[Serusers] Re: Ser 0.9.6 + RADIUS

Greger V. Teigre greger at teigre.com
Mon Jan 15 09:25:17 CET 2007


You just sent the debug output for the first message (the one creating 
the challenge).  The next message should contain the credentials, which 
will be used for radius auth.
As far as I remember, by default radiusclient uses localhost to send its 
radius requests. When the radius server is only listening on a physical 
interface or remote server, you need to add a directive to 
radiusclient.conf. I don't remember right now.
g-)

Daniel Corbe wrote:
> Turned debug to 9, this is what I get
>
>
> 0(19309) SIP Request:
> 0(19309)  method:  <REGISTER>
> 0(19309)  uri:     <sip:192.168.1.109>
> 0(19309)  version: <SIP/2.0>
> 0(19309) parse_headers: flags=1
> 0(19309) Found param type 235, <rport> = <n/a>; state=6
> 0(19309) Found param type 232, <branch> =
> <z9hG4bK3AA0D153A44111DB884A0017F2C52DAE>; state=16
> 0(19309) end of header reached, state=5
> 0(19309) parse_headers: Via found, flags=1
> 0(19309) parse_headers: this is the first via
> 0(19309) After parse_msg...
> 0(19309) preparing to run routing scripts...
> 0(19309) parse_headers: flags=128
> 0(19309) end of header reached, state=9
> 0(19309) DEBUG: get_hdr_field: <To> [32]; uri=[sip:admin at 192.168.1.109]
> 0(19309) DEBUG: to body [1234 <sip:admin at 192.168.1.109>
> ]
> 0(19309) get_hdr_field: cseq <CSeq>: <40142> <REGISTER>
> 0(19309) DEBUG:maxfwd:is_maxfwd_present: value = 70
> 0(19309) DBG:maxfwd:process_maxfwd_header: value 70 decreased to 16
> 0(19309) parse_headers: flags=256
> 0(19309) DEBUG: get_hdr_body : content_length=0
> 0(19309) found end of header
> 0(19309) find_first_route: No Route headers found
> 0(19309) loose_route: There is no Route HF
> 0(19309) XLOG: xl_print_log: final buffer length 26
> 0(19309) REGISTER request received
> 0(19309) check_via_address(192.168.1.111, 192.168.1.111, 0)
> 0(19309) parse_headers: flags=64
> 0(19309) XLOG: xl_print_log: final buffer length 27
> 0(19309) NATed client, enabling NAT
> 0(19309) parse_headers: flags=4096
> 0(19309) pre_auth(): Credentials with given realm not found
> 0(19309) XLOG: xl_print_log: final buffer length 28
> 0(19309) No Digest, sending challenge 0(19309) build_auth_hf():
> 'WWW-Authenticate: Digest realm="192.168.1.109",
> nonce="45aaa391b970a38171714c791e2feec0b390aeed"
> '
> 0(19309) parse_headers: flags=-1
> 0(19309) check_via_address(192.168.1.111, 192.168.1.111, 0)
> 0(19309) DEBUG:destroy_avp_list: destroying list 0x8b8b80b0
> 0(19309) receive_msg: cleaning up
> 0(19309) SIP Request:
> 0(19309)  method:  <REGISTER>
> 0(19309)  uri:     <sip:192.168.1.109>
> 0(19309)  version: <SIP/2.0>
> 0(19309) parse_headers: flags=1
> 0(19309) Found param type 235, <rport> = <n/a>; state=6
> 0(19309) Found param type 232, <branch> =
> <z9hG4bK3AA5DFEFA44111DB884A0017F2C52DAE>; state=16
> 0(19309) end of header reached, state=5
> 0(19309) parse_headers: Via found, flags=1
> 0(19309) parse_headers: this is the first via
> 0(19309) After parse_msg...
> 0(19309) preparing to run routing scripts...
> 0(19309) parse_headers: flags=128
> 0(19309) end of header reached, state=9
> 0(19309) DEBUG: get_hdr_field: <To> [32]; uri=[sip:admin at 192.168.1.109]
> 0(19309) DEBUG: to body [1234 <sip:admin at 192.168.1.109>
> ]
> 0(19309) get_hdr_field: cseq <CSeq>: <40143> <REGISTER>
> 0(19309) DEBUG:maxfwd:is_maxfwd_present: value = 70
> 0(19309) DBG:maxfwd:process_maxfwd_header: value 70 decreased to 16
> 0(19309) parse_headers: flags=256
> 0(19309) DEBUG: get_hdr_body : content_length=0
> 0(19309) found end of header
> 0(19309) find_first_route: No Route headers found
> 0(19309) loose_route: There is no Route HF
> 0(19309) XLOG: xl_print_log: final buffer length 26
> 0(19309) REGISTER request received
> 0(19309) check_via_address(192.168.1.111, 192.168.1.111, 0)
> 0(19309) parse_headers: flags=64
> 0(19309) XLOG: xl_print_log: final buffer length 27
> 0(19309) NATed client, enabling NAT
> 0(19309) check_nonce(): comparing
> [45aaa391b970a38171714c791e2feec0b390aeed] and
> [45aaa391b970a38171714c791e2feec0b390aeed]
> 0(19309) res: -1
> 0(19309) radius_authorize_sterman(): Failure
> 0(19309) XLOG: xl_print_log: final buffer length 28
> 0(19309) No Digest, sending challenge 0(19309) build_auth_hf():
> 'WWW-Authenticate: Digest realm="192.168.1.109",
> nonce="45aaa391b970a38171714c791e2feec0b390aeed"
> '
> 0(19309) parse_headers: flags=-1
> 0(19309) check_via_address(192.168.1.111, 192.168.1.111, 0)
> 0(19309) DEBUG:destroy_avp_list: destroying list 0x8b8b80b0
> 0(19309) receive_msg: cleaning up
> 0(19309) udp_rcv_loop: probing packet received from 192.168.1.111 50195
> 0(19309) udp_rcv_loop: probing packet received from 192.168.1.111 50195
> 0(19309) SIP Request:
> 0(19309)  method:  <REGISTER>
> 0(19309)  uri:     <sip:192.168.1.109>
> 0(19309)  version: <SIP/2.0>
> 0(19309) parse_headers: flags=1
> 0(19309) Found param type 235, <rport> = <n/a>; state=6
> 0(19309) Found param type 232, <branch> =
> <z9hG4bK46BAEDC8A44111DB884A0017F2C52DAE>; state=16
> 0(19309) end of header reached, state=5
> 0(19309) parse_headers: Via found, flags=1
> 0(19309) parse_headers: this is the first via
> 0(19309) After parse_msg...
> 0(19309) preparing to run routing scripts...
> 0(19309) parse_headers: flags=128
> 0(19309) end of header reached, state=9
> 0(19309) DEBUG: get_hdr_field: <To> [32]; uri=[sip:admin at 192.168.1.109]
> 0(19309) DEBUG: to body [1234 <sip:admin at 192.168.1.109>
> ]
> 0(19309) get_hdr_field: cseq <CSeq>: <40144> <REGISTER>
> 0(19309) DEBUG:maxfwd:is_maxfwd_present: value = 70
> 0(19309) DBG:maxfwd:process_maxfwd_header: value 70 decreased to 16
> 0(19309) parse_headers: flags=256
> 0(19309) DEBUG: get_hdr_body : content_length=0
> 0(19309) found end of header
> 0(19309) find_first_route: No Route headers found
> 0(19309) loose_route: There is no Route HF
> 0(19309) XLOG: xl_print_log: final buffer length 26
> 0(19309) REGISTER request received
> 0(19309) check_via_address(192.168.1.111, 192.168.1.111, 0)
> 0(19309) parse_headers: flags=64
> 0(19309) XLOG: xl_print_log: final buffer length 27
> 0(19309) NATed client, enabling NAT
> 0(19309) parse_headers: flags=4096
> 0(19309) pre_auth(): Credentials with given realm not found
> 0(19309) XLOG: xl_print_log: final buffer length 28
> 0(19309) No Digest, sending challenge 0(19309) build_auth_hf():
> 'WWW-Authenticate: Digest realm="192.168.1.109",
> nonce="45aaa3a5f0d6c451172fad0e9784ef0e7a83193e"
> '
> 0(19309) parse_headers: flags=-1
> 0(19309) check_via_address(192.168.1.111, 192.168.1.111, 0)
> 0(19309) DEBUG:destroy_avp_list: destroying list 0x8b8b80b0
> 0(19309) receive_msg: cleaning up
> 0(19309) SIP Request:
> 0(19309)  method:  <REGISTER>
> 0(19309)  uri:     <sip:192.168.1.109>
> 0(19309)  version: <SIP/2.0>
> 0(19309) parse_headers: flags=1
> 0(19309) Found param type 235, <rport> = <n/a>; state=6
> 0(19309) Found param type 232, <branch> =
> <z9hG4bK46BF0C4DA44111DB884A0017F2C52DAE>; state=16
> 0(19309) end of header reached, state=5
> 0(19309) parse_headers: Via found, flags=1
> 0(19309) parse_headers: this is the first via
> 0(19309) After parse_msg...
> 0(19309) preparing to run routing scripts...
> 0(19309) parse_headers: flags=128
> 0(19309) end of header reached, state=9
> 0(19309) DEBUG: get_hdr_field: <To> [32]; uri=[sip:admin at 192.168.1.109]
> 0(19309) DEBUG: to body [1234 <sip:admin at 192.168.1.109>
> ]
> 0(19309) get_hdr_field: cseq <CSeq>: <40145> <REGISTER>
> 0(19309) DEBUG:maxfwd:is_maxfwd_present: value = 70
> 0(19309) DBG:maxfwd:process_maxfwd_header: value 70 decreased to 16
> 0(19309) parse_headers: flags=256
> 0(19309) DEBUG: get_hdr_body : content_length=0
> 0(19309) found end of header
> 0(19309) find_first_route: No Route headers found
> 0(19309) loose_route: There is no Route HF
> 0(19309) XLOG: xl_print_log: final buffer length 26
> 0(19309) REGISTER request received
> 0(19309) check_via_address(192.168.1.111, 192.168.1.111, 0)
> 0(19309) parse_headers: flags=64
> 0(19309) XLOG: xl_print_log: final buffer length 27
> 0(19309) NATed client, enabling NAT
> 0(19309) check_nonce(): comparing
> [45aaa3a5f0d6c451172fad0e9784ef0e7a83193e] and
> [45aaa3a5f0d6c451172fad0e9784ef0e7a83193e]
> 0(19309) res: -1
> 0(19309) radius_authorize_sterman(): Failure
> 0(19309) XLOG: xl_print_log: final buffer length 28
> 0(19309) No Digest, sending challenge 0(19309) build_auth_hf():
> 'WWW-Authenticate: Digest realm="192.168.1.109",
> nonce="45aaa3a5f0d6c451172fad0e9784ef0e7a83193e"
> '
> 0(19309) parse_headers: flags=-1
> 0(19309) check_via_address(192.168.1.111, 192.168.1.111, 0)
> 0(19309) DEBUG:destroy_avp_list: destroying list 0x8b8b80b0
> 0(19309) receive_msg: cleaning up
> 0(19309) udp_rcv_loop: probing packet received from 192.168.1.111 50195
>
> On 1/14/07, Daniel Corbe <daniel.junkmail at gmail.com> wrote:
>> I cannot get my SER to talk to my RADIUS server, its just blindly
>> 401ing things without ever making contact with RADIUS.
>>
>> SER config looks like this
>>
>> if (method == "REGISTER") {
>>         if (!radius_www_authorize("")) {
>>                 www_challenge("", "1");
>>                 break;
>>         };
>>
>>         save("location");
>> };
>>
>> radiusclient-ng servers file:
>> 192.168.1.103                   heslo
>>
>> radiusclient.conf:
>> auth_order      radius,local
>> login_tries     4
>> login_timeout   60
>> authserver      192.168.1.103:1812
>> acctserver      192.168.1.103:1813
>> dictionary      /usr/local/etc/radiusclient-ng/dictionary
>>
>> FreeRADIUS clients.conf:
>> client 192.168.1.109 {
>>         secret          = heslo
>>         shortname       = proxy1
>>         nastype         = other
>>
>> Not sure what to do!
>>
> _______________________________________________
> Serusers mailing list
> Serusers at lists.iptel.org
> http://lists.iptel.org/mailman/listinfo/serusers
>
>



More information about the sr-users mailing list