[OpenSER-Users] radius+openser, OpenSer startup problem

raviprakash sunkara sunkara.raviprakash.feb14 at gmail.com
Wed Aug 8 07:54:00 CEST 2007


Ram,

can u Check the entity of the RadCheck table in Radius Databases, The entity
should be like this :-)

username = > xxxx at xx.xx.xxx.xx
Attribute   => Password
operaiton = > :=
value    =>  value of the Password

Thanks & Regrads
Sunkara Ravi Prakash
VoIP System Anaylst
India


On 8/8/07, Dan-Cristian Bogos <dan.bogos at gmail.com> wrote:
>
> Ram,
>
> from your radiusd logs: "User 12345 at x.x.x.x not found in radcheck ".
> You should make sure that this user is present into your radcheck
> table.
>
>
> DanB
>
> On 8/7/07, ram <talk2ram at gmail.com> wrote:
> >
> >
> >
> > On 8/8/07, ram <talk2ram at gmail.com> wrote:
> > >
> > >
> > >
> > > On 8/7/07, Dan-Cristian Bogos < dan.bogos at gmail.com> wrote:
> > > >
> > > >
> > > > Hi Ram,
> > > >
> > > > it looks like u have a problem using a configuration designed for
> > > > version 1.1 into version 1.2. For more information, checkout the
> > > > following link and do all the necessary changes:
> > > >
> > http://openser.org/dokuwiki/doku.php/install:1.1.x-to-1.2.x
> > - your
> > > > attention "avp_aliases was moved to core".
> > >
> >
> > Hi
> >
> > iam forgot to post my openser logs
> >
> > here is my error log when my sipura try to authenticate
> >
> > any suggestions
> >
> > ram
> >
> >
> >  2(13027) get_hdr_field: cseq <CSeq>: <50> <REGISTER>
> >  2(13027) DEBUG:maxfwd:is_maxfwd_present: value = 70
> >  2(13027) parse_headers: flags=200
> >  2(13027) DEBUG: get_hdr_body : content_length=0
> >  2(13027) found end of header
> >  2(13027) find_first_route: No Route headers found
> >  2(13027) loose_route: There is no Route HF
> >  2(13027) grep_sock_info - checking if host==us: 12==12 &&  [X.X.X.X] ==
> > [X.X.X.X ]
> >  2(13027) grep_sock_info - checking if port 5060 matches port 5060
> >  2(13027) grep_sock_info - checking if host==us: 12==12 &&  [X.X.X.X] ==
> > [X.X.X.X]
> >  2(13027) grep_sock_info - checking if port 5060 matches port 5060
> >  2(13027) check_nonce(): comparing
> > [46b8b9c77d84f6750219631d164c78a5b34d2682] and
> > [46b8b9c74cd29426652511110717e60c270b4144]
> >  2(13027) pre_auth(): Invalid nonce value received
> >  2(13027) build_auth_hf(): 'WWW-Authenticate: Digest realm=" X.X.X.X",
> > nonce="46b8c3843dc677a5fc9e5aae6101a1c6f30b5ed6"
> > '
> >  2(13027) parse_headers: flags=ffffffffffffffff
> >  2(13027) check_via_address(X.X.X.X.99, X.X.X.X.99, 0)
> >  2(13027) DEBUG:destroy_avp_list: destroying list (nil)
> >  2(13027) receive_msg: cleaning up
> >  1(13023) SIP Request:
> >  1(13023)  method:  <REGISTER>
> >  1(13023)  uri:     <sip:X.X.X.X>
> >  1(13023)  version: <SIP/2.0>
> >  1(13023) parse_headers: flags=2
> >  1(13023) Found param type 232, <branch> = <z9hG4bK-c4a0e25d>; state=16
> >  1(13023) end of header reached, state=5
> >  1(13023) parse_headers: Via found, flags=2
> >  1(13023) parse_headers: this is the first via
> >  1(13023) After parse_msg...
> >  1(13023) preparing to run routing scripts...
> >  1(13023) parse_headers: flags=100
> >  1(13023) DEBUG:parse_to:end of header reached, state=10
> >  1(13023) DBUG:parse_to: display={12345}, ruri={ sip:12345 at X.X.X.X}
> >  1(13023) DEBUG: get_hdr_field: <To> [32]; uri=[sip:12345 at X.X.X.X]
> >  1(13023) DEBUG: to body [12345 < sip:12345 at X.X.X.X>
> > ]
> >  1(13023) get_hdr_field: cseq <CSeq>: <51> <REGISTER>
> >  1(13023) DEBUG:maxfwd:is_maxfwd_present: value = 70
> >  1(13023) parse_headers: flags=200
> >  1(13023) DEBUG: get_hdr_body : content_length=0
> >  1(13023) found end of header
> >  1(13023) find_first_route: No Route headers found
> >  1(13023) loose_route: There is no Route HF
> >  1(13023) grep_sock_info - checking if host==us: 12==12 &&  [X.X.X.X] ==
> > [X.X.X.X ]
> >  1(13023) grep_sock_info - checking if port 5060 matches port 5060
> >  1(13023) grep_sock_info - checking if host==us: 12==12 &&  [X.X.X.X] ==
> > [X.X.X.X]
> >  1(13023) grep_sock_info - checking if port 5060 matches port 5060
> >  1(13023) check_nonce(): comparing
> > [46b8c3843dc677a5fc9e5aae6101a1c6f30b5ed6] and
> > [46b8c3843dc677a5fc9e5aae6101a1c6f30b5ed6]
> >  4(13030) SIP Request:
> >  4(13030)  method:  <REGISTER>
> >  4(13030)  uri:     <sip: X.X.X.X>
> >  4(13030)  version: <SIP/2.0>
> >  4(13030) parse_headers: flags=2
> >  4(13030) Found param type 232, <branch> = <z9hG4bK-c4a0e25d>; state=16
> >  4(13030) end of header reached, state=5
> >   4(13030) parse_headers: Via found, flags=2
> >  4(13030) parse_headers: this is the first via
> >  4(13030) After parse_msg...
> >  4(13030) preparing to run routing scripts...
> >  4(13030) parse_headers: flags=100
> >  4(13030) DEBUG:parse_to:end of header reached, state=10
> >  4(13030) DBUG:parse_to: display={12345}, ruri={sip:12345 at X.X.X.X}
> >  4(13030) DEBUG: get_hdr_field: <To> [32]; uri=[sip:12345 at X.X.X.X ]
> >  4(13030) DEBUG: to body [12345 <sip:12345 at X.X.X.X>
> > ]
> >  4(13030) get_hdr_field: cseq <CSeq>: <51> <REGISTER>
> >  4(13030) DEBUG:maxfwd:is_maxfwd_present: value = 70
> >  4(13030) parse_headers: flags=200
> >  4(13030) DEBUG: get_hdr_body : content_length=0
> >  4(13030) found end of header
> >  4(13030) find_first_route: No Route headers found
> >  4(13030) loose_route: There is no Route HF
> >  4(13030) grep_sock_info - checking if host==us: 12==12 &&  [X.X.X.X] ==
> > [X.X.X.X]
> >  4(13030) grep_sock_info - checking if port 5060 matches port 5060
> >  4(13030) grep_sock_info - checking if host==us: 12==12 &&  [ X.X.X.X]
> ==
> > [X.X.X.X]
> >  4(13030) grep_sock_info - checking if port 5060 matches port 5060
> >  4(13030) check_nonce(): comparing
> > [46b8c3843dc677a5fc9e5aae6101a1c6f30b5ed6] and
> > [46b8c3843dc677a5fc9e5aae6101a1c6f30b5ed6]
> >   2(13027) SIP Request:
> >  2(13027)  method:  <REGISTER>
> >  2(13027)  uri:     <sip:X.X.X.X>
> >  2(13027)  version: <SIP/2.0>
> >  2(13027) parse_headers: flags=2
> >  2(13027) Found param type 232, <branch> = <z9hG4bK-c4a0e25d>; state=16
> >  2(13027) end of header reached, state=5
> >  2(13027) parse_headers: Via found, flags=2
> >  2(13027) parse_headers: this is the first via
> >  2(13027) After parse_msg...
> >  2(13027) preparing to run routing scripts...
> >  2(13027) parse_headers: flags=100
> >  2(13027) DEBUG:parse_to:end of header reached, state=10
> >  2(13027) DBUG:parse_to: display={12345}, ruri={sip:12345 at X.X.X.X}
> >  2(13027) DEBUG: get_hdr_field: <To> [32]; uri=[ sip:12345 at X.X.X.X]
> >  2(13027) DEBUG: to body [12345 <sip:12345 at X.X.X.X>
> > ]
> >  2(13027) get_hdr_field: cseq <CSeq>: <51> <REGISTER>
> >  2(13027) DEBUG:maxfwd:is_maxfwd_present: value = 70
> >  2(13027) parse_headers: flags=200
> >  2(13027) DEBUG: get_hdr_body : content_length=0
> >  2(13027) found end of header
> >  2(13027) find_first_route: No Route headers found
> >  2(13027) loose_route: There is no Route HF
> >  2(13027) grep_sock_info - checking if host==us: 12==12 &&  [X.X.X.X] ==
> > [X.X.X.X]
> >  2(13027) grep_sock_info - checking if port 5060 matches port 5060
> >  2(13027) grep_sock_info - checking if host==us: 12==12 &&  [ X.X.X.X]
> ==
> > [X.X.X.X]
> >  2(13027) grep_sock_info - checking if port 5060 matches port 5060
> >  2(13027) check_nonce(): comparing
> > [46b8c3843dc677a5fc9e5aae6101a1c6f30b5ed6] and
> > [46b8c3843dc677a5fc9e5aae6101a1c6f30b5ed6]
> >   1(13023) ERROR:auth_radius:radius_authorize_sterman:
> > rc_auth failed
> >  1(13023) build_auth_hf(): 'WWW-Authenticate: Digest realm="X.X.X.X",
> > nonce="46b8c386ef003653667ceb8f5946c66c39a5916e"
> > '
> >  1(13023) parse_headers: flags=ffffffffffffffff
> >  1(13023) check_via_address(X.X.X.X.99, X.X.X.X.99, 0)
> >  1(13023) DEBUG:destroy_avp_list: destroying list (nil)
> >  1(13023) receive_msg: cleaning up
> >  1(13023) SIP Request:
> >  1(13023)  method:  <REGISTER>
> >  1(13023)  uri:     <sip:X.X.X.X>
> >  1(13023)  version: <SIP/2.0>
> >  1(13023) parse_headers: flags=2
> >  1(13023) Found param type 232, <branch> = <z9hG4bK-cab7643a>; state=16
> >  1(13023) end of header reached, state=5
> >  1(13023) parse_headers: Via found, flags=2
> >  1(13023) parse_headers: this is the first via
> >  1(13023) After parse_msg...
> >  1(13023) preparing to run routing scripts...
> >  1(13023) parse_headers: flags=100
> >  1(13023) DEBUG:parse_to:end of header reached, state=10
> >  1(13023) DBUG:parse_to: display={12345}, ruri={sip:12345 at X.X.X.X}
> >  1(13023) DEBUG: get_hdr_field: <To> [32]; uri=[ sip:12345 at X.X.X.X]
> >  1(13023) DEBUG: to body [12345 <sip:12345 at X.X.X.X>
> > ]
> >  1(13023) get_hdr_field: cseq <CSeq>: <52> <REGISTER>
> >  1(13023) DEBUG:maxfwd:is_maxfwd_present: value = 70
> >  1(13023) parse_headers: flags=200
> >  1(13023) DEBUG: get_hdr_body : content_length=0
> >  1(13023) found end of header
> >  1(13023) find_first_route: No Route headers found
> >  1(13023) loose_route: There is no Route HF
> >  1(13023) grep_sock_info - checking if host==us: 12==12 &&  [X.X.X.X] ==
> > [X.X.X.X]
> >  1(13023) grep_sock_info - checking if port 5060 matches port 5060
> >  1(13023) grep_sock_info - checking if host==us: 12==12 &&  [ X.X.X.X]
> ==
> > [X.X.X.X]
> >  1(13023) grep_sock_info - checking if port 5060 matches port 5060
> >  1(13023) check_nonce(): comparing
> > [46b8c386ef003653667ceb8f5946c66c39a5916e] and
> > [46b8c386ef003653667ceb8f5946c66c39a5916e]
> >   4(13030) ERROR:auth_radius:radius_authorize_sterman:
> > rc_auth failed
> >  4(13030) build_auth_hf(): 'WWW-Authenticate: Digest realm="X.X.X.X",
> > nonce="46b8c386ef003653667ceb8f5946c66c39a5916e"
> > '
> >  4(13030) parse_headers: flags=ffffffffffffffff
> >  4(13030) check_via_address(X.X.X.X.99, X.X.X.X.99, 0)
> >  4(13030) DEBUG:destroy_avp_list: destroying list (nil)
> >  4(13030) receive_msg: cleaning up
> >  4(13030) SIP Request:
> >  4(13030)  method:  <REGISTER>
> >  4(13030)  uri:     <sip:X.X.X.X>
> >  4(13030)  version: <SIP/2.0>
> >  4(13030) parse_headers: flags=2
> >  4(13030) Found param type 232, <branch> = <z9hG4bK-cab7643a>; state=16
> >  4(13030) end of header reached, state=5
> >  4(13030) parse_headers: Via found, flags=2
> >  4(13030) parse_headers: this is the first via
> >  4(13030) After parse_msg...
> >  4(13030) preparing to run routing scripts...
> >  4(13030) parse_headers: flags=100
> >  4(13030) DEBUG:parse_to:end of header reached, state=10
> >  4(13030) DBUG:parse_to: display={12345}, ruri={sip:12345 at X.X.X.X}
> >  4(13030) DEBUG: get_hdr_field: <To> [32]; uri=[ sip:12345 at X.X.X.X]
> >  4(13030) DEBUG: to body [12345 <sip:12345 at X.X.X.X>
> > ]
> >  4(13030) get_hdr_field: cseq <CSeq>: <52> <REGISTER>
> >  4(13030) DEBUG:maxfwd:is_maxfwd_present: value = 70
> >  4(13030) parse_headers: flags=200
> >  4(13030) DEBUG: get_hdr_body : content_length=0
> >  4(13030) found end of header
> >  4(13030) find_first_route: No Route headers found
> >  4(13030) loose_route: There is no Route HF
> >  4(13030) grep_sock_info - checking if host==us: 12==12 &&  [X.X.X.X] ==
> > [X.X.X.X]
> >  4(13030) grep_sock_info - checking if port 5060 matches port 5060
> >  4(13030) grep_sock_info - checking if host==us: 12==12 &&  [ X.X.X.X]
> ==
> > [X.X.X.X]
> >  4(13030) grep_sock_info - checking if port 5060 matches port 5060
> >  4(13030) check_nonce(): comparing
> > [46b8c386ef003653667ceb8f5946c66c39a5916e] and
> > [46b8c386ef003653667ceb8f5946c66c39a5916e]
> >   3(13029) SIP Request:
> >  3(13029)  method:  <REGISTER>
> >  3(13029)  uri:     <sip:X.X.X.X>
> >  3(13029)  version: <SIP/2.0>
> >  3(13029) parse_headers: flags=2
> >  3(13029) Found param type 232, <branch> = <z9hG4bK-cab7643a>; state=16
> >  3(13029) end of header reached, state=5
> >  3(13029) parse_headers: Via found, flags=2
> >  3(13029) parse_headers: this is the first via
> >  3(13029) After parse_msg...
> >  3(13029) preparing to run routing scripts...
> >  3(13029) parse_headers: flags=100
> >  3(13029) DEBUG:parse_to:end of header reached, state=10
> >  3(13029) DBUG:parse_to: display={12345}, ruri={sip:12345 at X.X.X.X}
> >  3(13029) DEBUG: get_hdr_field: <To> [32]; uri=[ sip:12345 at X.X.X.X]
> >  3(13029) DEBUG: to body [12345 <sip:12345 at X.X.X.X>
> > ]
> >  3(13029) get_hdr_field: cseq <CSeq>: <52> <REGISTER>
> >  3(13029) DEBUG:maxfwd:is_maxfwd_present: value = 70
> >  3(13029) parse_headers: flags=200
> >  3(13029) DEBUG: get_hdr_body : content_length=0
> >  3(13029) found end of header
> >  3(13029) find_first_route: No Route headers found
> >  3(13029) loose_route: There is no Route HF
> >  3(13029) grep_sock_info - checking if host==us: 12==12 &&  [X.X.X.X] ==
> > [X.X.X.X]
> >  3(13029) grep_sock_info - checking if port 5060 matches port 5060
> >  3(13029) grep_sock_info - checking if host==us: 12==12 &&  [ X.X.X.X]
> ==
> > [X.X.X.X]
> >  3(13029) grep_sock_info - checking if port 5060 matches port 5060
> >  3(13029) check_nonce(): comparing
> > [46b8c386ef003653667ceb8f5946c66c39a5916e] and
> > [46b8c386ef003653667ceb8f5946c66c39a5916e]
> >   2(13027) ERROR:auth_radius:radius_authorize_sterman:
> > rc_auth failed
> >  2(13027) build_auth_hf(): 'WWW-Authenticate: Digest realm="X.X.X.X",
> > nonce="46b8c388a3a803a04e8a22ee660de29dacab1456"
> > '
> >  2(13027) parse_headers: flags=ffffffffffffffff
> >  2(13027) check_via_address(X.X.X.X.99, X.X.X.X.99, 0)
> >  2(13027) DEBUG:destroy_avp_list: destroying list (nil)
> >  2(13027) receive_msg: cleaning up
> >  1(13023) ERROR:auth_radius:radius_authorize_sterman:
> > rc_auth failed
> >  1(13023) build_auth_hf(): 'WWW-Authenticate: Digest realm="X.X.X.X",
> > nonce="46b8c388a3a803a04e8a22ee660de29dacab1456"
> > '
> >  1(13023) parse_headers: flags=ffffffffffffffff
> >  1(13023) check_via_address( X.X.X.X.99, X.X.X.X.99, 0)
> >  1(13023) DEBUG:destroy_avp_list: destroying list (nil)
> >  1(13023) receive_msg: cleaning up
> >  4(13030) ERROR:auth_radius:radius_authorize_sterman:
> > rc_auth failed
> >  4(13030) build_auth_hf(): 'WWW-Authenticate: Digest realm=" X.X.X.X",
> > nonce="46b8c388a3a803a04e8a22ee660de29dacab1456"
> > '
> >  4(13030) parse_headers: flags=ffffffffffffffff
> >  4(13030) check_via_address(X.X.X.X.99, X.X.X.X.99, 0)
> >  4(13030) DEBUG:destroy_avp_list: destroying list (nil)
> >  4(13030) receive_msg: cleaning up
> >  3(13029) ERROR:auth_radius:radius_authorize_sterman:
> > rc_auth failed
> >  3(13029) build_auth_hf(): 'WWW-Authenticate: Digest realm="X.X.X.X",
> > nonce="46b8c38980794d4ddca01a8de941789cb20934a0"
> > '
> >  3(13029) parse_headers: flags=ffffffffffffffff
> >  3(13029) check_via_address(X.X.X.X.99, X.X.X.X.99, 0)
> >  3(13029) DEBUG:destroy_avp_list: destroying list (nil)
> >  3(13029) receive_msg: cleaning up
> >
> >
> > _______________________________________________
> > Users mailing list
> > Users at openser.org
> > http://openser.org/cgi-bin/mailman/listinfo/users
> >
> >
>
> _______________________________________________
> Users mailing list
> Users at openser.org
> http://openser.org/cgi-bin/mailman/listinfo/users
>



-- 
Thanks &Regards
Ravi Prakash Sunkara
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sip-router.org/pipermail/sr-users/attachments/20070808/bcfc53e3/attachment.htm>


More information about the sr-users mailing list