Hi, I have found a few posts on this error from Google but none of the solutions works. I am able to use radius_proxy_authorize for REGISTER request without problem. But when I use radius_proxy_authorize for INVITE, Opensers can't authroize it. I have tried:
radius_proxy_authorize("192.168.1.104")) proxy_authorize("192.168.1.104","subscriber") radius_proxy_authorize("")) proxy_authorize("","subscriber")
I have been stuck with this for days already and I truely hope someone can tell me what could be wrong with my setup. I am pretty much in a stage of desperation right now. Thanks in advance for all your help.
Here are the relevant lines in openser.cfg: #if (!radius_proxy_authorize("192.168.1.104")) { if (!proxy_authorize("192.168.1.104","subscriber")) { www_challenge("192.168.1.104","1"); exit; }
Here is the openser debug log, I have highlighted the part that proxy_authorize throws error:
Jun 1 05:37:16 [29028] DBG:core:parse_msg: SIP Request: Jun 1 05:37:16 [29028] DBG:core:parse_msg: method: <INVITE> Jun 1 05:37:16 [29028] DBG:core:parse_msg: uri: < sip:1006@192.168.1.104 sip%3A1006@192.168.1.104> Jun 1 05:37:16 [29028] DBG:core:parse_msg: version: <SIP/2.0> Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=2 Jun 1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232, <branch> = <z9hG4bK-f072f593>; state=16 Jun 1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5 Jun 1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2 Jun 1 05:37:16 [29028] DBG:core:parse_headers: this is the first via Jun 1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg... Jun 1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing scripts... Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=8 Jun 1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=10 Jun 1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={ sip:1006@192.168.1.104 sip%3A1006@192.168.1.104} Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [33]; uri=[ sip:1006@192.168.1.104 sip%3A1006@192.168.1.104] Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" < sip:1006@192.168.1.104 sip%3A1006@192.168.1.104> ] Jun 1 05:37:16 [29028] DBG:core:pv_get_to_attr: no To tag Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: cseq <CSeq>: <101> <INVITE> Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: content_length=393 Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: found end of header Jun 1 05:37:16 [29028] DBG:core:parse_to_param: tag=39a9124ca59076d9o0 Jun 1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29 Jun 1 05:37:16 [29028] DBG:core:parse_to: display={"1005"}, ruri={ sip:1005@192.168.1.104 sip%3A1005@192.168.1.104} Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=14000 Jun 1 05:37:16 [29028] DBG:core:pv_get_authattr: no [Proxy-]Authorization header Sun Jun 1 05:37:16 2008-192.168.1.101::method <INVITE> r-uri < sip:1006@192.168.1.104 sip%3A1006@192.168.1.104> to-tag <<null>> 2nd via <<null>> to-header <sip:1006@192.168.1.104 sip%3A1006@192.168.1.104> from-header <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104> auth-user <<null>> Jun 1 05:37:16 [29028] DBG:maxfwd:is_maxfwd_present: value = 70 Jun 1 05:37:16 [29028] DBG:core:check_via_address: params 192.168.1.101, 192.168.1.101, 0 Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=80 before fix nated contact Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=80
Jun 1 05:37:16 [29028] DBG:uri:has_totag: no totag Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=78 Jun 1 05:37:16 [29028] DBG:tm:t_lookup_request: start searching: hash=59293, isACK=0 Jun 1 05:37:16 [29028] DBG:tm:matching_3261: RFC3261 transaction matching failed Jun 1 05:37:16 [29028] DBG:tm:t_lookup_request: no transaction found
Jun 1 05:37:16 [29028] DBG:domain:is_domain_local: Realm '192.168.1.104' is local Jun 1 05:37:16 [29028] DBG:core:db_free_rows: freeing 1 rows Jun 1 05:37:16 [29028] DBG:core:db_free_rows: row[0]=0x81a1c28 Jun 1 05:37:16 [29028] DBG:core:db_free_rows: 0x81a1c28=pkg_free() RES_ROWS
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=10000 Jun 1 05:37:16 [29028] DBG:auth:pre_auth: credentials with given realm not found
Jun 1 05:37:16 [29028] DBG:auth:build_auth_hf: 'WWW-Authenticate: Digest realm="192.168.1.104", nonce="4841c6380fa8573a4e9794b1a0a2df9f3e53cb49", qop="auth" ' Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff Jun 1 05:37:16 [29028] DBG:core:check_via_address: params 192.168.1.101, 192.168.1.101, 0 Jun 1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list 0xb5bf9be0 Jun 1 05:37:16 [29028] DBG:core:receive_msg: cleaning up Jun 1 05:37:16 [29028] DBG:core:parse_msg: SIP Request: Jun 1 05:37:16 [29028] DBG:core:parse_msg: method: <ACK> Jun 1 05:37:16 [29028] DBG:core:parse_msg: uri: < sip:1006@192.168.1.104 sip%3A1006@192.168.1.104> Jun 1 05:37:16 [29028] DBG:core:parse_msg: version: <SIP/2.0> Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=2 Jun 1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232, <branch> = <z9hG4bK-f072f593>; state=16 Jun 1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5 Jun 1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2 Jun 1 05:37:16 [29028] DBG:core:parse_headers: this is the first via Jun 1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg... Jun 1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing scripts... Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=8 Jun 1 05:37:16 [29028] DBG:core:parse_to_param: tag=026ab2c49274b4e0186dd72188f7d50a.939a Jun 1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29 Jun 1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={ sip:1006@192.168.1.104 sip%3A1006@192.168.1.104} Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [75]; uri=[ sip:1006@192.168.1.104 sip%3A1006@192.168.1.104] Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" < sip:1006@192.168.1.104 sip%3A1006@192.168.1.104>] Jun 1 05:37:16 [29028] DBG:sl:sl_filter_ACK: local ACK found -> dropping it! Jun 1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list (nil) Jun 1 05:37:16 [29028] DBG:core:receive_msg: cleaning up Jun 1 05:37:16 [29028] DBG:core:parse_msg: SIP Request: Jun 1 05:37:16 [29028] DBG:core:parse_msg: method: <INVITE> Jun 1 05:37:16 [29028] DBG:core:parse_msg: uri: < sip:1006@192.168.1.104 sip%3A1006@192.168.1.104> Jun 1 05:37:16 [29028] DBG:core:parse_msg: version: <SIP/2.0> Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=2 Jun 1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232, <branch> = <z9hG4bK-dc12d56c>; state=16 Jun 1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5 Jun 1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2 Jun 1 05:37:16 [29028] DBG:core:parse_headers: this is the first via Jun 1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg... Jun 1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing scripts... Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=8 Jun 1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=10 Jun 1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={ sip:1006@192.168.1.104 sip%3A1006@192.168.1.104} Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [33]; uri=[ sip:1006@192.168.1.104 sip%3A1006@192.168.1.104] Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" < sip:1006@192.168.1.104 sip%3A1006@192.168.1.104> ] Jun 1 05:37:16 [29028] DBG:core:pv_get_to_attr: no To tag Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: cseq <CSeq>: <102> <INVITE> Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: content_length=393 Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: found end of header Jun 1 05:37:16 [29028] DBG:core:parse_to_param: tag=39a9124ca59076d9o0 Jun 1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29 Jun 1 05:37:16 [29028] DBG:core:parse_to: display={"1005"}, ruri={ sip:1005@192.168.1.104 sip%3A1005@192.168.1.104} Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=14000 Sun Jun 1 05:37:16 2008-192.168.1.101::method <INVITE> r-uri < sip:1006@192.168.1.104 sip%3A1006@192.168.1.104> to-tag <<null>> 2nd via <<null>> to-header <sip:1006@192.168.1.104 sip%3A1006@192.168.1.104> from-header <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104> auth-user <1005> Jun 1 05:37:16 [29028] DBG:maxfwd:is_maxfwd_present: value = 70 Jun 1 05:37:16 [29028] DBG:core:check_via_address: params 192.168.1.101, 192.168.1.101, 0 Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=80
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=80
Jun 1 05:37:16 [29028] DBG:uri:has_totag: no totag Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=78 Jun 1 05:37:16 [29028] DBG:tm:t_lookup_request: start searching: hash=59290, isACK=0 Jun 1 05:37:16 [29028] DBG:tm:matching_3261: RFC3261 transaction matching failed Jun 1 05:37:16 [29028] DBG:tm:t_lookup_request: no transaction found
Jun 1 05:37:16 [29028] DBG:domain:is_domain_local: Realm '192.168.1.104' is local Jun 1 05:37:16 [29028] DBG:core:db_free_rows: freeing 1 rows Jun 1 05:37:16 [29028] DBG:core:db_free_rows: row[0]=0x81a1c28 Jun 1 05:37:16 [29028] DBG:core:db_free_rows: 0x81a1c28=pkg_free() RES_ROWS
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=10000 Jun 1 05:37:16 [29028] DBG:auth:pre_auth: credentials with given realm not found
Jun 1 05:37:16 [29028] DBG:auth:build_auth_hf: 'WWW-Authenticate: Digest realm="192.168.1.104", nonce="4841c6380fa8573a4e9794b1a0a2df9f3e53cb49", qop="auth" ' Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff Jun 1 05:37:16 [29028] DBG:core:check_via_address: params 192.168.1.101, 192.168.1.101, 0 Jun 1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list 0xb5bf9be0 Jun 1 05:37:16 [29028] DBG:core:receive_msg: cleaning up Jun 1 05:37:16 [29028] DBG:core:parse_msg: SIP Request: Jun 1 05:37:16 [29028] DBG:core:parse_msg: method: <ACK> Jun 1 05:37:16 [29028] DBG:core:parse_msg: uri: < sip:1006@192.168.1.104 sip%3A1006@192.168.1.104> Jun 1 05:37:16 [29028] DBG:core:parse_msg: version: <SIP/2.0> Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=2 Jun 1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232, <branch> = <z9hG4bK-dc12d56c>; state=16 Jun 1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5 Jun 1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2 Jun 1 05:37:16 [29028] DBG:core:parse_headers: this is the first via Jun 1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg... Jun 1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing scripts... Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=8 Jun 1 05:37:16 [29028] DBG:core:parse_to_param: tag=026ab2c49274b4e0186dd72188f7d50a.6388 Jun 1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29 Jun 1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={ sip:1006@192.168.1.104 sip%3A1006@192.168.1.104} Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [75]; uri=[ sip:1006@192.168.1.104 sip%3A1006@192.168.1.104] Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" < sip:1006@192.168.1.104 sip%3A1006@192.168.1.104>] Jun 1 05:37:16 [29028] DBG:sl:sl_filter_ACK: local ACK found -> dropping it! Jun 1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list (nil) Jun 1 05:37:16 [29028] DBG:core:receive_msg: cleaning up
Here is the SIP trace:
U 192.168.1.101:5062 -> 192.168.1.104:5060 INVITE sip:1005@192.168.1.104 sip%3A1005@192.168.1.104 SIP/2.0. Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-d392c9a5. From: "1005" <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104>. Call-ID: a3888884-92d13124@192.168.1.101. CSeq: 101 INVITE. Max-Forwards: 70. Contact: "1005" sip:1005@192.168.1.101:5062. Expires: 240. User-Agent: Sipura/SPA921-4.1.10(b). Content-Length: 395. Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER. Content-Type: application/sdp. . v=0. o=- 36185 36185 IN IP4 192.168.1.101. s=-. c=IN IP4 192.168.1.101. t=0 0. m=audio 16424 RTP/AVP 0 2 4 8 18 96 97 98 101. a=rtpmap:0 PCMU/8000. a=rtpmap:2 G726-32/8000. a=rtpmap:4 G723/8000. a=rtpmap:8 PCMA/8000. a=rtpmap:18 G729a/8000. a=rtpmap:96 G726-40/8000. a=rtpmap:97 G726-24/8000. a=rtpmap:98 G726-16/8000. a=rtpmap:101 telephone-event/8000. a=fmtp:101 0-15. a=ptime:30. a=sendrecv.
U 192.168.1.104:5060 -> 192.168.1.101:5062 SIP/2.0 401 Unauthorized. Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-d392c9a5;rport=5062. From: "1005" <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=026ab2c49274b4e0186dd72188f7d50a.f608.
Call-ID: a3888884-92d13124@192.168.1.101. CSeq: 101 INVITE. WWW-Authenticate: Digest realm="192.168.1.104", nonce="4841caae665a98cec71734a5cf84c70d10ac8f63", qop="auth". Server: OpenSER (1.3.2-notls (i386/linux)). Content-Length: 0. .
U 192.168.1.101:5062 -> 192.168.1.104:5060 ACK sip:1005@192.168.1.104 sip%3A1005@192.168.1.104 SIP/2.0. Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-d392c9a5. From: "1005" <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=026ab2c49274b4e0186dd72188f7d50a.f608.
Call-ID: a3888884-92d13124@192.168.1.101. CSeq: 101 ACK. Max-Forwards: 70. Contact: "1005" sip:1005@192.168.1.101:5062. User-Agent: Sipura/SPA921-4.1.10(b). Content-Length: 0. .
U 192.168.1.101:5062 -> 192.168.1.104:5060 INVITE sip:1005@192.168.1.104 sip%3A1005@192.168.1.104 SIP/2.0. Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-4cf05fb6. From: "1005" <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104>. Call-ID: a3888884-92d13124@192.168.1.101. CSeq: 102 INVITE. Max-Forwards: 70. Authorization: Digest username="1005",realm="192.168.1.104 ",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri=" sip:1005@192.168.1.104 sip%3A1005@192.168.1.104 ",algorithm=MD5,response="e39bd9dc46a72ea191fca87e98cf9136",qop=auth,nc=00000001,cnonce="9d027a79". Contact: "1005" sip:1005@192.168.1.101:5062. Expires: 240. User-Agent: Sipura/SPA921-4.1.10(b). Content-Length: 395. Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER. Content-Type: application/sdp. . v=0. o=- 36185 36185 IN IP4 192.168.1.101. s=-. c=IN IP4 192.168.1.101. t=0 0. m=audio 16424 RTP/AVP 0 2 4 8 18 96 97 98 101. a=rtpmap:0 PCMU/8000. a=rtpmap:2 G726-32/8000. a=rtpmap:4 G723/8000. a=rtpmap:8 PCMA/8000. a=rtpmap:18 G729a/8000. a=rtpmap:96 G726-40/8000. a=rtpmap:97 G726-24/8000. a=rtpmap:98 G726-16/8000. a=rtpmap:101 telephone-event/8000. a=fmtp:101 0-15. a=ptime:30. a=sendrecv.
U 192.168.1.104:5060 -> 192.168.1.101:5062 SIP/2.0 401 Unauthorized. Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-4cf05fb6;rport=5062. From: "1005" <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=026ab2c49274b4e0186dd72188f7d50a.218e.
Call-ID: a3888884-92d13124@192.168.1.101. CSeq: 102 INVITE. WWW-Authenticate: Digest realm="192.168.1.104", nonce="4841caae665a98cec71734a5cf84c70d10ac8f63", qop="auth". Server: OpenSER (1.3.2-notls (i386/linux)). Content-Length: 0. .
U 192.168.1.101:5062 -> 192.168.1.104:5060 ACK sip:1005@192.168.1.104 sip%3A1005@192.168.1.104 SIP/2.0. Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-4cf05fb6. From: "1005" <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=026ab2c49274b4e0186dd72188f7d50a.218e.
Call-ID: a3888884-92d13124@192.168.1.101. CSeq: 102 ACK. Max-Forwards: 70. Authorization: Digest username="1005",realm="192.168.1.104 ",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri=" sip:1005@192.168.1.104 sip%3A1005@192.168.1.104 ",algorithm=MD5,response="dc66b568ed8ec48f0f405aa063156eaa",qop=auth,nc=00000001,cnonce="9d027a79". Contact: "1005" sip:1005@192.168.1.101:5062. User-Agent: Sipura/SPA921-4.1.10(b). Content-Length: 0. .
U 192.168.1.101:5062 -> 192.168.1.104:5060 INVITE sip:1005@192.168.1.104 sip%3A1005@192.168.1.104 SIP/2.0. Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-e2c260be. From: "1005" <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104>. Call-ID: a3888884-92d13124@192.168.1.101. CSeq: 103 INVITE. Max-Forwards: 70. Authorization: Digest username="1005",realm="192.168.1.104 ",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri=" sip:1005@192.168.1.104 sip%3A1005@192.168.1.104 ",algorithm=MD5,response="8d2b52278a72326a57361ec1ca2601c3",qop=auth,nc=00000001,cnonce="f4b6f3a0". Contact: "1005" sip:1005@192.168.1.101:5062. Expires: 240. User-Agent: Sipura/SPA921-4.1.10(b). Content-Length: 395. Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER. Content-Type: application/sdp. . v=0. o=- 36185 36185 IN IP4 192.168.1.101. s=-. c=IN IP4 192.168.1.101. t=0 0. m=audio 16424 RTP/AVP 0 2 4 8 18 96 97 98 101. a=rtpmap:0 PCMU/8000. a=rtpmap:2 G726-32/8000. a=rtpmap:4 G723/8000. a=rtpmap:8 PCMA/8000. a=rtpmap:18 G729a/8000. a=rtpmap:96 G726-40/8000. a=rtpmap:97 G726-24/8000. a=rtpmap:98 G726-16/8000. a=rtpmap:101 telephone-event/8000. a=fmtp:101 0-15. a=ptime:30. a=sendrecv.
U 192.168.1.104:5060 -> 192.168.1.101:5062 SIP/2.0 401 Unauthorized. Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-e2c260be;rport=5062. From: "1005" <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=026ab2c49274b4e0186dd72188f7d50a.8d8a.
Call-ID: a3888884-92d13124@192.168.1.101. CSeq: 103 INVITE. WWW-Authenticate: Digest realm="192.168.1.104", nonce="4841caae665a98cec71734a5cf84c70d10ac8f63", qop="auth". Server: OpenSER (1.3.2-notls (i386/linux)). Content-Length: 0. .
U 192.168.1.101:5062 -> 192.168.1.104:5060 ACK sip:1005@192.168.1.104 sip%3A1005@192.168.1.104 SIP/2.0. Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-e2c260be. From: "1005" <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=131fa1047c30f2a4o0.
To: <sip:1005@192.168.1.104 sip%3A1005@192.168.1.104
;tag=026ab2c49274b4e0186dd72188f7d50a.8d8a.
Call-ID: a3888884-92d13124@192.168.1.101. CSeq: 103 ACK. Max-Forwards: 70. Authorization: Digest username="1005",realm="192.168.1.104 ",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri=" sip:1005@192.168.1.104 sip%3A1005@192.168.1.104 ",algorithm=MD5,response="8ebde837f7c7c49f721d9f2c44b3797d",qop=auth,nc=00000001,cnonce="f4b6f3a0". Contact: "1005" sip:1005@192.168.1.101:5062. User-Agent: Sipura/SPA921-4.1.10(b). Content-Length: 0.