}
########################################################################
# Request route 'clear-usr-preferences-caller'
########################################################################
route[1]
{
xlog("L_INFO", "Clear caller preferences - M=$rm RURI=$ru F=$fu
T=$tu IP=$si ID=$ci\n");
avp_delete("$avp(s:caller_cli)/g");
avp_delete("$avp(s:clir)/g");
}
########################################################################
# Request route 'clear-usr-preferences-callee'
########################################################################
route[2]
{
xlog("L_INFO", "Clear callee preferences - M=$rm RURI=$ru F=$fu
T=$tu IP=$si ID=$ci\n");
avp_delete("$avp(s:cfu)/g");
avp_delete("$avp(s:cfc)/g");
}
########################################################################
# Request route 'usr-preferences-caller'
########################################################################
route[3]
{
route(1);
xlog("L_INFO", "Load caller preferences for uuid
'$avp(s:caller_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
# load caller avps
avp_db_load("$avp(s:caller_uuid)", "*");
avp_copy("$avp(s:cli)", "$avp(s:caller_cli)/d");
if(is_avp_set("$avp(s:clir)/n") &&
avp_check("$avp(s:clir)",
"eq/i:1"))
{
# mark for anonymization
setflag(28);
}
}
########################################################################
# Request route 'usr-preferences-callee'
########################################################################
route[4]
{
xlog("L_INFO", "Load callee preferences for uuid
'$avp(s:callee_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
# load callee avps
avp_db_load("$avp(s:callee_uuid)", "*");
if(is_avp_set("$avp(s:cfu)/s"))
{
xlog("L_INFO", "Call-forward-unconditional to
'$avp(s:cfu)'
found - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(8);
avp_delete("$avp(s:caller_uuid)/g");
avp_copy("$avp(s:callee_uuid)", "$avp(s:caller_uuid)/d");
avp_pushto("$ru", "$avp(s:cfu)");
route(3);
route(14);
exit;
}
}
########################################################################
# Request route 'acc-caller'
########################################################################
route[5]
{
xlog("L_INFO", "Setting acc source-leg for uuid
'$avp(s:caller_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
avp_printf("$avp(i:901)",
"$avp(s:caller_uuid)|$avp(s:acc_caller_user)|$avp(s:acc_caller_domain)|$
avp(s:acc_state)");
}
########################################################################
# Request route 'acc-callee'
########################################################################
route[6]
{
xlog("L_INFO", "Setting acc destination-leg for uuid
'$avp(s:callee_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
avp_printf("$avp(i:902)",
"$avp(s:callee_uuid)|$avp(s:acc_callee_user)|$avp(s:acc_callee_domain)")
;
}
########################################################################
# Request route 'acc-failure'
########################################################################
route[7]
{
xlog("L_INFO", "Accounting failed request for uuid
'$avp(s:caller_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(5);
route(6);
resetflag(24);
acc_db_request("404", "acc");
}
########################################################################
# Request route 'cfu-acc'
########################################################################
route[8]
{
$avp(s:acc_callee_user) = $rU;
$avp(s:acc_callee_domain) = $rd;
route(5);
route(6);
avp_delete("$avp(s:acc_caller_user)");
avp_delete("$avp(s:acc_caller_domain)");
avp_copy("$avp(s:acc_callee_user)", "$avp(s:acc_caller_user)");
avp_copy("$avp(s:acc_callee_domain)",
"$avp(s:acc_caller_domain)");
avp_delete("$avp(s:acc_state)/g");
$avp(s:acc_state) = "cfu";
}
########################################################################
# Request route 'clir'
########################################################################
route[9]
{
if(isflagset(28) && !isflagset(27))
{
setflag(27);
xlog("L_INFO", "Anonymize caller - M=$rm RURI=$ru F=$fu
T=$tu IP=$si ID=$ci\n");
uac_replace_from("Anonymous","sip:anonymous@anonymous.invalid");
if(is_present_hf("Privacy"))
{
remove_hf("Privacy");
}
append_hf("Privacy: id\r\n");
}
}
########################################################################
# Request route 'stop-media-proxy'
########################################################################
route[10]
{
if(isflagset(22))
{
end_media_session();
}
}
########################################################################
# Request route 'base-route-register'
########################################################################
route[11]
{
sl_send_reply("100", "Trying");
if(!www_authorize("", "subscriber") &&
!radius_www_authorize(""))
#if(!radius_www_authorize("proxy-ca.thinksimplicity.net"))
{
xlog("L_INFO", "Register authentication failed - M=$rm
RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
www_challenge("", "0");
exit;
}
if(!check_to())
{
xlog("L_INFO", "Spoofed To-URI detected - M=$rm RURI=$ru
F=$fu T=$tu IP=$si ID=$ci\n");
sl_send_reply("403", "Spoofed To-URI Detected");
exit;
}
consume_credentials();
if(!search("^Contact:[ ]*\*") && nat_uac_test("19"))
{
fix_nated_register();
setbflag(6);
}
if(!save("location"))
{
xlog("L_ERR", "Saving contact failed - M=$rm RURI=$ru F=$fu
T=$tu IP=$si ID=$ci\n");
sl_reply_error();
exit;
}
xlog("L_INFO", "Registration successful - M=$rm RURI=$ru F=$fu
T=$tu IP=$si ID=$ci\n");
exit;
}
########################################################################
# Request route 'base-outbound'
########################################################################
route[12]
{
if(is_present_hf("P-Asserted-Identity"))
{
remove_hf("P-Asserted-Identity");
}
if(is_present_hf("Remote-Party-ID"))
{
remove_hf("Remote-Party-ID");
}
if(is_avp_set("$avp(s:caller_cli)/s"))
{
if(!isflagset(28))
{
xlog("L_INFO", "Set caller CLI
'$avp(s:caller_cli)' -
M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
append_hf("P-Asserted-Identity:
<$avp(s:caller_cli)>\r\n");
append_hf("Remote-Party-ID:
<$avp(s:caller_cli)>;party=caller;privacy=none;screen=yes\r\n");
}
}
route(9);
if(isbflagset(6))
{
if(!isflagset(22) && !search("^Content-Length:[ ]*0"))
{
setflag(22);
use_media_proxy();
}
t_on_reply("2");
}
else
{
t_on_reply("1");
}
if(!isflagset(21))
{
t_on_failure("2");
if(!isflagset(26))
{
$avp(s:acc_callee_user) = $rU;
$avp(s:acc_callee_domain) = $rd;
route(5);
route(6);
}
}
if(isflagset(29))
{
append_branch();
}
if(is_present_hf("Proxy-Authorization"))
{
consume_credentials();
}
xlog("L_INFO", "Request leaving server, D-URI='$du' - M=$rm
RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
# no 100 (we already sent it) and no DNS blacklisting
if(!t_relay("0x05"))
{
sl_reply_error();
if(is_method("INVITE") && isbflagset(6))
{
end_media_session();
}
}
exit;
}
########################################################################
# Request route 'base-route-invite'
########################################################################
route[13]
{
sl_send_reply("100", "Trying");
if(from_gw())
{
$avp(s:caller_uuid) = "0";
xlog("L_INFO", "Call from PSTN' - M=$rm RURI=$ru F=$fu
T=$tu
IP=$si ID=$ci\n");
#setflag(1);
setflag(23);
}
else
{
if(allow_trusted())
{
if(is_avp_set("$avp(s:peer_uuid)/s"))
{
# use tag-column from trusted-table as uuid for
this caller
avp_copy("$avp(s:peer_uuid)",
"$avp(s:caller_uuid)/d");
}
else
{
# if no uuid is set, use "0" as default uuid
$avp(s:caller_uuid) = "0";
}
xlog("L_INFO", "Call from trusted peer with uuid
'$avp(s:caller_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
if(!is_domain_local("$rd"))
{
xlog("L_INFO", "Rejecting peering attempt with
non-local request domain - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
sl_send_reply("403", "Relaying Denied");
exit;
}
setflag(23);
}
}
#else
#{
########AJP - Radius Authorization
#if (!radius_proxy_authorize(""))
#{
# xlog("L_INFO", "Route authentication failed - M=$rm RURI=$ru
F=$fu T=$tu IP=$si ID=$ci\n");
# proxy_challenge("", "0");
#}
#if(!check_from())
#{
# xlog("L_INFO", "Spoofed To-URI detected - M=$rm RURI=$ru
F=$fu T=$tu IP=$si ID=$ci\n");
# sl_send_reply("403", "Spoofed To-URI Detected");
#}
#consume_credentials();
#########
#}
$avp(s:acc_caller_user) = $fU;
$avp(s:acc_caller_domain) = $fd;
$avp(s:acc_state) = "call";
#setflag(1);
#$avp(s:sip-proxy) = "x.x.x.x";
#$avp($ru) = "can_uri";
route(3);
if(nat_uac_test("19"))
{
fix_nated_contact();
setbflag(6);
}
route(14);
}
########################################################################
# Request route 'invite-find-callee'
########################################################################
route[14]
{
if(lookup("aliases"))
{
xlog("L_INFO", "Callee was aliased - M=$rm RURI=$ru F=$fu
T=$tu IP=$si ID=$ci\n");
}
route(2);
if(!is_domain_local("$rd"))
{
setflag(20);
$avp(s:callee_uuid) = "0";
route(16);
}
#######ajp - Strip 1 for possible local numbers
if (uri=~"^sip:1[0-9]{10}@")
{
strip(1);
}
avp_delete("$avp(s:callee_uuid)");
avp_db_query("select uuid from subscriber where username =
'$rU'",
"$avp(s:callee_uuid)");
if(is_avp_set("$avp(s:callee_uuid)/s"))
{
xlog("L_INFO", "Callee is local,
uuid='$avp(s:callee_uuid)'
- M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(15);
}
else
{
$avp(s:callee_uuid) = "0";
xlog("L_INFO", "Callee is not local - M=$rm RURI=$ru F=$fu
T=$tu IP=$si ID=$ci\n");
route(16);
}
exit;
}
########################################################################
# Request route 'invite-to-internal'
########################################################################
route[15]
{
route(4);
if(!lookup("location"))
{
xlog("L_INFO", "Local user offline - M=$rm RURI=$ru F=$fu
T=$tu IP=$si ID=$ci\n");
$avp(s:acc_callee_user) = $rU;
$avp(s:acc_callee_domain) = $rd;
route(7);
sl_send_reply("404", "User Offline");
}
else
{
xlog("L_INFO", "Local user online - M=$rm RURI=$ru F=$fu
T=$tu IP=$si ID=$ci\n");
avp_delete("$avp(s:caller_uuid)/g"); #ajp - This call is
billed to receiving party.
avp_copy("$avp(s:callee_uuid)", "$avp(s:caller_uuid)/d");
$avp(s:billingparty) = "inbound";
#avp_delete("$avp(s:caller_uuid)"); #ajp - billed to
internal user
#avp_db_query("select uuid from subscriber where username =
'$tU'", "$avp(s:caller_uuid)"); #ajp
#$avp(s:billingparty) = $avp(s:caller_uuid);
$avp(s:sip_proxy_ip) = "x.x.x.x";
setflag(1); #accounting
route(12);
}
exit;
}
########################################################################
# Request route 'invite-to-external'
########################################################################
route[16]
{
if(isflagset(20))
{
xlog("L_INFO", "Call to foreign domain - M=$rm RURI=$ru
F=$fu T=$tu IP=$si ID=$ci\n");
route(12);
exit;
}
if(!isflagset(23))
{
# don't allow calls relaying from PSTN to PSTN, if not
explicitely forwarded
if(uri =~ "^sip:[0-9]+@")
{
# only route numeric users to PSTN
#ajp-normalize the call
if(uri =~ "^sip:[0-9]{10}+@") #ajp- North Americal local
numbers prefix with 1
{
prefix("1");
}
if(uri =~ "^sip:001[0-9]*@") #ajp- Europe dial to North
America
{
strip(2);
}
if(uri =~ "^sip:00[0-9]*@") #ajp- International Calling from
Europe
{
strip(2);
}
if(uri =~ "^sip:011[0-9]*@") #ajp- International Calling
from North America
{
strip(3);
}
#ajp-accounting
#$avp(s:acc_caller_uuid) = $rU; #ajp
avp_delete("$avp(s:callee_uuid)"); #ajp
avp_db_query("select uuid from subscriber where
username = '$fU'", "$avp(s:callee_uuid)"); #ajp
$avp(s:billingparty) = $avp(s:callee_uuid);
$avp(s:sip_proxy_ip) = "x.x.x.x"; #ajp accounting
if(!load_gws())
{
xlog("L_ERR", "Error loading PSTN gateways -
M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
sl_send_reply("503", "PSTN Termination Currently
Unavailable");
exit;
}
if(!next_gw())
{
xlog("L_ERR", "No PSTN gateways available -
M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
sl_send_reply("503", "PSTN Termination Currently
Unavailable");
exit;
}
setflag(21);
setflag(1);
t_on_failure("1");
route(12);
}
}
xlog("L_INFO", "Call to unknown user - M=$rm RURI=$ru F=$fu T=$tu
IP=$si ID=$ci\n");
route(7);
sl_send_reply("404", "User Not Found");
exit;
}
########################################################################
# Request route 'base-route-local'
########################################################################
route[17]
{
t_on_reply("1");
if(t_check_trans())
{
xlog("L_INFO", "Request leaving server - M=$rm RURI=$ru
F=$fu T=$tu IP=$si ID=$ci\n");
if(!t_relay())
{
sl_reply_error();
}
}
else
{
xlog("L_INFO", "Dropping mis-routed request - M=$rm RURI=$ru
F=$fu T=$tu IP=$si ID=$ci\n");
}
exit;
}
########################################################################
# Request route 'base-route-generic'
########################################################################
route[18]
{
xlog("L_INFO", "Method not supported - M=$rm RURI=$ru F=$fu T=$tu
IP=$si ID=$ci\n");
sl_send_reply("501", "Method Not Supported Here");
exit;
}
########################################################################
# Request route 'base-filter-failover'
########################################################################
route[19]
{
if(!t_check_status("408|500|503"))
{
xlog("L_INFO", "No failover routing needed for this response
code - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(10);
exit;
}
}
########################################################################
# Reply route 'base-standard-reply'
########################################################################
onreply_route[1]
{
xlog("L_INFO", "Reply - S=$rs D=$rr F=$fu T=$tu IP=$si
ID=$ci\n");
exit;
}
########################################################################
# Reply route 'base-nat-reply'
########################################################################
onreply_route[2]
{
xlog("L_INFO", "NAT-Reply - S=$rs D=$rr F=$fu T=$tu IP=$si
ID=$ci\n");
if(nat_uac_test("1"))
{
fix_nated_contact();
}
if(isbflagset(6) && status=~"(180)|(183)|2[0-9][0-9]")
{
if(!search("^Content-Length:[ ]*0"))
{
use_media_proxy();
}
}
exit;
}
########################################################################
# Failure route 'pstn-failover'
########################################################################
failure_route[1]
{
xlog("L_INFO", "Failure route for PSTN entered - M=$rm RURI=$ru
F=$fu T=$tu IP=$si ID=$ci\n");
route(19);
if(!next_gw())
{
xlog("L_ERR", "Failed to select next PSTN gateway - M=$rm
RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(10);
exit;
}
t_on_failure("1");
route(12);
}
########################################################################
# Failure route 'base-standard-failure'
########################################################################
failure_route[2]
{
if(t_check_status("422|481|487"))
{
xlog("L_INFO", "Final reply - M=$rm RURI=$ru F=$fu T=$tu
IP=$si ID=$ci\n");
route(10);
exit;
}
t_on_branch("1");
xlog("L_INFO", "Redirect from UAC intercepted - M=$rm RURI=$ru
F=$fu T=$tu IP=$si ID=$ci\n");
route(14);
if($avp(s:cfc) != NULL)
{
avp_delete("$avp(s:acc_caller_user)/g");
avp_delete("$avp(s:acc_caller_domain)/g");
avp_delete("$avp(s:acc_state)/g");
avp_copy("$avp(s:acc_callee_user)",
"$avp(s:acc_caller_user)");
avp_copy("$avp(s:acc_callee_domain)",
"$avp(s:acc_caller_domain)");
$avp(s:acc_state) = "cfc";
avp_pushto("$ru", "$avp(s:cfc)");
setflag(29);
append_branch();
t_on_branch("1");
xlog("L_INFO", "CFC detected - M=$rm RURI=$ru F=$fu T=$tu
IP=$si ID=$ci\n");
route(14);
}
route(19);
route(10);
}
########################################################################
# Branch route 'cfc-drop-local'
########################################################################
branch_route[1]
{
if(is_domain_local("$rd"))
{
xlog("L_INFO", "Dropping local branch - M=$rm RURI=$ru F=$fu
T=$tu IP=$si ID=$ci\n");
drop();
}
}