[Users] SIPS in openSER

Bogdan-Andrei Iancu bogdan at voice-system.ro
Mon Mar 27 19:50:21 CEST 2006


Hi Christoph,

the log shows a working REGISTER. can you please provide a log with  
failing INVITE (containing the error you were refereing at).

regards,
bogdan

Christoph Fürstaller wrote:

>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>Hi Bogdan,
>
>Ok, if UDP is needed by this protocol then it shouldn't function without it.
>
>I attached the debuging output from openSER when the snom tries to login.
>
>What are the Contact entries? Are they because the phone didn't
>unregistered correctly? I just pluged it off and an again to see the
>login output. All this entries are in the location table in my db.
>
>chris...
>
>Bogdan-Andrei Iancu wrote:
>  
>
>>Hi Cris,
>>
>>thanks for you info
>>
>>Christoph Fürstaller wrote:
>>
>>    
>>
>>>-----BEGIN PGP SIGNED MESSAGE-----
>>>Hash: SHA1
>>>
>>>Hi Bogdan,
>>>I still get the same 'error' with another phone. A snom 190. If I
>>>connect it to an TLS only SER I get thd "500 I'm terribly sorry,
>>>server error occurred (7/TM)". If I open up
>>>UDP as well the phone registeres fine with SER.
>>>
>>>I read another posting which sayes: " If I remember correctly the RFC,
>>>UDP is mandatory for a SIP server" Is this correct? I don't know it.
>>> 
>>>
>>>      
>>>
>>yes, UDP is mandatory as protocol.
>>
>>    
>>
>>>I attached my cfg. It's the one coming with tls-openSER and i think
>>>you wrote it : )
>>> 
>>>
>>>      
>>>
>>ok - I will take a look, but please give me also the RURI sent by the
>>SNOM (it is essential) - I will try to locate the problem
>>
>>regards,
>>bogdan
>>    
>>
>-----BEGIN PGP SIGNATURE-----
>Version: GnuPG v1.4.1 (GNU/Linux)
>Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
>
>iD8DBQFEI85zR0exH8dhr/YRApZzAKCtTb0e+m8hi+G2uRfF0Vx26jINmACgxjvx
>26fie8yMVq0Y+BIQH7bVldM=
>=nAZI
>-----END PGP SIGNATURE-----
>  
>
>------------------------------------------------------------------------
>
>11(26780) tcpconn_new: new tcp connection to: 192.168.20.187
>11(26780) tcpconn_new: on port 2049, type 3
>11(26780) tls_tcpconn_init: Entered: Creating a whole new ssl connection
>11(26780) tls_tcpconn_init: Looking up tls domain [192.168.20.156:5061]
>11(26780) tls_tcpconn_init: Using default tls server settings
>11(26780) tls_tcpconn_init: Setting in ACCEPT mode (server)
>11(26780) tcpconn_add: hashes: 193, 209
>11(26780) handle_new_connect: new connection: 0x4060b6c8 25 flags: 0002
>11(26780) send2child: to tcp child 0 7(26766), 0x4060b6c8
> 7(26766) received n=4 con=0x4060b6c8, fd=20
> 7(26766) DBG: io_watch_add(0x80f17c0, 20, 2, 0x4060b6c8), fd_no=1
> 7(26766) tls_update_fd: New fd is 20
> 7(26766) tls_update_fd: New fd is 20
> 7(26766) tls_accept: TLS handshake successful
> 7(26766) tls_update_fd: New fd is 20
> 7(26766) tls_update_fd: New fd is 20
> 7(26766) tls_update_fd: New fd is 20
> 7(26766) _tls_read: 866 bytes read
> 7(26766) tcp_read_req: content-length= 0
> 7(26766) SIP Request:
> 7(26766)  method:  <REGISTER>
> 7(26766)  uri:     <sip:192.168.20.156:5061;transport=tls>
> 7(26766)  version: <SIP/2.0>
> 7(26766) parse_headers: flags=2
> 7(26766) Found param type 232, <branch> = <z9hG4bK-xwuy1h54dryy>; state=6
> 7(26766) Found param type 235, <rport> = <n/a>; state=17
> 7(26766) end of header reached, state=5
> 7(26766) parse_headers: Via found, flags=2
> 7(26766) parse_headers: this is the first via
> 7(26766) After parse_msg...
> 7(26766) preparing to run routing scripts...
> 7(26766) parse_headers: flags=100
> 7(26766) DEBUG:parse_to:end of header reached, state=9
> 7(26766) DEBUG: get_hdr_field: <To> [53]; uri=[sip:test at 192.168.20.156:5061;transport=tls]
> 7(26766) DEBUG: to body ["test" <sip:test at 192.168.20.156:5061;transport=tls>
>]
> 7(26766) get_hdr_field: cseq <CSeq>: <1> <REGISTER>
> 7(26766) DEBUG:maxfwd:is_maxfwd_present: value = 70
> 7(26766) parse_headers: flags=200
> 7(26766) DEBUG: get_hdr_body : content_length=0
> 7(26766) found end of header
> 7(26766) find_first_route: No Route headers found
> 7(26766) loose_route: There is no Route HF
> 7(26766) grep_sock_info - checking if host==us: 14==14 &&  [192.168.20.156] == [192.168.20.156]
> 7(26766) grep_sock_info - checking if port 5060 matches port 5061
> 7(26766) grep_sock_info - checking if host==us: 14==14 &&  [192.168.20.156] == [192.168.20.156]
> 7(26766) grep_sock_info - checking if port 5061 matches port 5061
> 7(26766) grep_sock_info - checking if host==us: 14==14 &&  [192.168.20.156] == [192.168.20.156]
> 7(26766) grep_sock_info - checking if port 5060 matches port 5061
> 7(26766) grep_sock_info - checking if host==us: 14==14 &&  [192.168.20.156] == [192.168.20.156]
> 7(26766) grep_sock_info - checking if port 5061 matches port 5061
> 7(26766) parse_headers: flags=4000
> 7(26766) pre_auth(): Credentials with given realm not found
> 7(26766) build_auth_hf(): 'WWW-Authenticate: Digest realm="192.168.20.156", nonce="4423cd4c884708795300456efae3cc8121e7155c"
>'
> 7(26766) parse_headers: flags=ffffffffffffffff
> 7(26766) check_via_address(192.168.20.187, 192.168.20.187, 0)
> 7(26766) tcp_send: tcp connection found (0x4060b6c8), acquiring fd
> 7(26766) tcp_send, c= 0x4060b6c8, n=8
>11(26780) handle_ser_child: read response= 4060b6c8, 1, fd -1 from 7 (26766)
> 7(26766) tcp_send: after receive_fd: c= 0x4060b6c8 n=4 fd=21
> 7(26766) tcp_send: sending...
> 7(26766) tls_update_fd: New fd is 21
> 7(26766) tls_write: Write was successful (722 bytes)
> 7(26766) tcp_send: after write: c= 0x4060b6c8 n=722 fd=21
> 7(26766) tcp_send: buf=
>SIP/2.0 401 Unauthorized
>Via: SIP/2.0/TLS 192.168.20.187:2049;branch=z9hG4bK-xwuy1h54dryy;rport=2049
>From: "test" <sip:test at 192.168.20.156:5061;transport=tls>;tag=3ntprlhika
>To: "test" <sip:test at 192.168.20.156:5061;transport=tls>;tag=010b4fa55c4d08d1039c6a916bb5ecdc.9c39
>Call-ID: 3c26700a0c35-l9lq3hhij6ml at snom190
>CSeq: 1 REGISTER
>WWW-Authenticate: Digest realm="192.168.20.156", nonce="4423cd4c884708795300456efae3cc8121e7155c"
>Server: OpenSer (1.1.0-dev16 -tls (i386/linux))
>Content-Length: 0
>Warning: 392 192.168.20.156:5061 "Noisy feedback tells:  pid=26766 req_src_ip=192.168.20.187 req_src_port=2049 in_uri=sip:192.168.20.156:5061;transport=tls out_uri=sip:192.168.20.156:5061;transport=tls via_cnt==1"
>
>
> 7(26766) DEBUG:destroy_avp_list: destroying list (nil)
> 7(26766) receive_msg: cleaning up
> 7(26766) tls_update_fd: New fd is 20
> 7(26766) tls_update_fd: New fd is 20
> 7(26766) tls_update_fd: New fd is 20
> 7(26766) _tls_read: 1079 bytes read
> 7(26766) tcp_read_req: content-length= 0
> 7(26766) SIP Request:
> 7(26766)  method:  <REGISTER>
> 7(26766)  uri:     <sip:192.168.20.156:5061;transport=tls>
> 7(26766)  version: <SIP/2.0>
> 7(26766) parse_headers: flags=2
> 7(26766) Found param type 232, <branch> = <z9hG4bK-6fjbha0qxrtw>; state=6
> 7(26766) Found param type 235, <rport> = <n/a>; state=17
> 7(26766) end of header reached, state=5
> 7(26766) parse_headers: Via found, flags=2
> 7(26766) parse_headers: this is the first via
> 7(26766) After parse_msg...
> 7(26766) preparing to run routing scripts...
> 7(26766) parse_headers: flags=100
> 7(26766) DEBUG:parse_to:end of header reached, state=9
> 7(26766) DEBUG: get_hdr_field: <To> [53]; uri=[sip:test at 192.168.20.156:5061;transport=tls]
> 7(26766) DEBUG: to body ["test" <sip:test at 192.168.20.156:5061;transport=tls>
>]
> 7(26766) get_hdr_field: cseq <CSeq>: <2> <REGISTER>
> 7(26766) DEBUG:maxfwd:is_maxfwd_present: value = 70
> 7(26766) parse_headers: flags=200
> 7(26766) DEBUG: get_hdr_body : content_length=0
> 7(26766) found end of header
> 7(26766) find_first_route: No Route headers found
> 7(26766) loose_route: There is no Route HF
> 7(26766) grep_sock_info - checking if host==us: 14==14 &&  [192.168.20.156] == [192.168.20.156]
> 7(26766) grep_sock_info - checking if port 5060 matches port 5061
> 7(26766) grep_sock_info - checking if host==us: 14==14 &&  [192.168.20.156] == [192.168.20.156]
> 7(26766) grep_sock_info - checking if port 5061 matches port 5061
> 7(26766) grep_sock_info - checking if host==us: 14==14 &&  [192.168.20.156] == [192.168.20.156]
> 7(26766) grep_sock_info - checking if port 5060 matches port 5061
> 7(26766) grep_sock_info - checking if host==us: 14==14 &&  [192.168.20.156] == [192.168.20.156]
> 7(26766) grep_sock_info - checking if port 5061 matches port 5061
> 7(26766) check_nonce(): comparing [4423cd4c884708795300456efae3cc8121e7155c] and [4423cd4c884708795300456efae3cc8121e7155c]
> 7(26766) HA1 string calculated: 53ee6c16b5102c59afa23cbd21a6d936
> 7(26766) check_response(): Our result = '5eea837512ca0655ce1369c41b5185b6'
> 7(26766) check_response(): Authorization is OK
> 7(26766) parse_headers: flags=ffffffffffffffff
> 7(26766) parse_headers: flags=8000000
> 7(26766) build_contact(): Created Contact HF: Contact: <sip:test at 192.168.20.187:2253;transport=tls;line=4f5o4cc1>;q=1;expires=246, <sip:test at 192.168.20.187:2254;transport=tls;line=4f5o4cc1>;q=1;expires=759, <sip:test at 192.168.20.187:2255;transport=tls;line=4f5o4cc1>;q=1;expires=1073, <sip:test at 192.168.20.187:2256;transport=tls;line=4f5o4cc1>;q=1;expires=1538, <sip:test at 192.168.20.187:2257;transport=tls;line=4f5o4cc1>;q=1;expires=1849, <sip:test at 192.168.20.187:2258;transport=tls;line=4f5o4cc1>;q=1;expires=2150, <sip:test at 192.168.20.187:2259;transport=tls;line=4f5o4cc1>;q=1;expires=2637, <sip:test at 192.168.20.187:2260;transport=tls;line=4f5o4cc1>;q=1;expires=3022, <sip:test at 192.168.20.187:2261;transport=tls;line=4f5o4cc1>;q=1;expires=3323, <sip:test at 192.168.20.187:2049;transport=tls;line=xxzpplzh>;q=1;expires=3442, <sip:test at 192.168.20.187:2049;transport=tls;line=kshlnn3b>;q=1;expires=3600
>
> 7(26766) parse_headers: flags=ffffffffffffffff
> 7(26766) check_via_address(192.168.20.187, 192.168.20.187, 0)
> 7(26766) tcp_send: tcp connection found (0x4060b6c8), acquiring fd
> 7(26766) tcp_send, c= 0x4060b6c8, n=8
>11(26780) handle_ser_child: read response= 4060b6c8, 1, fd -1 from 7 (26766)
> 7(26766) tcp_send: after receive_fd: c= 0x4060b6c8 n=4 fd=21
> 7(26766) tcp_send: sending...
> 7(26766) tls_update_fd: New fd is 21
> 7(26766) tls_write: Write was successful (1467 bytes)
> 7(26766) tcp_send: after write: c= 0x4060b6c8 n=1467 fd=21
> 7(26766) tcp_send: buf=
>SIP/2.0 200 OK
>Via: SIP/2.0/TLS 192.168.20.187:2049;branch=z9hG4bK-6fjbha0qxrtw;rport=2049
>From: "test" <sip:test at 192.168.20.156:5061;transport=tls>;tag=3ntprlhika
>To: "test" <sip:test at 192.168.20.156:5061;transport=tls>;tag=010b4fa55c4d08d1039c6a916bb5ecdc.a59e
>Call-ID: 3c26700a0c35-l9lq3hhij6ml at snom190
>CSeq: 2 REGISTER
>Contact: <sip:test at 192.168.20.187:2253;transport=tls;line=4f5o4cc1>;q=1;expires=246, <sip:test at 192.168.20.187:2254;transport=tls;line=4f5o4cc1>;q=1;expires=759, <sip:test at 192.168.20.187:2255;transport=tls;line=4f5o4cc1>;q=1;expires=1073, <sip:test at 192.168.20.187:2256;transport=tls;line=4f5o4cc1>;q=1;expires=1538, <sip:test at 192.168.20.187:2257;transport=tls;line=4f5o4cc1>;q=1;expires=1849, <sip:test at 192.168.20.187:2258;transport=tls;line=4f5o4cc1>;q=1;expires=2150, <sip:test at 192.168.20.187:2259;transport=tls;line=4f5o4cc1>;q=1;expires=2637, <sip:test at 192.168.20.187:2260;transport=tls;line=4f5o4cc1>;q=1;expires=3022, <sip:test at 192.168.20.187:2261;transport=tls;line=4f5o4cc1>;q=1;expires=3323, <sip:test at 192.168.20.187:2049;transport=tls;line=xxzpplzh>;q=1;expires=3442, <sip:test at 192.168.20.187:2049;transport=tls;line=kshlnn3b>;q=1;expires=3600
>Server: OpenSer (1.1.0-dev16 -tls (i386/linux))
>Content-Length: 0
>Warning: 392 192.168.20.156:5061 "Noisy feedback tells:  pid=26766 req_src_ip=192.168.20.187 req_src_port=2049 in_uri=sip:192.168.20.156:5061;transport=tls out_uri=sip:192.168.20.156:5061;transport=tls via_cnt==1"
>
>
> 7(26766) DEBUG:destroy_avp_list: destroying list (nil)
> 7(26766) receive_msg: cleaning up
> 7(26766) tcp_receive_loop: 0x4060b6c8 expired (81329, 81330)
> 7(26766) DBG: io_watch_del (0x80f17c0, 20, -1, 0x10) fd_no=2 called
> 7(26766) releasing con 0x4060b6c8, state 0, fd=20, id=209
> 7(26766)  extra_data 0x405dad88
>11(26780) handle_tcp_child: reader response= 4060b6c8, 0 from 0
>11(26780) DBG: io_watch_add(0x80f14a0, 25, 2, 0x4060b6c8), fd_no=15
>11(26780) handle_tcp_child: CONN_RELEASE  0x4060b6c8 refcnt= 0
>  
>
>------------------------------------------------------------------------
>
>_______________________________________________
>Users mailing list
>Users at openser.org
>http://openser.org/cgi-bin/mailman/listinfo/users
>  
>





More information about the sr-users mailing list