[Serusers] WARNING: rtpp_test: can't get version of the RTP proxy

Ryan Churches ryan.churches at gmail.com
Thu Nov 2 02:21:12 CET 2006


Im following "Getting Started with SER" and I'm stuck on the chapter
about nat traversal

Ive tried both methods, currently im working on rtpptoxy.  the exact
errors I get when i try to make calls from behind NAT are:

0(1731) WARNING: rtpp_test: can't get version of the RTP proxy
0(1731) WARNING: rtpp_test: support for RTP proxy has been disabled
0(1731) ERROR: force_rtp_proxy2: support for RTP proxy is disabled

i have compiled and installed rtpproxy, and made sure the permissions were set.

bmy bin # ps ax|grep rtp
 1714 ?        Ss     0:00 ./rtpproxy

bmy bin # ls -la /var/run/rtpproxy.*
-rw-r--r-- 1 root root 5 Nov  1 19:27 /var/run/rtpproxy.pid
srwxr-xr-x 1 root root 0 Nov  1 19:27 /var/run/rtpproxy.sock

i have attached my ser.cfg but below are some of the parts of it

debug=3         # debug level (cmd line: -dddddddddd)
fork=no
log_stderror=yes	# (cmd line: -E)

/* Uncomment these lines to enter debugging mode
fork=no
log_stderror=yes
*/

check_via=no	# (cmd. line: -v)
dns=no           # (cmd. line: -r)
rev_dns=no      # (cmd. line: -R)

listen=10.0.0.10
alias=hostname.dyndns.org
port=6060
children=4
fifo="/tmp/ser_fifo"
fifo_db_url="mysql://user:pw@localhost/ser"

<skip>

modparam("nathelper", "rtpproxy_sock", "unix:/var/run/rtpproxy.sock")

<skip>

route{

	# initial sanity checks -- messages with
	# max_forwards==0, or excessively long requests
	if (!mf_process_maxfwd_header("10")) {
		sl_send_reply("483","Too Many Hops");
		break;
	};
	if (msg:len >=  2048 ) {
		sl_send_reply("513", "Message too big");
		break;
	};
	

	# we record-route all messages -- to make sure that
	# subsequent messages will go through our proxy; that's
	# particularly good if upstream and downstream entities
	# use different transport protocol
	if (method!="REGISTER") {
		record_route();
	};	

	if (method=="BYE" || method=="CANCEL") {
		unforce_rtp_proxy();
	}
	
	# subsequent messages withing a dialog should take the
	# path determined by record-routing
	if (loose_route()) {
		if ((method=="INVITE" || method=="REFER") && !has_totag()) {
      			sl_send_reply("403", "Forbidden");
      			break;
    		};
	if (method=="INVITE") {
		if (!proxy_authorize("","subscriber")) {
        		proxy_challenge("","0");
 			break;
      		}else if (!check_from()) {
        		sl_send_reply("403", "Use From=ID");
        		break;
      		};

      		consume_credentials();

      		if (nat_uac_test("19")) {
        		setflag(6);
			force_rport();
			fix_nated_contact();
      		};
		force_rtp_proxy("l");
    	};	

	route(1);
   	break;
	};

#======= call type processing section
	
	if (!uri==myself) {
		append_hf("P-hint: outbound\r\n");
		route(4);
		route(1);
		break;
	};

	if (method=="ACK") {
		route(1);
		break;
	} else if (method=="CANCEL") {
		route(1);
		break;
	} else if (method=="INVITE") {
	  	route(3);
	  	break;
	} else if (method=="REGISTER") {
	  	route(2);
	  	break;
	};

	lookup("aliases");
	if (uri!=myself) {	
		route(4);
		route(1);
		break;
	};
	
	if (!lookup("location")) {
		sl_send_reply("404", "User Not Found");
		break;
	};

	route(1);
}

route[1]
{
	t_on_reply("1");
	# send it out now; use stateful forwarding as it works reliably
	# even for UDP2TCP
	if (!t_relay()) {
		if (method=="INVITE" || isflagset(6)) {
			unforce_rtp_proxy();
		};
		sl_reply_error();
	};
}

route[2] {
	#-------------------------
	#REGISTER Message Handler
	#-------------------------
	if (!search("^Contact:[ ]*\*") && nat_uac_test("19")) {
		setflag(6);
		fix_nated_register();
		force_rport();
	};

	sl_send_reply("100", "Trying");

	if (!www_authorize("","subscriber")) {
		www_challenge("","0");
		break;
	};

	if (!check_to()) {
		sl_send_reply("401", "Unauthorized");
		break;
	};

	consume_credentials();	

	if (!save("location")) {
		sl_reply_error();
	};
}

route[3] {
#----------
#--INVITE Message Handler
#-----------
	if (!proxy_authorize("","subscriber")) {
		proxy_challenge("","0");
		break;
	} else if (!check_from()) {
	  	sl_send_reply("403", "Use From=ID");
	  	break;
	};

	consume_credentials();
	
	if (nat_uac_test("19")) {
    		setflag(6);
     	}

	lookup("aliases");
	if (uri!=myself) {
		route(4);
		route(1);
		break;
	};

	if (!lookup("location")) {
		sl_send_reply("404", "User Not Found");
		break;
	};

	route(4);
	route(1);
}

route[4] {
#NAT Traversal
	if (isflagset(6)) {
		force_rport();
		fix_nated_contact();
		force_rtp_proxy();
	}
}

onreply_route[1] {
	if (isflagset(6) && status=~"(180)|(183)|2[0-9][0-9]") {
		if (!search("^Contact-Length:[ ]*0")) {
			force_rtp_proxy();
		};
	};
	if (nat_uac_test("1")) {
		fix_nated_contact();
	};
}
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: ser.cfg
URL: <http://lists.sip-router.org/pipermail/sr-users/attachments/20061101/d64bc65e/attachment.txt>


More information about the sr-users mailing list