[Serusers] 0.10.99 - ERROR: authorize.c:359: Cannot obtain digest realm from parameter '$fd.digest_realm'

samuel samu60 at gmail.com
Wed Jan 10 11:01:11 CET 2007


Do you have the last CVS version?? There were some missing things in
the auth (for radius) but I think they were already fixed and they did
not affect sql auth...

The only difference I have from my tests and your logs seems to be the
flags of the digest_realm attribute, I've got 33 instead of 32...can
you check in attr_types table the flags of the digest_realm
attribute???
I am not sure (probably even wrong...) but I thing flags 32 are used
for serweb stuff and probably ser does not find the digest_realm
attribute (which should be 33 flagged) for the realm in the from
domain....

Just change it and see if it works...

I also would like to know if my 32 flag<->serweb is right...can anyone
shed some light on this??

Hope it helps,
Samuel.

2007/1/10, Greger V. Teigre <greger at teigre.com>:
> Did you find out? I cannot really see anything that could cause this.
> g-)
>
> tzieleniewski wrote:
> > HI All!
> >
> > I have encountered the following error and don't know waht to do with it:)
> > ERROR: authorize.c:359: Cannot obtain digest realm from parameter '$fd.digest_realm' the situation takes places when the following sip massage arives at ser:
> > #
> > U 2007/01/09 11:43:02.274949 127.0.0.1:7000 -> 127.0.0.1:5060
> > REGISTER sip:scscf.ims.touk.pl SIP/2.0.
> > Via: SIP/2.0/UDP 127.0.0.1:7000;rport;branch=z9hG4bK2575034C94BE793615C5BEE814464E5B.
> > From: tzl <sip:tzl at scscf.ims.touk.pl>;tag=1829574745.
> > To: tzl <sip:tzl at scscf.ims.touk.pl>.
> > Contact: "tzl" <sip:tzl at 127.0.0.1:7000>.
> > Call-ID: 3E67EAEFDC8BFC73844E4D0F849DF676 at scscf.ims.touk.pl.
> > CSeq: 38402 REGISTER.
> > Expires: 1800.
> > Max-Forwards: 70.
> > User-Agent: X-Lite release 1105d.
> > Content-Length: 0.
> > .
> >
> > My Register logic looks like this:
> > route[REGISTER]
> > {
> >    if (method=="REGISTER") {
> >       if (!$t.did) {
> >          sl_send_reply("403", "Register forwarding forbidden");
> >          drop;
> >       }
> >       if (!www_authenticate("$fd.digest_realm", "credentials")) {
> >          if ($? == -2) {
> >             sl_send_reply("500", "Internal Server Error");
> >          } else if ($? == -3) {
> >             sl_send_reply("400", "Bad Request");
> >          } else {
> >             if ($digest_challenge) {
> >                append_to_reply("%$digest_challenge");
> >             }
> >             sl_send_reply("401", "Unauthorized");
> >          }
> >          drop;
> >       };
> > }
> >
> > and here are my database contensts:
> > mysql> select * from uri;
> > +------------------------------+--------------------------+----------+-------+--------+
> > | uid                          | did                      | username | flags | scheme |
> > +------------------------------+--------------------------+----------+-------+--------+
> > | tzl at sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | tzl      |    61 | sip    |
> > +------------------------------+--------------------------+----------+-------+--------+
> >
> > mysql> select * from domain;
> > +--------------------------+--------------------------+-------+
> > | did                      | domain                   | flags |
> > +--------------------------+--------------------------+-------+
> > | sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl |    37 |
> > +--------------------------+--------------------------+-------+
> >
> > mysql> select * from domain_attrs;
> > +--------------------------+--------------+------+--------------------------+-------+
> > | did                      | name         | type | value                    | flags |
> > +--------------------------+--------------+------+--------------------------+-------+
> > | sipproxy.hellboy.touk.pl | sw_admin     |    2 | 0                        |    32 |
> > | sipproxy.hellboy.touk.pl | digest_realm |    2 | sipproxy.hellboy.touk.pl |    32 |
> > +--------------------------+--------------+------+--------------------------+-------+
> >
> > mysql> select * from credentials;
> > +---------------+--------------------------+--------------------------+----------+-------+----------------------------------+----------------------------------+------------------------------+
> > | auth_username | did                      | realm                    | password | flags | ha1                              | ha1b                             | uid                          |
> > +---------------+--------------------------+--------------------------+----------+-------+----------------------------------+----------------------------------+------------------------------+
> > | tzl           | sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | tzl      |    33 | df4a49c51b082f68b792d7e2177c6ed8 | 8ba18e21048f2f587ad3386b54b99e5e | tzl at sipproxy.hellboy.touk.pl |
> > | admin         | sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | heslo    |    32 |                                  |                                  | 0                            |
> > +---------------+--------------------------+--------------------------+----------+-------+----------------------------------+----------------------------------+------------------------------+
> >
> > Thanku for any help
> > Bests
> > Tomasz
> >
> > _______________________________________________
> > Serusers mailing list
> > Serusers at lists.iptel.org
> > http://lists.iptel.org/mailman/listinfo/serusers
> >
> >
> >
> _______________________________________________
> Serusers mailing list
> Serusers at lists.iptel.org
> http://lists.iptel.org/mailman/listinfo/serusers
>



More information about the sr-users mailing list