[Serusers] private ip registration error
Klaus Darilion
klaus.mailinglists at pernau.at
Sun May 30 10:46:56 CEST 2004
I guess the mailformed packets are the NAT-pings (keep alive messages).
These messages are correct, but ethereal does not recognize it.
klaus
varala ramakanth wrote:
> hello friends,
>
> iam having the rel_0_8_12 running
>
> when i am registering with windows messenger from a
>
> nat client
>
> its ethereal report show that malformed sip packet
>
> so whats the problem?
>
> ser( 202.*.*.19)-->dhcp nat(202.*.*.252)-->private
> ip(192.168.1.18)msn messenger 4.7
>
> please guide me
>
> with reagards
> rama kanth
>
> this is the log message iam getting when debug =8
> ***************************************************
> 6(3777) SIP Request:
> 6(3777) method: <REGISTER>
> 6(3777) uri: <sip:server.pol.net.in>
> 6(3777) version: <SIP/2.0>
> 6(3777) parse_headers: flags=1
> 6(3777) end of header reached, state=5
> 6(3777) parse_headers: Via found, flags=1
> 6(3777) parse_headers: this is the first via
> 6(3777) After parse_msg...
> 6(3777) preparing to run routing scripts...
> 6(3777) DEBUG : is_maxfwd_present: searching for
> max_forwards header
> 6(3777) parse_headers: flags=128
> 6(3777) DEBUG: is_maxfwd_present: value = 70
> 6(3777) check_via_address(202.*.*.252, 192.168.1.18,
> 0)
> 6(3777) LOG: Someone trying to register from private
> IP, rewriting
> 6(3777) parse_headers: flags=64
> 6(3777) end of header reached, state=9
> 6(3777) DEBUG: get_hdr_field: <To> [29];
> uri=[sip:102 at server.pol.net.in]
> 6(3777) DEBUG: to body [<sip:102 at server.pol.net.in>
> ]
> 6(3777) get_hdr_field: cseq <CSeq>: <2> <REGISTER>
> 6(3777) parse_headers: flags=256
> 6(3777) DEBUG: get_hdr_body : content_length=0
> 6(3777) found end of header
> 6(3777) find_first_route(): No Route headers found
> 6(3777) loose_route(): There is no Route HF
> 6(3777) check_self - checking if host==us: 17==9 &&
> [server.pol.net.in] == [127.0.0.1]
> 6(3777) check_self - checking if port 5060 matches
> port 5060
> 6(3777) check_self - checking if host==us: 17==13 &&
> [server.pol.net.in] == [202.*.*.19]
> 6(3777) check_self - checking if port 5060 matches
> port 5060
> 6(3777) check_self - checking if host==us: 17==9 &&
> [server.pol.net.in] == [127.0.0.1]
> 6(3777) check_self - checking if port 5060 matches
> port 5060
> 6(3777) check_self - checking if host==us: 17==13 &&
> [server.pol.net.in] == [202.*.*.19]
> 6(3777) check_self - checking if port 5060 matches
> port 5060
> 6(3777) parse_headers: flags=-1
> 6(3777) parse_headers: flags=-1
> 6(3777) check_via_address(202.*.*.252, 192.168.1.18,
> 0)
> 6(3777) receive_msg: cleaning up
>
> *************************************************
> the ethereal report is
> *************************************************
>
> Frame 1 (544 bytes on wire, 544 bytes captured)
> Arrival Time: May 29, 2004 18:00:28.644433000
> Time delta from previous packet: 0.000000000
> seconds
> Time relative to first packet: 0.000000000 seconds
> Frame Number: 1
> Packet Length: 544 bytes
> Capture Length: 544 bytes
> Ethernet II, Src: 00:e0:2b:90:1f:00, Dst:
> 00:e0:18:ed:04:61
> Destination: 00:e0:18:ed:04:61 (Asustek__ed:04:61)
> Source: 00:e0:2b:90:1f:00 (Extreme__90:1f:00)
> Type: IP (0x0800)
> Internet Protocol, Src Addr: 202.65.148.252
> (202.65.148.252), Dst Addr: 202.65.128.19
> (202.65.128.19)
> Version: 4
> Header length: 20 bytes
> Differentiated Services Field: 0x00 (DSCP 0x00:
> Default; ECN: 0x00)
> 0000 00.. = Differentiated Services Codepoint:
> Default (0x00)
> .... ..0. = ECN-Capable Transport (ECT): 0
> .... ...0 = ECN-CE: 0
> Total Length: 530
> Identification: 0xcc8e
> Flags: 0x00
> .0.. = Don't fragment: Not set
> ..0. = More fragments: Not set
> Fragment offset: 0
> Time to live: 125
> Protocol: UDP (0x11)
> Header checksum: 0xc5b9 (correct)
> Source: 202.*.*.252 (202.*.*.252)
> Destination: 202.*.*.19 (202.*.*.19)
> User Datagram Protocol, Src Port: 61863 (61863), Dst
> Port: 5060 (5060)
> Source port: 61863 (61863)
> Destination port: 5060 (5060)
> Length: 510
> Checksum: 0xde85 (correct)
> Session Initiation Protocol
> Request line: REGISTER sip:server.pol.net.in
> SIP/2.0
> Message Header
> Via: SIP/2.0/UDP 192.168.1.18:15992
> Max-Forwards: 70
> From:
> <sip:102 at server.pol.net.in>;tag=ddb4f954b19811d8aafe00e01846e257;epid=b28b013e73
> To: <sip:102 at server.pol.net.in>
> Call-ID:
> ddb4f955b19811d8aafe00e01846e257 at 192.168.1.18
> CSeq: 1 REGISTER
> Contact:
> <sip:192.168.1.18:15992>;methods="INVITE, MESSAGE,
> INFO, SUBSCRIBE, OPTIONS, BYE, CANCEL, NOTIFY, ACK,
> REFER"
> User-Agent: RTC/1.2.4949
> Event: registration
> Allow-Events: presence
> Content-Length: 0
>
> Frame 2 (687 bytes on wire, 687 bytes captured)
> Arrival Time: May 29, 2004 18:00:28.645466000
> Time delta from previous packet: 0.001033000
> seconds
> Time relative to first packet: 0.001033000 seconds
> Frame Number: 2
> Packet Length: 687 bytes
> Capture Length: 687 bytes
> Ethernet II, Src: 00:e0:18:ed:04:61, Dst:
> 00:e0:2b:90:1f:00
> Destination: 00:e0:2b:90:1f:00 (Extreme__90:1f:00)
> Source: 00:e0:18:ed:04:61 (Asustek__ed:04:61)
> Type: IP (0x0800)
> Internet Protocol, Src Addr: 202.*.*.19 (202.*.*.19),
> Dst Addr: 202.*.*.252 (202.*.*.252)
> Version: 4
> Header length: 20 bytes
> Differentiated Services Field: 0x10 (DSCP 0x04:
> Unknown DSCP; ECN: 0x00)
> 0001 00.. = Differentiated Services Codepoint:
> Unknown (0x04)
> .... ..0. = ECN-Capable Transport (ECT): 0
> .... ...0 = ECN-CE: 0
> Total Length: 673
> Identification: 0x0000
> Flags: 0x04
> .1.. = Don't fragment: Set
> ..0. = More fragments: Not set
> Fragment offset: 0
> Time to live: 64
> Protocol: UDP (0x11)
> Header checksum: 0x8ea9 (correct)
> Source: 202.*.*.19 (202.*.*.19)
> Destination: 202.*.*.252 (202.*.*.252)
> User Datagram Protocol, Src Port: 5060 (5060), Dst
> Port: 61863 (61863)
> Source port: 5060 (5060)
> Destination port: 61863 (61863)
> Length: 653
> Checksum: 0x7bd2 (correct)
> Session Initiation Protocol
> Status line: SIP/2.0 200 OK
> Message Header
> Via: SIP/2.0/UDP
> 192.168.1.18:15992;rport=61863;received=202.65.148.252
> From:
> <sip:102 at server.pol.net.in>;tag=ddb4f954b19811d8aafe00e01846e257;epid=b28b013e73
> To:
> <sip:102 at server.pol.net.in>;tag=b27e1a1d33761e85846fc98f5f3a7e58.7f7e
> Call-ID:
> ddb4f955b19811d8aafe00e01846e257 at 192.168.1.18
> CSeq: 1 REGISTER
> Contact:
> <sip:202.*.*.252:61863>;q=0.00;expires=3600
> Server: Sip EXpress router (0.8.12-tcp_nonb
> (i386/linux))
> Content-Length: 0
> Warning: 392 202.*.*.19:5060 "Noisy feedback
> tells: pid=3779 req_src_ip=202.*.*.252
> req_src_port=61863 in_uri=sip:server.pol.net.in
> out_uri=sip:server.pol.net.in via_cnt==1"
>
> Frame 3 (46 bytes on wire, 46 bytes captured)
> Arrival Time: May 29, 2004 18:00:54.592260000
> Time delta from previous packet: 25.946794000
> seconds
> Time relative to first packet: 25.947827000
> seconds
> Frame Number: 3
> Packet Length: 46 bytes
> Capture Length: 46 bytes
> Ethernet II, Src: 00:e0:18:ed:04:61, Dst:
> 00:e0:2b:90:1f:00
> Destination: 00:e0:2b:90:1f:00 (Extreme__90:1f:00)
> Source: 00:e0:18:ed:04:61 (Asustek__ed:04:61)
> Type: IP (0x0800)
> Internet Protocol, Src Addr: 202.*.*.19 (202.*.*.19),
> Dst Addr: 202.*.*.252 (202.*.*.252)
> Version: 4
> Header length: 20 bytes
> Differentiated Services Field: 0x10 (DSCP 0x04:
> Unknown DSCP; ECN: 0x00)
> 0001 00.. = Differentiated Services Codepoint:
> Unknown (0x04)
> .... ..0. = ECN-Capable Transport (ECT): 0
> .... ...0 = ECN-CE: 0
> Total Length: 32
> Identification: 0x0000
> Flags: 0x04
> .1.. = Don't fragment: Set
> ..0. = More fragments: Not set
> Fragment offset: 0
> Time to live: 64
> Protocol: UDP (0x11)
> Header checksum: 0x912a (correct)
> Source: 202.*.*.19 (202.*.*.19)
> Destination: 202.*.*.252 (202.*.*.252)
> User Datagram Protocol, Src Port: 5060 (5060), Dst
> Port: 61863 (61863)
> Source port: 5060 (5060)
> Destination port: 61863 (61863)
> Length: 12
> Checksum: 0x50d7 (correct)
> [Malformed Packet: SIP]
> **********************************************
>
>
>
>
> __________________________________
> Do you Yahoo!?
> Friends. Fun. Try the all-new Yahoo! Messenger.
> http://messenger.yahoo.com/
>
> _______________________________________________
> Serusers mailing list
> serusers at lists.iptel.org
> http://lists.iptel.org/mailman/listinfo/serusers
>
>
More information about the sr-users
mailing list