[Users] SIPS in openSER

Christoph Fürstaller christoph.fuerstaller at kurtkrenn.com
Thu Mar 23 21:02:52 CET 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 
Hi Bogdan,
I still get the same 'error' with another phone. A snom 190. If I
connect it to an TLS only SER I get thd "500 I'm terribly sorry,
server error occurred (7/TM)". If I open up
UDP as well the phone registeres fine with SER.

I read another posting which sayes: " If I remember correctly the RFC,
UDP is mandatory for a SIP server" Is this correct? I don't know it.

I attached my cfg. It's the one coming with tls-openSER and i think
you wrote it : )

chris...
Bogdan-Andrei Iancu schrieb:
> Hi Chris,
>
> does the error persist? if so, please let me know what relaying
> function are you using, in what format and what is the RURI.
>
> regards, bogdan
>
> Christoph Fürstaller wrote:
>
>
> Hi Bogdan,
>
> I think I found a way to connect minisip to SER. I had to open up a
>  UDP Port (5060) as well. Then minisip is registering imidiatly.
> (didn't changed a think in openser.cfg). But why do I have to do
> that? I captured all the traffic, but there is nothing transmitted
> in cleartext (sip) everything is encypted. I also upgraded to the
> lates cvs version. (tried this with/without the UDP Port)
>
> The only thing i'm checking in the cfg is authentication against
> mysql db. Nothing more.
>
> chris...
>
>
> chris... Bogdan-Andrei Iancu schrieb:
>
>
>>>> Hi Chris,
>>>>
>>>> what relaying script function are you using and what format?
>>>> looks like even for REGISTER you are doing a sort of
>>>> relaying...
>>>>
>>>> also be sure you are using the latest cvs version (for devel
>>>> branch).
>>>>
>>>> regards, bogdan
>>>>
>>>> Christoph Fürstaller wrote:
>>>>
>>>> Hi,
>>>>
>>>> I've managed minisip to connect to tls enabled openser. The
>>>> tls connection is established fine, but when i try to
>>>> register or try to call i get errors. See attached ser debug
>>>> output.
>>>>
>>>> Anybody knows what that means? Is the SIP Request from
>>>> minisip not correct? Or is it a failure in my openser.cfg?
>>>>
>>>> Any help would be nice.
>>>>
>>>> chris...
>>>>
>>>>
>>>>
> ------------------------------------------------------------------------
>
>>>>
>>>>
>>>>
>>>> 7(11894) tcpconn_new: new tcp connection to: 192.168.20.130
>>>> 7(11894) tcpconn_new: on port 35957, type 3 7(11894)
>>>> tls_tcpconn_init: Entered: Creating a whole new ssl
>>>> connection 7(11894) tls_tcpconn_init: Looking up tls domain
>>>> [192.168.20.156:5061] 7(11894) tls_tcpconn_init: Using
>>>> default tls settings 7(11894) tls_tcpconn_init: Setting in
>>>> ACCEPT mode (server) 7(11894) tcpconn_add: hashes: 181, 2
>>>> 7(11894) tcp_main_loop: new connection: 0x405b4b90 19
>>>> 7(11894) send2child: to tcp child 0 3(11880), 0x405b4b90
>>>> 3(11880) received n=4 con=0x405b4b90, fd=14 3(11880)
>>>> tls_update_fd: New fd is 14 3(11880) tls_update_fd: New fd is
>>>> 14 3(11880) tls_accept: TLS handshake successful 3(11880)
>>>> tls_update_fd: New fd is 14 3(11880) tls_update_fd: New fd is
>>>> 14 3(11880) _tls_read: 403 bytes read 3(11880) tcp_read_req:
>>>> content-length= 0 3(11880) SIP Request: 3(11880)  method:
>>>> <REGISTER> 3(11880)  uri:     <sip:192.168.20.156> 3(11880)
>>>> version: <SIP/2.0> 3(11880) parse_headers: flags=2 3(11880)
>>>> DEBUG:parse_to:end of header reached, state=9 3(11880) DEBUG:
>>>>  get_hdr_field: <To> [28]; uri=[sip:chris at 192.168.20.156]
>>>> 3(11880) DEBUG: to body [<sip:chris at 192.168.20.156> ]
>>>> 3(11880) get_hdr_field: cseq <CSeq>: <601> <REGISTER>
>>>> 3(11880) Found param type 232, <branch> =
>>>> <z9hG4bK1327458630>; state=16 3(11880) end of header reached,
>>>> state=5 3(11880) parse_headers: Via found, flags=2 3(11880)
>>>> parse_headers: this is the first via 3(11880) After
>>>> parse_msg... 3(11880) preparing to run routing scripts...
>>>> 3(11880) DEBUG:maxfwd:is_maxfwd_present: value = 70 3(11880)
>>>> parse_headers: flags=200 3(11880) is_preloaded: Yes 3(11880)
>>>> grep_sock_info - checking if host==us: 14==14 &&
>>>> [192.168.20.156] == [192.168.20.156] 3(11880) grep_sock_info
>>>> - checking if port 5061 matches port 5061 3(11880)
>>>> after_loose: Topmost route URI:
>>>> 'sip:192.168.20.156:5061;transport=TLS;lr' is me 3(11880)
>>>> parse_headers: flags=200 3(11880) DEBUG: get_hdr_body :
>>>> content_length=0 3(11880) found end of header 3(11880)
>>>> find_next_route: No next Route HF found 3(11880) after_loose:
>>>> No next URI found 3(11880) grep_sock_info - checking if
>>>> host==us: 14==14 && [192.168.20.156] == [192.168.20.156]
>>>> 3(11880) grep_sock_info - checking if port 5061 matches port
>>>> 5060 3(11880) check_self: host != me 3(11880) parse_headers:
>>>> flags=ffffffffffffffff 3(11880) DEBUG: t_newtran: msg id=3 ,
>>>> global msg id=2 , T on entrance=0xffffffff 3(11880)
>>>> parse_headers: flags=ffffffffffffffff 3(11880) parse_headers:
>>>> flags=78 3(11880) t_lookup_request: start searching:
>>>> hash=19221, isACK=0 3(11880) DEBUG: RFC3261 transaction
>>>> matching failed 3(11880) DEBUG: t_lookup_request: no
>>>> transaction found 3(11880) DEBUG: mk_proxy: doing DNS
>>>> lookup... 3(11880) ERROR:tm:add_uac: can't fwd to af 2, proto
>>>> 1  (no corresponding listening socket) 3(11880)
>>>> ERROR:tm:t_forward_nonack: failure to add branches 3(11880)
>>>> ERROR:tm:t_relay_to:  t_forward_nonack returned error
>>>> 3(11880) parse_headers: flags=ffffffffffffffff 3(11880)
>>>> check_via_address(192.168.20.130, 192.168.20.130, 3) 3(11880)
>>>>  WARNING:vqm_resize: resize(0) called 3(11880) DEBUG:
>>>> cleanup_uac_timers: RETR/FR timers reset 3(11880) DEBUG:
>>>> add_to_tail_of_timer[2]: 0x405dc5c0 3(11880) tcp_send: tcp
>>>> connection found (0x405b4b90), acquiring fd 3(11880)
>>>> tcp_send, c= 0x405b4b90, n=8 7(11894) tcp_main_loop: read
>>>> response= 405b4b90, 1 from 3 (11880) 3(11880) tcp_send: after
>>>> receive_fd: c= 0x405b4b90 n=4 fd=15 3(11880) tcp_send:
>>>> sending... 3(11880) tls_update_fd: New fd is 15 3(11880)
>>>> tls_write: Write was successful (530 bytes) 3(11880)
>>>> tcp_send: after write: c= 0x405b4b90 n=530 fd=15 3(11880)
>>>> tcp_send: buf= SIP/2.0 500 I'm terribly sorry, server error
>>>> occurred (7/TM) From: <sip:chris at 192.168.20.156> To:
>>>> <sip:chris at 192.168.20.156>;tag=ddf051b13744e2e8329237e95d7a9ade-7b3d
>>>>  Call-ID: 407398382 at 192.168.20.130 CSeq: 601 REGISTER Via:
>>>> SIP/2.0/TLS 192.168.20.130:15061;branch=z9hG4bK1327458630
>>>> Server: OpenSer (1.0.0-tls (i386/linux)) Content-Length: 0
>>>> Warning: 392 192.168.20.156:5061 "Noisy feedback tells:
>>>> pid=11880 req_src_ip=192.168.20.130 req_src_port=35957
>>>> in_uri=sip:192.168.20.156 out_uri=sip:192.168.20.156
>>>> via_cnt==1"
>>>>
>>>>>>
>>>> 3(11880) DEBUG:tm:_reply_light: reply sent out.
>>>> buf=0x811a978: SIP/2.0 5..., shmem=0x405d9750: SIP/2.0 5
>>>> 3(11880) DEBUG:tm:_reply_light: finished 3(11880) ERROR:
>>>> generation of a stateful reply on error succeeded 3(11880)
>>>> DEBUG:destroy_avp_list: destroying list (nil) 3(11880)
>>>> receive_msg: cleaning up 2(11878) DEBUG: timer
>>>> routine:2,tl=0x405dc5c0 next=(nil) 2(11878) DEBUG:
>>>> wait_handler : removing 0x405dc578 from table 2(11878) DEBUG:
>>>>  delete transaction 0x405dc578 2(11878) DEBUG: wait_handler :
>>>> done 3(11880) tcp_receive_loop: 0x405b4b90 expired (172, 173)
>>>> 3(11880) releasing con 0x405b4b90, state 0, fd=14, id=2
>>>> 3(11880)  extra_data 0x4042fd70 7(11894) tcp_main_loop:
>>>> reader response= 405b4b90, 0 from 0 7(11894) tcp_main_loop:
>>>> CONN_RELEASE  0x405b4b90 refcnt= 0
>>>>
>>>>
>>>>
> ------------------------------------------------------------------------
>
>>>>
>>>>
>>>>
>>>> _______________________________________________ Users mailing
>>>> list Users at openser.org
>>>> http://openser.org/cgi-bin/mailman/listinfo/users
>>>>
>>>>
>>>>
>>>
>>>
> _______________________________________________ Users mailing list
> Users at openser.org http://openser.org/cgi-bin/mailman/listinfo/users
>
>>>
>
>>>
>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
 
iD8DBQFEIv7sR0exH8dhr/YRAoOtAJ9Egs5+ZruqyE255q/y5w0rtpE1nACfWJeQ
2KtC2KAY1/yvrcshw3h+n5I=
=sBO1
-----END PGP SIGNATURE-----

-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: openser.cfg
URL: <http://lists.sip-router.org/pipermail/sr-users/attachments/20060323/67fec0a0/attachment.txt>


More information about the sr-users mailing list