[Serusers] private ip registration error

Klaus Darilion klaus.mailinglists at pernau.at
Sun May 30 10:46:56 CEST 2004


I guess the mailformed packets are the NAT-pings (keep alive messages). 
These messages are correct, but ethereal does not recognize it.

klaus

varala ramakanth wrote:

> hello friends,
> 
> iam having the rel_0_8_12 running
> 
> when i am registering with windows messenger from a
> 
> nat client 
> 
> its ethereal report show that malformed sip packet
> 
> so whats the problem?
> 
> ser( 202.*.*.19)-->dhcp nat(202.*.*.252)-->private
> ip(192.168.1.18)msn messenger 4.7 
> 
> please guide me
> 
> with reagards 
> rama kanth
> 
> this is the log message iam getting when debug =8
> ***************************************************
> 6(3777) SIP Request:
>  6(3777)  method:  <REGISTER>
>  6(3777)  uri:     <sip:server.pol.net.in>
>  6(3777)  version: <SIP/2.0>
>  6(3777) parse_headers: flags=1
>  6(3777) end of header reached, state=5
>  6(3777) parse_headers: Via found, flags=1
>  6(3777) parse_headers: this is the first via
>  6(3777) After parse_msg...
>  6(3777) preparing to run routing scripts...
>  6(3777) DEBUG : is_maxfwd_present: searching for
> max_forwards header
>  6(3777) parse_headers: flags=128
>  6(3777) DEBUG: is_maxfwd_present: value = 70
>  6(3777) check_via_address(202.*.*.252, 192.168.1.18,
> 0)
>  6(3777) LOG: Someone trying to register from private
> IP, rewriting
>  6(3777) parse_headers: flags=64
>  6(3777) end of header reached, state=9
>  6(3777) DEBUG: get_hdr_field: <To> [29];
> uri=[sip:102 at server.pol.net.in]
>  6(3777) DEBUG: to body [<sip:102 at server.pol.net.in>
> ]
>  6(3777) get_hdr_field: cseq <CSeq>: <2> <REGISTER>
>  6(3777) parse_headers: flags=256
>  6(3777) DEBUG: get_hdr_body : content_length=0
>  6(3777) found end of header
>  6(3777) find_first_route(): No Route headers found
>  6(3777) loose_route(): There is no Route HF
>  6(3777) check_self - checking if host==us: 17==9 && 
> [server.pol.net.in] == [127.0.0.1]
>  6(3777) check_self - checking if port 5060 matches
> port 5060
>  6(3777) check_self - checking if host==us: 17==13 && 
> [server.pol.net.in] == [202.*.*.19]
>  6(3777) check_self - checking if port 5060 matches
> port 5060
>  6(3777) check_self - checking if host==us: 17==9 && 
> [server.pol.net.in] == [127.0.0.1]
>  6(3777) check_self - checking if port 5060 matches
> port 5060
>  6(3777) check_self - checking if host==us: 17==13 && 
> [server.pol.net.in] == [202.*.*.19]
>  6(3777) check_self - checking if port 5060 matches
> port 5060
>  6(3777) parse_headers: flags=-1
>  6(3777) parse_headers: flags=-1
>  6(3777) check_via_address(202.*.*.252, 192.168.1.18,
> 0)
>  6(3777) receive_msg: cleaning up
> 
> *************************************************
> the ethereal report is 
> *************************************************
> 
> Frame 1 (544 bytes on wire, 544 bytes captured)
>     Arrival Time: May 29, 2004 18:00:28.644433000
>     Time delta from previous packet: 0.000000000
> seconds
>     Time relative to first packet: 0.000000000 seconds
>     Frame Number: 1
>     Packet Length: 544 bytes
>     Capture Length: 544 bytes
> Ethernet II, Src: 00:e0:2b:90:1f:00, Dst:
> 00:e0:18:ed:04:61
>     Destination: 00:e0:18:ed:04:61 (Asustek__ed:04:61)
>     Source: 00:e0:2b:90:1f:00 (Extreme__90:1f:00)
>     Type: IP (0x0800)
> Internet Protocol, Src Addr: 202.65.148.252
> (202.65.148.252), Dst Addr: 202.65.128.19
> (202.65.128.19)
>     Version: 4
>     Header length: 20 bytes
>     Differentiated Services Field: 0x00 (DSCP 0x00:
> Default; ECN: 0x00)
>         0000 00.. = Differentiated Services Codepoint:
> Default (0x00)
>         .... ..0. = ECN-Capable Transport (ECT): 0
>         .... ...0 = ECN-CE: 0
>     Total Length: 530
>     Identification: 0xcc8e
>     Flags: 0x00
>         .0.. = Don't fragment: Not set
>         ..0. = More fragments: Not set
>     Fragment offset: 0
>     Time to live: 125
>     Protocol: UDP (0x11)
>     Header checksum: 0xc5b9 (correct)
>     Source: 202.*.*.252 (202.*.*.252)
>     Destination: 202.*.*.19 (202.*.*.19)
> User Datagram Protocol, Src Port: 61863 (61863), Dst
> Port: 5060 (5060)
>     Source port: 61863 (61863)
>     Destination port: 5060 (5060)
>     Length: 510
>     Checksum: 0xde85 (correct)
> Session Initiation Protocol
>     Request line: REGISTER sip:server.pol.net.in
> SIP/2.0
>     Message Header
>         Via: SIP/2.0/UDP 192.168.1.18:15992
>         Max-Forwards: 70
>         From:
> <sip:102 at server.pol.net.in>;tag=ddb4f954b19811d8aafe00e01846e257;epid=b28b013e73
>         To: <sip:102 at server.pol.net.in>
>         Call-ID:
> ddb4f955b19811d8aafe00e01846e257 at 192.168.1.18
>         CSeq: 1 REGISTER
>         Contact:
> <sip:192.168.1.18:15992>;methods="INVITE, MESSAGE,
> INFO, SUBSCRIBE, OPTIONS, BYE, CANCEL, NOTIFY, ACK,
> REFER"
>         User-Agent: RTC/1.2.4949
>         Event: registration
>         Allow-Events: presence
>         Content-Length: 0
> 
> Frame 2 (687 bytes on wire, 687 bytes captured)
>     Arrival Time: May 29, 2004 18:00:28.645466000
>     Time delta from previous packet: 0.001033000
> seconds
>     Time relative to first packet: 0.001033000 seconds
>     Frame Number: 2
>     Packet Length: 687 bytes
>     Capture Length: 687 bytes
> Ethernet II, Src: 00:e0:18:ed:04:61, Dst:
> 00:e0:2b:90:1f:00
>     Destination: 00:e0:2b:90:1f:00 (Extreme__90:1f:00)
>     Source: 00:e0:18:ed:04:61 (Asustek__ed:04:61)
>     Type: IP (0x0800)
> Internet Protocol, Src Addr: 202.*.*.19 (202.*.*.19),
> Dst Addr: 202.*.*.252 (202.*.*.252)
>     Version: 4
>     Header length: 20 bytes
>     Differentiated Services Field: 0x10 (DSCP 0x04:
> Unknown DSCP; ECN: 0x00)
>         0001 00.. = Differentiated Services Codepoint:
> Unknown (0x04)
>         .... ..0. = ECN-Capable Transport (ECT): 0
>         .... ...0 = ECN-CE: 0
>     Total Length: 673
>     Identification: 0x0000
>     Flags: 0x04
>         .1.. = Don't fragment: Set
>         ..0. = More fragments: Not set
>     Fragment offset: 0
>     Time to live: 64
>     Protocol: UDP (0x11)
>     Header checksum: 0x8ea9 (correct)
>     Source: 202.*.*.19 (202.*.*.19)
>     Destination: 202.*.*.252 (202.*.*.252)
> User Datagram Protocol, Src Port: 5060 (5060), Dst
> Port: 61863 (61863)
>     Source port: 5060 (5060)
>     Destination port: 61863 (61863)
>     Length: 653
>     Checksum: 0x7bd2 (correct)
> Session Initiation Protocol
>     Status line: SIP/2.0 200 OK
>     Message Header
>         Via: SIP/2.0/UDP
> 192.168.1.18:15992;rport=61863;received=202.65.148.252
>         From:
> <sip:102 at server.pol.net.in>;tag=ddb4f954b19811d8aafe00e01846e257;epid=b28b013e73
>         To:
> <sip:102 at server.pol.net.in>;tag=b27e1a1d33761e85846fc98f5f3a7e58.7f7e
>         Call-ID:
> ddb4f955b19811d8aafe00e01846e257 at 192.168.1.18
>         CSeq: 1 REGISTER
>         Contact:
> <sip:202.*.*.252:61863>;q=0.00;expires=3600
>         Server: Sip EXpress router (0.8.12-tcp_nonb
> (i386/linux))
>         Content-Length: 0
>         Warning: 392 202.*.*.19:5060 "Noisy feedback
> tells:  pid=3779 req_src_ip=202.*.*.252
> req_src_port=61863 in_uri=sip:server.pol.net.in
> out_uri=sip:server.pol.net.in via_cnt==1"
> 
> Frame 3 (46 bytes on wire, 46 bytes captured)
>     Arrival Time: May 29, 2004 18:00:54.592260000
>     Time delta from previous packet: 25.946794000
> seconds
>     Time relative to first packet: 25.947827000
> seconds
>     Frame Number: 3
>     Packet Length: 46 bytes
>     Capture Length: 46 bytes
> Ethernet II, Src: 00:e0:18:ed:04:61, Dst:
> 00:e0:2b:90:1f:00
>     Destination: 00:e0:2b:90:1f:00 (Extreme__90:1f:00)
>     Source: 00:e0:18:ed:04:61 (Asustek__ed:04:61)
>     Type: IP (0x0800)
> Internet Protocol, Src Addr: 202.*.*.19 (202.*.*.19),
> Dst Addr: 202.*.*.252 (202.*.*.252)
>     Version: 4
>     Header length: 20 bytes
>     Differentiated Services Field: 0x10 (DSCP 0x04:
> Unknown DSCP; ECN: 0x00)
>         0001 00.. = Differentiated Services Codepoint:
> Unknown (0x04)
>         .... ..0. = ECN-Capable Transport (ECT): 0
>         .... ...0 = ECN-CE: 0
>     Total Length: 32
>     Identification: 0x0000
>     Flags: 0x04
>         .1.. = Don't fragment: Set
>         ..0. = More fragments: Not set
>     Fragment offset: 0
>     Time to live: 64
>     Protocol: UDP (0x11)
>     Header checksum: 0x912a (correct)
>     Source: 202.*.*.19 (202.*.*.19)
>     Destination: 202.*.*.252 (202.*.*.252)
> User Datagram Protocol, Src Port: 5060 (5060), Dst
> Port: 61863 (61863)
>     Source port: 5060 (5060)
>     Destination port: 61863 (61863)
>     Length: 12
>     Checksum: 0x50d7 (correct)
> [Malformed Packet: SIP]
> **********************************************
> 
> 
> 	
> 		
> __________________________________
> Do you Yahoo!?
> Friends.  Fun.  Try the all-new Yahoo! Messenger.
> http://messenger.yahoo.com/ 
> 
> _______________________________________________
> Serusers mailing list
> serusers at lists.iptel.org
> http://lists.iptel.org/mailman/listinfo/serusers
> 
> 




More information about the sr-users mailing list