[SR-Users] OpenIMSCore and Kamalio Integration

"Andrés S. García Ruiz" asgarcia at um.es
Mon Nov 29 15:27:01 CET 2010


Thanks for your comment,

This is my configuration, could you please tell me how to disable 
authentication?

#!KAMAILIO
#
# Kamailio (OpenSER) SIP Server v3.1 - default configuration script
#     - web: http://www.kamailio.org
#     - git: http://sip-router.org
#
# Direct your questions about this file to: <sr-users at lists.sip-router.org>
#
# Refer to the Core CookBook at http://www.kamailio.org/dokuwiki/doku.php
# for an explanation of possible statements, functions and parameters.
#
# Several features can be enabled using '#!define WITH_FEATURE' directives:
#
# *** To run in debug mode:
#     - define WITH_DEBUG
#
# *** To enable mysql:
#     - define WITH_MYSQL
#
# *** To enable authentication execute:
#     - enable mysql
#     - define WITH_AUTH
#     - add users using 'kamctl'
#
# *** To enable IP authentication execute:
#     - enable mysql
#     - enable authentication
#     - define WITH_IPAUTH
#     - add IP addresses with group id '1' to 'address' table
#
# *** To enable persistent user location execute:
#     - enable mysql
#     - define WITH_USRLOCDB
#
# *** To enable presence server execute:
#     - enable mysql
#     - define WITH_PRESENCE
#
# *** To enable nat traversal execute:
#     - define WITH_NAT
#     - install RTPProxy: http://www.rtpproxy.org
#     - start RTPProxy:
#        rtpproxy -l _your_public_ip_ -s udp:localhost:7722
#
# *** To enable PSTN gateway routing execute:
#     - define WITH_PSTN
#     - set the value of pstn.gw_ip
#     - check route[PSTN] for regexp routing condition
#
# *** To enable database aliases lookup execute:
#     - enable mysql
#     - define WITH_ALIASDB
#
# *** To enable multi-domain support execute:
#     - enable mysql
#     - define WITH_MULTIDOMAIN
#
# *** To enable TLS support execute:
#     - adjust CFGDIR/tls.cfg as needed
#     - define WITH_TLS
#
# *** To enable XMLRPC support execute:
#     - define WITH_XMLRPC
#     - adjust route[XMLRPC] for access policy
#
# *** To enable anti-flood detection execute:
#     - adjust pike and htable=>ipban settings as needed (default is
#       block if more than 16 requests in 2 seconds and ban for 300 seconds)
#     - define WITH_ANTIFLOOD
#
# *** To enhance accounting execute:
#     - enable mysql
#     - define WITH_ACCDB
#     - add following columns to database
#!ifdef ACCDB_COMMENT
   ALTER TABLE acc ADD COLUMN src_user VARCHAR(64) NOT NULL DEFAULT '';
   ALTER TABLE acc ADD COLUMN src_domain VARCHAR(128) NOT NULL DEFAULT '';
   ALTER TABLE acc ADD COLUMN dst_ouser VARCHAR(64) NOT NULL DEFAULT '';
   ALTER TABLE acc ADD COLUMN dst_user VARCHAR(64) NOT NULL DEFAULT '';
   ALTER TABLE acc ADD COLUMN dst_domain VARCHAR(128) NOT NULL DEFAULT '';
   ALTER TABLE missed_calls ADD COLUMN src_user VARCHAR(64) NOT NULL 
DEFAULT '';
   ALTER TABLE missed_calls ADD COLUMN src_domain VARCHAR(128) NOT NULL 
DEFAULT '';
   ALTER TABLE missed_calls ADD COLUMN dst_ouser VARCHAR(64) NOT NULL 
DEFAULT '';
   ALTER TABLE missed_calls ADD COLUMN dst_user VARCHAR(64) NOT NULL 
DEFAULT '';
   ALTER TABLE missed_calls ADD COLUMN dst_domain VARCHAR(128) NOT NULL 
DEFAULT '';
#!endif

####### Defined Values #########

#!define WITH_DEBUG
#!define WITH_AUTH
#!define WITH_MYSQL
#!define WITH_USRLOCDB

# *** Value defines - IDs used later in config
#!ifdef WITH_MYSQL
# - database URL - used to connect to database server by modules such
#       as: auth_db, acc, usrloc, a.s.o.
#!define DBURL "mysql://openser:openserrw@localhost/openser"
#!endif
#!ifdef WITH_MULTIDOMAIN
# - the value for 'use_domain' parameters
#!define MULTIDOMAIN 1
#!else
#!define MULTIDOMAIN 0
#!endif

# - flags
#   FLT_ - per transaction (message) flags
#    FLB_ - per branch flags
#!define FLT_ACC 1
#!define FLT_ACCMISSED 2
#!define FLT_ACCFAILED 3
#!define FLT_NATS 5

#!define FLB_NATB 6
#!define FLB_NATSIPPING 7

####### Global Parameters #########

#!ifdef WITH_DEBUG
debug=4
log_stderror=yes
#!else
debug=2
log_stderror=no
#!endif

memdbg=5
memlog=5

log_facility=LOG_LOCAL0

fork=yes
children=4

/* uncomment the next line to disable TCP (default on) */
#disable_tcp=yes


/* uncomment the next line to disable the auto discovery of local aliases
    based on reverse DNS on IPs (default on) */
#auto_aliases=no

/* add local domain aliases */
alias="open-ims.test"

/* uncomment and configure the following line if you want Kamailio to
    bind on a specific interface/port/proto (default bind on all 
available) */
#listen=udp:10.0.0.10:5060

/* port to listen to
  * - can be specified more than once if needed to listen on many ports */
port=5060

#!ifdef WITH_TLS
enable_tls=yes
#!endif

####### Custom Parameters #########

# These parameters can be modified runtime via RPC interface
# - see the documentation of 'cfg_rpc' module.
#
# Format: group.id = value 'desc' description
# Access: $sel(cfg_get.group.id) or @cfg_get.group.id
#

#!ifdef WITH_PSTN
# PSTN GW Routing
#
# - pstn.gw_ip: valid IP or hostname as string value, example:
# pstn.gw_ip = "10.0.0.101" desc "My PSTN GW Address"
#
# - by default is empty to avoid misrouting
pstn.gw_ip = "" desc "PSTN GW Address"
#!endif


####### Modules Section ########

# set paths to location of modules
#!ifdef LOCAL_TEST_RUN
mpath="modules_k:modules"
#!else
mpath="/usr/local/lib/kamailio/modules_k/:/usr/local/lib/kamailio/modules/"
#!endif

#!ifdef WITH_MYSQL
loadmodule "db_mysql.so"
#!endif

loadmodule "mi_fifo.so"
loadmodule "kex.so"
loadmodule "tm.so"
loadmodule "tmx.so"
loadmodule "sl.so"
loadmodule "rr.so"
loadmodule "pv.so"
loadmodule "maxfwd.so"
loadmodule "usrloc.so"
loadmodule "registrar.so"
loadmodule "textops.so"
loadmodule "siputils.so"
loadmodule "xlog.so"
loadmodule "sanity.so"
loadmodule "ctl.so"
loadmodule "mi_rpc.so"
loadmodule "acc.so"

#!ifdef WITH_AUTH
loadmodule "auth.so"
loadmodule "auth_db.so"
#!ifdef WITH_IPAUTH
loadmodule "permissions.so"
#!endif
#!endif

#!ifdef WITH_ALIASDB
loadmodule "alias_db.so"
#!endif

#!ifdef WITH_MULTIDOMAIN
loadmodule "domain.so"
#!endif

#!ifdef WITH_PRESENCE
loadmodule "presence.so"
loadmodule "presence_xml.so"
#!endif

#!ifdef WITH_NAT
loadmodule "nathelper.so"
loadmodule "rtpproxy.so"
#!endif

#!ifdef WITH_TLS
loadmodule "tls.so"
#!endif

#!ifdef WITH_ANTIFLOOD
loadmodule "htable.so"
loadmodule "pike.so"
#!endif

#!ifdef WITH_XMLRPC
loadmodule "xmlrpc.so"
#!endif

# ----------------- setting module-specific parameters ---------------


# ----- mi_fifo params -----
modparam("mi_fifo", "fifo_name", "/tmp/kamailio_fifo")


# ----- tm params -----
# auto-discard branches from previous serial forking leg
modparam("tm", "failure_reply_mode", 3)
# default retransmission timeout: 30sec
modparam("tm", "fr_timer", 30000)
# default invite retransmission timeout after 1xx: 120sec
modparam("tm", "fr_inv_timer", 120000)


# ----- rr params -----
# add value to ;lr param to cope with most of the UAs
modparam("rr", "enable_full_lr", 1)
# do not append from tag to the RR (no need for this script)
modparam("rr", "append_fromtag", 0)


# ----- registrar params -----
modparam("registrar", "method_filtering", 1)
/* uncomment the next line to disable parallel forking via location */
# modparam("registrar", "append_branches", 0)
/* uncomment the next line not to allow more than 10 contacts per AOR */
#modparam("registrar", "max_contacts", 10)


# ----- acc params -----
/* what special events should be accounted ? */
modparam("acc", "early_media", 0)
modparam("acc", "report_ack", 0)
modparam("acc", "report_cancels", 0)
/* by default ww do not adjust the direct of the sequential requests.
    if you enable this parameter, be sure the enable "append_fromtag"
    in "rr" module */
modparam("acc", "detect_direction", 0)
/* account triggers (flags) */
modparam("acc", "log_flag", FLT_ACC)
modparam("acc", "log_missed_flag", FLT_ACCMISSED)
modparam("acc", "log_extra",
     
"src_user=$fU;src_domain=$fd;dst_ouser=$tU;dst_user=$rU;dst_domain=$rd")
modparam("acc", "failed_transaction_flag", FLT_ACCFAILED)
/* enhanced DB accounting */
#!ifdef WITH_ACCDB
modparam("acc", "db_flag", FLT_ACC)
modparam("acc", "db_missed_flag", FLT_ACCMISSED)
modparam("acc", "db_url", DBURL)
modparam("acc", "db_extra",
     
"src_user=$fU;src_domain=$fd;dst_ouser=$tU;dst_user=$rU;dst_domain=$rd")
#!endif


# ----- usrloc params -----
/* enable DB persistency for location entries */
#!ifdef WITH_USRLOCDB
modparam("usrloc", "db_url", DBURL)
modparam("usrloc", "db_mode", 2)
modparam("usrloc", "use_domain", MULTIDOMAIN)
#!endif


# ----- auth_db params -----
#!ifdef WITH_AUTH
modparam("auth_db", "db_url", DBURL)
modparam("auth_db", "calculate_ha1", yes)
modparam("auth_db", "password_column", "password")
modparam("auth_db", "load_credentials", "")
modparam("auth_db", "use_domain", MULTIDOMAIN)

# ----- permissions params -----
#!ifdef WITH_IPAUTH
modparam("permissions", "db_url", DBURL)
modparam("permissions", "db_mode", 1)
#!endif

#!endif


# ----- alias_db params -----
#!ifdef WITH_ALIASDB
modparam("alias_db", "db_url", DBURL)
modparam("alias_db", "use_domain", MULTIDOMAIN)
#!endif


# ----- domain params -----
#!ifdef WITH_MULTIDOMAIN
modparam("domain", "db_url", DBURL)
# use caching
modparam("domain", "db_mode", 1)
# register callback to match myself condition with domains list
modparam("domain", "register_myself", 1)
#!endif


#!ifdef WITH_PRESENCE
# ----- presence params -----
modparam("presence", "db_url", DBURL)

# ----- presence_xml params -----
modparam("presence_xml", "db_url", DBURL)
modparam("presence_xml", "force_active", 1)
#!endif


#!ifdef WITH_NAT
# ----- rtpproxy params -----
modparam("rtpproxy", "rtpproxy_sock", "udp:127.0.0.1:7722")

# ----- nathelper params -----
modparam("nathelper", "natping_interval", 30)
modparam("nathelper", "ping_nated_only", 1)
modparam("nathelper", "sipping_bflag", FLB_NATSIPPING)
modparam("nathelper", "sipping_from", "sip:pinger at kamailio.org")

# params needed for NAT traversal in other modules
modparam("nathelper|registrar", "received_avp", "$avp(RECEIVED)")
modparam("usrloc", "nat_bflag", FLB_NATB)
#!endif


#!ifdef WITH_TLS
# ----- tls params -----
modparam("tls", "config", "/usr/local/etc/kamailio/tls.cfg")
#!endif

#!ifdef WITH_ANTIFLOOD
# ----- pike params -----
modparam("pike", "sampling_time_unit", 2)
modparam("pike", "reqs_density_per_unit", 16)
modparam("pike", "remove_latency", 4)

# ----- htable params -----
# ip ban htable with autoexpire after 5 minutes
modparam("htable", "htable", "ipban=>size=8;autoexpire=300;")
#!endif

#!ifdef WITH_XMLRPC
# ----- xmlrpc params -----
modparam("xmlrpc", "route", "XMLRPC");
modparam("xmlrpc", "url_match", "^/RPC")
#!endif

####### Routing Logic ########


# Main SIP request routing logic
# - processing of any incoming SIP request starts with this route
route {

     # per request initial checks
     route(REQINIT);

     # NAT detection
     route(NAT);

     # handle requests within SIP dialogs
     route(WITHINDLG);

     ### only initial requests (no To tag)

     # CANCEL processing
     if (is_method("CANCEL"))
     {
         if (t_check_trans())
             t_relay();
         exit;
     }

     t_check_trans();

     # authentication
     route(AUTH);

     # record routing for dialog forming requests (in case they are routed)
     # - remove preloaded route headers
     remove_hf("Route");
     if (is_method("INVITE|SUBSCRIBE"))
         record_route();

     # account only INVITEs
     if (is_method("INVITE"))
     {
         setflag(FLT_ACC); # do accounting
     }

     # dispatch requests to foreign domains
     route(SIPOUT);

     ### requests for my local domains

     # handle presence related requests
     route(PRESENCE);

     # handle registrations
     route(REGISTRAR);

     if ($rU==$null)
     {
         # request with no Username in RURI
         sl_send_reply("484","Address Incomplete");
         exit;
     }

     # dispatch destinations to PSTN
     route(PSTN);

     # user location service
     route(LOCATION);

     route(RELAY);
}


route[RELAY] {
#!ifdef WITH_NAT
     if (check_route_param("nat=yes")) {
         setbflag(FLB_NATB);
     }
     if (isflagset(FLT_NATS) || isbflagset(FLB_NATB)) {
         route(RTPPROXY);
     }
#!endif

     /* example how to enable some additional event routes */
     if (is_method("INVITE")) {
         #t_on_branch("BRANCH_ONE");
         t_on_reply("REPLY_ONE");
         t_on_failure("FAIL_ONE");
     }

     if (!t_relay()) {
         sl_reply_error();
     }
     exit;
}

# Per SIP request initial checks
route[REQINIT] {
#!ifdef WITH_ANTIFLOOD
     # flood dection from same IP and traffic ban for a while
     # be sure you exclude checking trusted peers, such as pstn gateways
     # - local host excluded (e.g., loop to self)
     if(src_ip!=myself)
     {
         if($sht(ipban=>$si)!=$null)
         {
             # ip is already blocked
             xdbg("request from blocked IP - $rm from $fu (IP:$si:$sp)\n");
             exit;
         }
         if (!pike_check_req())
         {
             xlog("L_ALERT","ALERT: pike blocking $rm from $fu 
(IP:$si:$sp)\n");
             $sht(ipban=>$si) = 1;
             exit;
         }
     }
#!endif

     if (!mf_process_maxfwd_header("10")) {
         sl_send_reply("483","Too Many Hops");
         exit;
     }

     if(!sanity_check("1511", "7"))
     {
         xlog("Malformed SIP message from $si:$sp\n");
         exit;
     }
}

# Handle requests within SIP dialogs
route[WITHINDLG] {
     if (has_totag()) {
         # sequential request withing a dialog should
         # take the path determined by record-routing
         if (loose_route()) {
             if (is_method("BYE")) {
                 setflag(FLT_ACC); # do accounting ...
                 setflag(FLT_ACCFAILED); # ... even if the transaction fails
             }
             route(RELAY);
         } else {
             if (is_method("SUBSCRIBE") && uri == myself) {
                 # in-dialog subscribe requests
                 route(PRESENCE);
                 exit;
             }
             if ( is_method("ACK") ) {
                 if ( t_check_trans() ) {
                     # no loose-route, but stateful ACK;
                     # must be an ACK after a 487
                     # or e.g. 404 from upstream server
                     t_relay();
                     exit;
                 } else {
                     # ACK without matching transaction ... ignore and 
discard
                     exit;
                 }
             }
             sl_send_reply("404","Not here");
         }
         exit;
     }
}

# Handle SIP registrations
route[REGISTRAR] {
     if (is_method("REGISTER"))
     {
         if(isflagset(FLT_NATS))
         {
             setbflag(FLB_NATB);
             # uncomment next line to do SIP NAT pinging
             ## setbflag(FLB_NATSIPPING);
         }
         if (!save("location"))
             sl_reply_error();

         exit;
     }
}

# USER location service
route[LOCATION] {

#!ifdef WITH_ALIASDB
     # search in DB-based aliases
     alias_db_lookup("dbaliases");
#!endif

     if (!lookup("location")) {
         switch ($rc) {
             case -1:
             case -3:
                 t_newtran();
                 t_reply("404", "Not Found");
                 exit;
             case -2:
                 sl_send_reply("405", "Method Not Allowed");
                 exit;
         }
     }

     # when routing via usrloc, log the missed calls also
     if (is_method("INVITE"))
     {
         setflag(FLT_ACCMISSED);
     }
}

# Presence server route
route[PRESENCE] {
     if(!is_method("PUBLISH|SUBSCRIBE"))
         return;

#!ifdef WITH_PRESENCE
     if (!t_newtran())
     {
         sl_reply_error();
         exit;
     };

     if(is_method("PUBLISH"))
     {
                 if($hdr(Sender)!= NULL)
                         handle_publish("$hdr(Sender)");
                 else
                         handle_publish("");
                 t_release();
     }
     else
     if( is_method("SUBSCRIBE"))
     {
         handle_subscribe();
         t_release();
     }
     exit;
#!endif

     # if presence enabled, this part will not be executed
     if (is_method("PUBLISH") || $rU==$null)
     {
         sl_send_reply("404", "Not here");
         exit;
     }
     return;
}

# Authentication route
route[AUTH] {
#!ifdef WITH_AUTH
     if (is_method("REGISTER"))
     {
         # authenticate the REGISTER requests (uncomment to enable auth)
         if (!www_authorize("$td", "subscriber"))
         {
             www_challenge("$td", "0");
             exit;
         }

         if ($au!=$tU)
         {
             sl_send_reply("403","Forbidden auth ID");
             exit;
         }
     } else {

#!ifdef WITH_IPAUTH
         if(allow_source_address())
         {
             # source IP allowed
             return;
         }
#!endif
         # authenticate if from local subscriber
         if (from_uri==myself)
         {
             if (!proxy_authorize("$fd", "subscriber")) {
                 proxy_challenge("$fd", "0");
                 exit;
             }
             if (is_method("PUBLISH"))
             {
                 if ($au!=$tU) {
                     sl_send_reply("403","Forbidden auth ID");
                     exit;
                 }
             } else {
                 if ($au!=$fU) {
                     sl_send_reply("403","Forbidden auth ID");
                     exit;
                 }
             }

             consume_credentials();
             # caller authenticated
         } else {
             # caller is not local subscriber, then check if it calls
             # a local destination, otherwise deny, not an open relay here
             if (!uri==myself)
             {
                 sl_send_reply("403","Not relaying");
                 exit;
             }
         }
     }
#!endif
     return;
}

# Caller NAT detection route
route[NAT] {
#!ifdef WITH_NAT
     force_rport();
     if (nat_uac_test("19")) {
         if (method=="REGISTER") {
             fix_nated_register();
         } else {
             fix_nated_contact();
         }
         setflag(FLT_NATS);
     }
#!endif
     return;
}

# RTPProxy control
route[RTPPROXY] {
#!ifdef WITH_NAT
     if (is_method("BYE")) {
         unforce_rtp_proxy();
     } else if (is_method("INVITE")){
         force_rtp_proxy();
     }
     if (!has_totag()) add_rr_param(";nat=yes");
#!endif
     return;
}

# Routing to foreign domains
route[SIPOUT] {
     if (!uri==myself)
     {
         append_hf("P-hint: outbound\r\n");
         route(RELAY);
     }
}

# PSTN GW routing
route[PSTN] {
#!ifdef WITH_PSTN
     # check if PSTN GW IP is defined
     if (strempty($sel(cfg_get.pstn.gw_ip))) {
         xlog("SCRIPT: PSTN rotuing enabled but pstn.gw_ip not defined\n");
         return;
     }

     # route to PSTN dialed numbers starting with '+' or '00'
     #     (international format)
     # - update the condition to match your dialing rules for PSTN routing
     if(!($rU=~"^(\+|00)[1-9][0-9]{3,20}$"))
         return;

     # only local users allowed to call
     if(from_uri!=myself) {
         sl_send_reply("403", "Not Allowed");
         exit;
     }

     $ru = "sip:" + $rU + "@" + $sel(cfg_get.pstn.gw_ip);

     route(RELAY);
     exit;
#!endif

     return;
}

# XMLRPC routing
#!ifdef WITH_XMLRPC
route[XMLRPC]
{
     # allow XMLRPC from localhost
     if ((method=="POST" || method=="GET")
&& (src_ip==127.0.0.1)) {
         # close connection only for xmlrpclib user agents (there is a 
bug in
         # xmlrpclib: it waits for EOF before interpreting the response).
         if ($hdr(User-Agent) =~ "xmlrpclib")
             set_reply_close();
         set_reply_no_connect();
         dispatch_rpc();
         exit;
     }
     send_reply("403", "Forbidden");
     exit;
}
#!endif

# Sample branch router
branch_route[BRANCH_ONE] {
     xdbg("new branch at $ru\n");
}

# Sample onreply route
onreply_route[REPLY_ONE] {
     xdbg("incoming reply\n");
#!ifdef WITH_NAT
     if ((isflagset(FLT_NATS) || isbflagset(FLB_NATB))
&& status=~"(183)|(2[0-9][0-9])") {
         force_rtp_proxy();
     }
     if (isbflagset("6")) {
         fix_nated_contact();
     }
#!endif
}

# Sample failure route
failure_route[FAIL_ONE] {
#!ifdef WITH_NAT
     if (is_method("INVITE")
&& (isbflagset(FLB_NATB) || isflagset(FLT_NATS))) {
         unforce_rtp_proxy();
     }
#!endif

     if (t_is_canceled()) {
         exit;
     }

     # uncomment the following lines if you want to block client
     # redirect based on 3xx replies.
     ##if (t_check_status("3[0-9][0-9]")) {
     ##t_reply("404","Not found");
     ##    exit;
     ##}

     # uncomment the following lines if you want to redirect the failed
     # calls to a different new destination
     ##if (t_check_status("486|408")) {
     ##    sethostport("192.168.2.100:5060");
     ##    append_branch();
     ##    # do not set the missed call flag again
     ##    t_relay();
     ##}
}


Thanks a lot,
   Andrés.

El 29/11/2010 15:15, Klaus Darilion escribió:
> If you do not want to authenticate the requests then disable 
> authentication kamailio.cfg
>
> regards
> Klaus
>
> Am 29.11.2010 12:53, schrieb "Andrés S. García Ruiz":
>>
>> Hi everybody,
>>
>> I'm trying to deploy an IMS network with OpenIMSCore and Kamailio. Since
>> OpenIMSCore has been already tested along with Mobicents, now I want
>> substitute Mobicents for Kamailio. I've also successfully installed
>> Kamailio. I can run it without any problem, but when SIP Publish
>> messages arrive at Kamalio, it answers with "407 Proxy Authentication
>> Required". The IMS presentity is already registered against the
>> OpenIMSCore. How can I solve that problem?
>>
>> The publish message sent:
>>
>> PUBLISH sip:testuser01 at open-ims.test SIP/2.0
>> Route: <sip:ciervo.inf.um.es:5060;lr>,
>> <sip:iscmark at scscf.open-ims.test:6060;lr;s=1;h=0;d=0;a=7369703a74657374757365723031406f70656e2d696d732e74657374> 
>>
>>
>> Call-ID: K28QO9PYAE5vn3RNdYOkIEddMEd6yDiqeAW7DwSt6XV.
>> CSeq: 1 PUBLISH
>> From: "testuser01" <sip:testuser01 at open-ims.test>;tag=ff123bda
>> To: "testuser01" <sip:testuser01 at open-ims.test>
>> Via: SIP/2.0/UDP 155.54.210.135:6060;branch=z9hG4bKa31a.6cba1cd2.0
>> Via: SIP/2.0/UDP 155.54.210.134:4060;branch=z9hG4bKa31a.71481d13.0;i=1
>> Via: SIP/2.0/TCP
>> 155.54.190.166:8060;rport=41624;branch=z9hG4bK-d8754z-ce7487ff34be55f9-1---d8754z- 
>>
>>
>> Max-Forwards: 15
>> Content-Type: application/pidf+xml
>> Expires: 30000
>> Event: presence
>> Contact: <sip:testuser01 at 155.54.190.166:8060>
>> Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
>> SUBSCRIBE, INFO
>> User-Agent: X-Lite IMS-OSGi-Client 0.1 CVS-Mon_Nov_29_10-14-33_CET_2010
>> Content-Length: 451
>> P-Asserted-Identity: <sip:testuser01 at open-ims.test>
>> P-Charging-Vector:
>> icid-value="P-CSCFabcd000000004cf3708400000002";icid-generated-at=155.54.210.134;orig-ioi="open-ims.test" 
>>
>>
>>
>> <?xml version='1.0' encoding='UTF-8'?><presence
>> xmlns='urn:ietf:params:xml:ns:pidf'
>> xmlns:c='urn:ietf:params:xml:ns:pidf:cipid'
>> xmlns:dm='urn:ietf:params:xml:ns:pidf:data-model'
>> xmlns:rpid='urn:ietf:params:xml:ns:pidf:rpid'
>> entity='sip:testuser01 at open-ims.test'><tuple
>> id='t6b9a6ab3'><status><basic>open</basic></status></tuple><dm:person
>> id='p34b126e5'><rpid:activities><rpid:Online/></rpid:activities><dm:note>Online</dm:note></dm:person></presence> 
>>
>>
>>
>>
>> Kamailio answer:
>> SIP/2.0 407 Proxy Authentication Required
>> Call-ID: K28QO9PYAE5vn3RNdYOkIEddMEd6yDiqeAW7DwSt6XV.
>> CSeq: 1 PUBLISH
>> From: "testuser01" <sip:testuser01 at open-ims.test>;tag=ff123bda
>> To: "testuser01"
>> <sip:testuser01 at open-ims.test>;tag=b27e1a1d33761e85846fc98f5f3a7e58.3d3a
>> Via: SIP/2.0/UDP 155.54.210.135:6060;branch=z9hG4bKa31a.6cba1cd2.0
>> Via: SIP/2.0/UDP 155.54.210.134:4060;branch=z9hG4bKa31a.71481d13.0;i=1
>> Via: SIP/2.0/TCP
>> 155.54.190.166:8060;rport=41624;branch=z9hG4bK-d8754z-ce7487ff34be55f9-1---d8754z- 
>>
>>
>> Proxy-Authenticate: Digest realm="open-ims.test",
>> nonce="TPNwMkzzbwZRE1piAM8yHaXGsXvwS16v"
>> Server: kamailio (3.1.0 (i386/linux))
>> Content-Length: 0
>>
>>
>> Kamailio log:
>> 5(15391) DEBUG: <core> [parser/msg_parser.c:628]: SIP Request:
>> 5(15391) DEBUG: <core> [parser/msg_parser.c:630]: method: <PUBLISH>
>> 5(15391) DEBUG: <core> [parser/msg_parser.c:632]: uri:
>> <sip:testuser01 at open-ims.test>
>> 5(15391) DEBUG: <core> [parser/msg_parser.c:634]: version: <SIP/2.0>
>> 5(15391) DEBUG: <core> [parser/msg_parser.c:165]: get_hdr_field: cseq
>> <CSeq>: <1> <PUBLISH>
>> 5(15391) DEBUG: <core> [parser/parse_to.c:803]: end of header reached,
>> state=10
>> 5(15391) DEBUG: <core> [parser/msg_parser.c:185]: DEBUG: get_hdr_field:
>> <To> [45]; uri=[sip:testuser01 at open-ims.test]
>> 5(15391) DEBUG: <core> [parser/msg_parser.c:187]: DEBUG: to body
>> ["testuser01" <sip:testuser01 at open-ims.test>
>> ]
>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param type 232,
>> <branch> = <z9hG4bKa31a.6cba1cd2.0>; state=16
>> 5(15391) DEBUG: <core> [parser/parse_via.c:2300]: end of header reached,
>> state=5
>> 5(15391) DEBUG: <core> [parser/msg_parser.c:513]: parse_headers: Via
>> found, flags=2
>> 5(15391) DEBUG: <core> [parser/msg_parser.c:515]: parse_headers: this is
>> the first via
>> 5(15391) DEBUG: <core> [receive.c:145]: After parse_msg...
>> 5(15391) DEBUG: <core> [receive.c:186]: preparing to run routing 
>> scripts...
>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param type 232,
>> <branch> = <z9hG4bKa31a.71481d13.0>; state=6
>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param type 236,
>> <i> = <1>; state=16
>> 5(15391) DEBUG: <core> [parser/parse_via.c:2300]: end of header reached,
>> state=5
>> 5(15391) DEBUG: <core> [parser/msg_parser.c:513]: parse_headers: Via
>> found, flags=100
>> 5(15391) DEBUG: <core> [parser/msg_parser.c:526]: parse_headers: this is
>> the second via
>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param type 235,
>> <rport> = <41624>; state=6
>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param type 232,
>> <branch> = <z9hG4bK-d8754z-ce7487ff34be55f9-1---d8754z->; state=16
>> 5(15391) DEBUG: <core> [parser/parse_via.c:2300]: end of header reached,
>> state=5
>> 5(15391) DEBUG: <core> [parser/msg_parser.c:513]: parse_headers: Via
>> found, flags=100
>> 5(15391) DEBUG: maxfwd [mf_funcs.c:85]: value = 15
>> 5(15391) DEBUG: <core> [parser/msg_parser.c:199]: DEBUG: get_hdr_body :
>> content_length=451
>> 5(15391) DEBUG: <core> [parser/msg_parser.c:101]: found end of header
>> 5(15391) DEBUG: <core> [parser/parse_to.c:174]: DEBUG: add_param:
>> tag=ff123bda
>> 5(15391) DEBUG: <core> [parser/parse_to.c:803]: end of header reached,
>> state=29
>> 5(15391) DEBUG: sanity [mod_sanity.c:217]: all sanity checks passed
>> 5(15391) DEBUG: siputils [checks.c:73]: no totag
>> 5(15391) DEBUG: tm [t_lookup.c:1081]: DEBUG: t_check_msg: msg id=1
>> global id=0 T start=0xffffffff
>> 5(15391) DEBUG: tm [t_lookup.c:528]: t_lookup_request: start searching:
>> hash=41274, isACK=0
>> 5(15391) DEBUG: tm [t_lookup.c:485]: DEBUG: RFC3261 transaction matching
>> failed
>> 5(15391) DEBUG: tm [t_lookup.c:711]: DEBUG: t_lookup_request: no
>> transaction found
>> 5(15391) DEBUG: tm [t_lookup.c:1150]: DEBUG: t_check_msg: msg id=1
>> global id=1 T end=(nil)
>> 5(15391) DEBUG: <core> [socket_info.c:501]: grep_sock_info - checking if
>> host==us: 13==9 && [open-ims.test] == [127.0.0.1]
>> 5(15391) DEBUG: <core> [socket_info.c:504]: grep_sock_info - checking if
>> port 5060 matches port 5060
>> 5(15391) DEBUG: <core> [socket_info.c:501]: grep_sock_info - checking if
>> host==us: 13==14 && [open-ims.test] == [155.54.190.245]
>> 5(15391) DEBUG: <core> [socket_info.c:504]: grep_sock_info - checking if
>> port 5060 matches port 5060
>> 5(15391) DEBUG: <core> [socket_info.c:501]: grep_sock_info - checking if
>> host==us: 13==9 && [open-ims.test] == [127.0.0.1]
>> 5(15391) DEBUG: <core> [socket_info.c:504]: grep_sock_info - checking if
>> port 5060 matches port 5060
>> 5(15391) DEBUG: <core> [socket_info.c:501]: grep_sock_info - checking if
>> host==us: 13==14 && [open-ims.test] == [155.54.190.245]
>> 5(15391) DEBUG: <core> [socket_info.c:504]: grep_sock_info - checking if
>> port 5060 matches port 5060
>> 5(15391) DEBUG: auth_db [authorize.c:239]: realm value [open-ims.test]
>> 5(15391) DEBUG: auth [api.c:85]: auth:pre_auth: Credentials with realm
>> 'open-ims.test' not found
>> 5(15391) DEBUG: auth_db [authorize.c:257]: not authenticated
>> 5(15391) DEBUG: auth [challenge.c:102]: build_challenge_hf:
>> realm='open-ims.test'
>> 5(15391) DEBUG: auth [challenge.c:236]: auth: 'Proxy-Authenticate:
>> Digest realm="open-ims.test", nonce="TPNwMkzzbwZRE1piAM8yHaXGsXvwS16v"
>> '
>> 5(15391) DEBUG: sl [sl.c:278]: reply in stateless mode (sl)
>> 5(15391) DEBUG: <core> [msg_translator.c:207]:
>> check_via_address(155.54.210.135, 155.54.210.135, 0)
>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>> destroying list (nil)
>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>> destroying list (nil)
>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>> destroying list (nil)
>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>> destroying list (nil)
>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>> destroying list (nil)
>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>> destroying list (nil)
>> 5(15391) DEBUG: <core> [receive.c:289]: receive_msg: cleaning up
>>
>>
>> Thanks in advance,
>> Andrés.
>>




More information about the sr-users mailing list