[Serusers] private ip registration error

varala ramakanth varala_kanth at yahoo.com
Sat May 29 14:44:55 CEST 2004


hello friends,

iam having the rel_0_8_12 running

when i am registering with windows messenger from a

nat client 

its ethereal report show that malformed sip packet

so whats the problem?

ser( 202.*.*.19)-->dhcp nat(202.*.*.252)-->private
ip(192.168.1.18)msn messenger 4.7 

please guide me

with reagards 
rama kanth

this is the log message iam getting when debug =8
***************************************************
6(3777) SIP Request:
 6(3777)  method:  <REGISTER>
 6(3777)  uri:     <sip:server.pol.net.in>
 6(3777)  version: <SIP/2.0>
 6(3777) parse_headers: flags=1
 6(3777) end of header reached, state=5
 6(3777) parse_headers: Via found, flags=1
 6(3777) parse_headers: this is the first via
 6(3777) After parse_msg...
 6(3777) preparing to run routing scripts...
 6(3777) DEBUG : is_maxfwd_present: searching for
max_forwards header
 6(3777) parse_headers: flags=128
 6(3777) DEBUG: is_maxfwd_present: value = 70
 6(3777) check_via_address(202.*.*.252, 192.168.1.18,
0)
 6(3777) LOG: Someone trying to register from private
IP, rewriting
 6(3777) parse_headers: flags=64
 6(3777) end of header reached, state=9
 6(3777) DEBUG: get_hdr_field: <To> [29];
uri=[sip:102 at server.pol.net.in]
 6(3777) DEBUG: to body [<sip:102 at server.pol.net.in>
]
 6(3777) get_hdr_field: cseq <CSeq>: <2> <REGISTER>
 6(3777) parse_headers: flags=256
 6(3777) DEBUG: get_hdr_body : content_length=0
 6(3777) found end of header
 6(3777) find_first_route(): No Route headers found
 6(3777) loose_route(): There is no Route HF
 6(3777) check_self - checking if host==us: 17==9 && 
[server.pol.net.in] == [127.0.0.1]
 6(3777) check_self - checking if port 5060 matches
port 5060
 6(3777) check_self - checking if host==us: 17==13 && 
[server.pol.net.in] == [202.*.*.19]
 6(3777) check_self - checking if port 5060 matches
port 5060
 6(3777) check_self - checking if host==us: 17==9 && 
[server.pol.net.in] == [127.0.0.1]
 6(3777) check_self - checking if port 5060 matches
port 5060
 6(3777) check_self - checking if host==us: 17==13 && 
[server.pol.net.in] == [202.*.*.19]
 6(3777) check_self - checking if port 5060 matches
port 5060
 6(3777) parse_headers: flags=-1
 6(3777) parse_headers: flags=-1
 6(3777) check_via_address(202.*.*.252, 192.168.1.18,
0)
 6(3777) receive_msg: cleaning up

*************************************************
the ethereal report is 
*************************************************

Frame 1 (544 bytes on wire, 544 bytes captured)
    Arrival Time: May 29, 2004 18:00:28.644433000
    Time delta from previous packet: 0.000000000
seconds
    Time relative to first packet: 0.000000000 seconds
    Frame Number: 1
    Packet Length: 544 bytes
    Capture Length: 544 bytes
Ethernet II, Src: 00:e0:2b:90:1f:00, Dst:
00:e0:18:ed:04:61
    Destination: 00:e0:18:ed:04:61 (Asustek__ed:04:61)
    Source: 00:e0:2b:90:1f:00 (Extreme__90:1f:00)
    Type: IP (0x0800)
Internet Protocol, Src Addr: 202.65.148.252
(202.65.148.252), Dst Addr: 202.65.128.19
(202.65.128.19)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00:
Default; ECN: 0x00)
        0000 00.. = Differentiated Services Codepoint:
Default (0x00)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 530
    Identification: 0xcc8e
    Flags: 0x00
        .0.. = Don't fragment: Not set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 125
    Protocol: UDP (0x11)
    Header checksum: 0xc5b9 (correct)
    Source: 202.*.*.252 (202.*.*.252)
    Destination: 202.*.*.19 (202.*.*.19)
User Datagram Protocol, Src Port: 61863 (61863), Dst
Port: 5060 (5060)
    Source port: 61863 (61863)
    Destination port: 5060 (5060)
    Length: 510
    Checksum: 0xde85 (correct)
Session Initiation Protocol
    Request line: REGISTER sip:server.pol.net.in
SIP/2.0
    Message Header
        Via: SIP/2.0/UDP 192.168.1.18:15992
        Max-Forwards: 70
        From:
<sip:102 at server.pol.net.in>;tag=ddb4f954b19811d8aafe00e01846e257;epid=b28b013e73
        To: <sip:102 at server.pol.net.in>
        Call-ID:
ddb4f955b19811d8aafe00e01846e257 at 192.168.1.18
        CSeq: 1 REGISTER
        Contact:
<sip:192.168.1.18:15992>;methods="INVITE, MESSAGE,
INFO, SUBSCRIBE, OPTIONS, BYE, CANCEL, NOTIFY, ACK,
REFER"
        User-Agent: RTC/1.2.4949
        Event: registration
        Allow-Events: presence
        Content-Length: 0

Frame 2 (687 bytes on wire, 687 bytes captured)
    Arrival Time: May 29, 2004 18:00:28.645466000
    Time delta from previous packet: 0.001033000
seconds
    Time relative to first packet: 0.001033000 seconds
    Frame Number: 2
    Packet Length: 687 bytes
    Capture Length: 687 bytes
Ethernet II, Src: 00:e0:18:ed:04:61, Dst:
00:e0:2b:90:1f:00
    Destination: 00:e0:2b:90:1f:00 (Extreme__90:1f:00)
    Source: 00:e0:18:ed:04:61 (Asustek__ed:04:61)
    Type: IP (0x0800)
Internet Protocol, Src Addr: 202.*.*.19 (202.*.*.19),
Dst Addr: 202.*.*.252 (202.*.*.252)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x10 (DSCP 0x04:
Unknown DSCP; ECN: 0x00)
        0001 00.. = Differentiated Services Codepoint:
Unknown (0x04)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 673
    Identification: 0x0000
    Flags: 0x04
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: UDP (0x11)
    Header checksum: 0x8ea9 (correct)
    Source: 202.*.*.19 (202.*.*.19)
    Destination: 202.*.*.252 (202.*.*.252)
User Datagram Protocol, Src Port: 5060 (5060), Dst
Port: 61863 (61863)
    Source port: 5060 (5060)
    Destination port: 61863 (61863)
    Length: 653
    Checksum: 0x7bd2 (correct)
Session Initiation Protocol
    Status line: SIP/2.0 200 OK
    Message Header
        Via: SIP/2.0/UDP
192.168.1.18:15992;rport=61863;received=202.65.148.252
        From:
<sip:102 at server.pol.net.in>;tag=ddb4f954b19811d8aafe00e01846e257;epid=b28b013e73
        To:
<sip:102 at server.pol.net.in>;tag=b27e1a1d33761e85846fc98f5f3a7e58.7f7e
        Call-ID:
ddb4f955b19811d8aafe00e01846e257 at 192.168.1.18
        CSeq: 1 REGISTER
        Contact:
<sip:202.*.*.252:61863>;q=0.00;expires=3600
        Server: Sip EXpress router (0.8.12-tcp_nonb
(i386/linux))
        Content-Length: 0
        Warning: 392 202.*.*.19:5060 "Noisy feedback
tells:  pid=3779 req_src_ip=202.*.*.252
req_src_port=61863 in_uri=sip:server.pol.net.in
out_uri=sip:server.pol.net.in via_cnt==1"

Frame 3 (46 bytes on wire, 46 bytes captured)
    Arrival Time: May 29, 2004 18:00:54.592260000
    Time delta from previous packet: 25.946794000
seconds
    Time relative to first packet: 25.947827000
seconds
    Frame Number: 3
    Packet Length: 46 bytes
    Capture Length: 46 bytes
Ethernet II, Src: 00:e0:18:ed:04:61, Dst:
00:e0:2b:90:1f:00
    Destination: 00:e0:2b:90:1f:00 (Extreme__90:1f:00)
    Source: 00:e0:18:ed:04:61 (Asustek__ed:04:61)
    Type: IP (0x0800)
Internet Protocol, Src Addr: 202.*.*.19 (202.*.*.19),
Dst Addr: 202.*.*.252 (202.*.*.252)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x10 (DSCP 0x04:
Unknown DSCP; ECN: 0x00)
        0001 00.. = Differentiated Services Codepoint:
Unknown (0x04)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 32
    Identification: 0x0000
    Flags: 0x04
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: UDP (0x11)
    Header checksum: 0x912a (correct)
    Source: 202.*.*.19 (202.*.*.19)
    Destination: 202.*.*.252 (202.*.*.252)
User Datagram Protocol, Src Port: 5060 (5060), Dst
Port: 61863 (61863)
    Source port: 5060 (5060)
    Destination port: 61863 (61863)
    Length: 12
    Checksum: 0x50d7 (correct)
[Malformed Packet: SIP]
**********************************************


	
		
__________________________________
Do you Yahoo!?
Friends.  Fun.  Try the all-new Yahoo! Messenger.
http://messenger.yahoo.com/ 




More information about the sr-users mailing list