[SR-Users] OpenIMSCore and Kamalio Integration

Daniel-Constantin Mierla miconda at gmail.com
Tue Nov 30 21:56:39 CET 2010


Hello,

the comments at the beginning of the configuration files tells you more 
about how some features are enabled/disabled. I assume you read them as 
you enabled authenitcation (by default is disabled) -- you have #!define 
WITH_AUTH.

Maybe in your particular case the best solution is to enable IP 
authentication and add the IP address of OpenIMSCore in address table 
with group id 1.

Cheers,
Daniel

On 11/29/10 3:27 PM, "Andrés S. García Ruiz" wrote:
>
> Thanks for your comment,
>
> This is my configuration, could you please tell me how to disable 
> authentication?
>
> #!KAMAILIO
> #
> # Kamailio (OpenSER) SIP Server v3.1 - default configuration script
> #     - web: http://www.kamailio.org
> #     - git: http://sip-router.org
> #
> # Direct your questions about this file to: 
> <sr-users at lists.sip-router.org>
> #
> # Refer to the Core CookBook at http://www.kamailio.org/dokuwiki/doku.php
> # for an explanation of possible statements, functions and parameters.
> #
> # Several features can be enabled using '#!define WITH_FEATURE' 
> directives:
> #
> # *** To run in debug mode:
> #     - define WITH_DEBUG
> #
> # *** To enable mysql:
> #     - define WITH_MYSQL
> #
> # *** To enable authentication execute:
> #     - enable mysql
> #     - define WITH_AUTH
> #     - add users using 'kamctl'
> #
> # *** To enable IP authentication execute:
> #     - enable mysql
> #     - enable authentication
> #     - define WITH_IPAUTH
> #     - add IP addresses with group id '1' to 'address' table
> #
> # *** To enable persistent user location execute:
> #     - enable mysql
> #     - define WITH_USRLOCDB
> #
> # *** To enable presence server execute:
> #     - enable mysql
> #     - define WITH_PRESENCE
> #
> # *** To enable nat traversal execute:
> #     - define WITH_NAT
> #     - install RTPProxy: http://www.rtpproxy.org
> #     - start RTPProxy:
> #        rtpproxy -l _your_public_ip_ -s udp:localhost:7722
> #
> # *** To enable PSTN gateway routing execute:
> #     - define WITH_PSTN
> #     - set the value of pstn.gw_ip
> #     - check route[PSTN] for regexp routing condition
> #
> # *** To enable database aliases lookup execute:
> #     - enable mysql
> #     - define WITH_ALIASDB
> #
> # *** To enable multi-domain support execute:
> #     - enable mysql
> #     - define WITH_MULTIDOMAIN
> #
> # *** To enable TLS support execute:
> #     - adjust CFGDIR/tls.cfg as needed
> #     - define WITH_TLS
> #
> # *** To enable XMLRPC support execute:
> #     - define WITH_XMLRPC
> #     - adjust route[XMLRPC] for access policy
> #
> # *** To enable anti-flood detection execute:
> #     - adjust pike and htable=>ipban settings as needed (default is
> #       block if more than 16 requests in 2 seconds and ban for 300 
> seconds)
> #     - define WITH_ANTIFLOOD
> #
> # *** To enhance accounting execute:
> #     - enable mysql
> #     - define WITH_ACCDB
> #     - add following columns to database
> #!ifdef ACCDB_COMMENT
>   ALTER TABLE acc ADD COLUMN src_user VARCHAR(64) NOT NULL DEFAULT '';
>   ALTER TABLE acc ADD COLUMN src_domain VARCHAR(128) NOT NULL DEFAULT '';
>   ALTER TABLE acc ADD COLUMN dst_ouser VARCHAR(64) NOT NULL DEFAULT '';
>   ALTER TABLE acc ADD COLUMN dst_user VARCHAR(64) NOT NULL DEFAULT '';
>   ALTER TABLE acc ADD COLUMN dst_domain VARCHAR(128) NOT NULL DEFAULT '';
>   ALTER TABLE missed_calls ADD COLUMN src_user VARCHAR(64) NOT NULL 
> DEFAULT '';
>   ALTER TABLE missed_calls ADD COLUMN src_domain VARCHAR(128) NOT NULL 
> DEFAULT '';
>   ALTER TABLE missed_calls ADD COLUMN dst_ouser VARCHAR(64) NOT NULL 
> DEFAULT '';
>   ALTER TABLE missed_calls ADD COLUMN dst_user VARCHAR(64) NOT NULL 
> DEFAULT '';
>   ALTER TABLE missed_calls ADD COLUMN dst_domain VARCHAR(128) NOT NULL 
> DEFAULT '';
> #!endif
>
> ####### Defined Values #########
>
> #!define WITH_DEBUG
> #!define WITH_AUTH
> #!define WITH_MYSQL
> #!define WITH_USRLOCDB
>
> # *** Value defines - IDs used later in config
> #!ifdef WITH_MYSQL
> # - database URL - used to connect to database server by modules such
> #       as: auth_db, acc, usrloc, a.s.o.
> #!define DBURL "mysql://openser:openserrw@localhost/openser"
> #!endif
> #!ifdef WITH_MULTIDOMAIN
> # - the value for 'use_domain' parameters
> #!define MULTIDOMAIN 1
> #!else
> #!define MULTIDOMAIN 0
> #!endif
>
> # - flags
> #   FLT_ - per transaction (message) flags
> #    FLB_ - per branch flags
> #!define FLT_ACC 1
> #!define FLT_ACCMISSED 2
> #!define FLT_ACCFAILED 3
> #!define FLT_NATS 5
>
> #!define FLB_NATB 6
> #!define FLB_NATSIPPING 7
>
> ####### Global Parameters #########
>
> #!ifdef WITH_DEBUG
> debug=4
> log_stderror=yes
> #!else
> debug=2
> log_stderror=no
> #!endif
>
> memdbg=5
> memlog=5
>
> log_facility=LOG_LOCAL0
>
> fork=yes
> children=4
>
> /* uncomment the next line to disable TCP (default on) */
> #disable_tcp=yes
>
>
> /* uncomment the next line to disable the auto discovery of local aliases
>    based on reverse DNS on IPs (default on) */
> #auto_aliases=no
>
> /* add local domain aliases */
> alias="open-ims.test"
>
> /* uncomment and configure the following line if you want Kamailio to
>    bind on a specific interface/port/proto (default bind on all 
> available) */
> #listen=udp:10.0.0.10:5060
>
> /* port to listen to
>  * - can be specified more than once if needed to listen on many ports */
> port=5060
>
> #!ifdef WITH_TLS
> enable_tls=yes
> #!endif
>
> ####### Custom Parameters #########
>
> # These parameters can be modified runtime via RPC interface
> # - see the documentation of 'cfg_rpc' module.
> #
> # Format: group.id = value 'desc' description
> # Access: $sel(cfg_get.group.id) or @cfg_get.group.id
> #
>
> #!ifdef WITH_PSTN
> # PSTN GW Routing
> #
> # - pstn.gw_ip: valid IP or hostname as string value, example:
> # pstn.gw_ip = "10.0.0.101" desc "My PSTN GW Address"
> #
> # - by default is empty to avoid misrouting
> pstn.gw_ip = "" desc "PSTN GW Address"
> #!endif
>
>
> ####### Modules Section ########
>
> # set paths to location of modules
> #!ifdef LOCAL_TEST_RUN
> mpath="modules_k:modules"
> #!else
> mpath="/usr/local/lib/kamailio/modules_k/:/usr/local/lib/kamailio/modules/" 
>
> #!endif
>
> #!ifdef WITH_MYSQL
> loadmodule "db_mysql.so"
> #!endif
>
> loadmodule "mi_fifo.so"
> loadmodule "kex.so"
> loadmodule "tm.so"
> loadmodule "tmx.so"
> loadmodule "sl.so"
> loadmodule "rr.so"
> loadmodule "pv.so"
> loadmodule "maxfwd.so"
> loadmodule "usrloc.so"
> loadmodule "registrar.so"
> loadmodule "textops.so"
> loadmodule "siputils.so"
> loadmodule "xlog.so"
> loadmodule "sanity.so"
> loadmodule "ctl.so"
> loadmodule "mi_rpc.so"
> loadmodule "acc.so"
>
> #!ifdef WITH_AUTH
> loadmodule "auth.so"
> loadmodule "auth_db.so"
> #!ifdef WITH_IPAUTH
> loadmodule "permissions.so"
> #!endif
> #!endif
>
> #!ifdef WITH_ALIASDB
> loadmodule "alias_db.so"
> #!endif
>
> #!ifdef WITH_MULTIDOMAIN
> loadmodule "domain.so"
> #!endif
>
> #!ifdef WITH_PRESENCE
> loadmodule "presence.so"
> loadmodule "presence_xml.so"
> #!endif
>
> #!ifdef WITH_NAT
> loadmodule "nathelper.so"
> loadmodule "rtpproxy.so"
> #!endif
>
> #!ifdef WITH_TLS
> loadmodule "tls.so"
> #!endif
>
> #!ifdef WITH_ANTIFLOOD
> loadmodule "htable.so"
> loadmodule "pike.so"
> #!endif
>
> #!ifdef WITH_XMLRPC
> loadmodule "xmlrpc.so"
> #!endif
>
> # ----------------- setting module-specific parameters ---------------
>
>
> # ----- mi_fifo params -----
> modparam("mi_fifo", "fifo_name", "/tmp/kamailio_fifo")
>
>
> # ----- tm params -----
> # auto-discard branches from previous serial forking leg
> modparam("tm", "failure_reply_mode", 3)
> # default retransmission timeout: 30sec
> modparam("tm", "fr_timer", 30000)
> # default invite retransmission timeout after 1xx: 120sec
> modparam("tm", "fr_inv_timer", 120000)
>
>
> # ----- rr params -----
> # add value to ;lr param to cope with most of the UAs
> modparam("rr", "enable_full_lr", 1)
> # do not append from tag to the RR (no need for this script)
> modparam("rr", "append_fromtag", 0)
>
>
> # ----- registrar params -----
> modparam("registrar", "method_filtering", 1)
> /* uncomment the next line to disable parallel forking via location */
> # modparam("registrar", "append_branches", 0)
> /* uncomment the next line not to allow more than 10 contacts per AOR */
> #modparam("registrar", "max_contacts", 10)
>
>
> # ----- acc params -----
> /* what special events should be accounted ? */
> modparam("acc", "early_media", 0)
> modparam("acc", "report_ack", 0)
> modparam("acc", "report_cancels", 0)
> /* by default ww do not adjust the direct of the sequential requests.
>    if you enable this parameter, be sure the enable "append_fromtag"
>    in "rr" module */
> modparam("acc", "detect_direction", 0)
> /* account triggers (flags) */
> modparam("acc", "log_flag", FLT_ACC)
> modparam("acc", "log_missed_flag", FLT_ACCMISSED)
> modparam("acc", "log_extra",
>     
> "src_user=$fU;src_domain=$fd;dst_ouser=$tU;dst_user=$rU;dst_domain=$rd")
> modparam("acc", "failed_transaction_flag", FLT_ACCFAILED)
> /* enhanced DB accounting */
> #!ifdef WITH_ACCDB
> modparam("acc", "db_flag", FLT_ACC)
> modparam("acc", "db_missed_flag", FLT_ACCMISSED)
> modparam("acc", "db_url", DBURL)
> modparam("acc", "db_extra",
>     
> "src_user=$fU;src_domain=$fd;dst_ouser=$tU;dst_user=$rU;dst_domain=$rd")
> #!endif
>
>
> # ----- usrloc params -----
> /* enable DB persistency for location entries */
> #!ifdef WITH_USRLOCDB
> modparam("usrloc", "db_url", DBURL)
> modparam("usrloc", "db_mode", 2)
> modparam("usrloc", "use_domain", MULTIDOMAIN)
> #!endif
>
>
> # ----- auth_db params -----
> #!ifdef WITH_AUTH
> modparam("auth_db", "db_url", DBURL)
> modparam("auth_db", "calculate_ha1", yes)
> modparam("auth_db", "password_column", "password")
> modparam("auth_db", "load_credentials", "")
> modparam("auth_db", "use_domain", MULTIDOMAIN)
>
> # ----- permissions params -----
> #!ifdef WITH_IPAUTH
> modparam("permissions", "db_url", DBURL)
> modparam("permissions", "db_mode", 1)
> #!endif
>
> #!endif
>
>
> # ----- alias_db params -----
> #!ifdef WITH_ALIASDB
> modparam("alias_db", "db_url", DBURL)
> modparam("alias_db", "use_domain", MULTIDOMAIN)
> #!endif
>
>
> # ----- domain params -----
> #!ifdef WITH_MULTIDOMAIN
> modparam("domain", "db_url", DBURL)
> # use caching
> modparam("domain", "db_mode", 1)
> # register callback to match myself condition with domains list
> modparam("domain", "register_myself", 1)
> #!endif
>
>
> #!ifdef WITH_PRESENCE
> # ----- presence params -----
> modparam("presence", "db_url", DBURL)
>
> # ----- presence_xml params -----
> modparam("presence_xml", "db_url", DBURL)
> modparam("presence_xml", "force_active", 1)
> #!endif
>
>
> #!ifdef WITH_NAT
> # ----- rtpproxy params -----
> modparam("rtpproxy", "rtpproxy_sock", "udp:127.0.0.1:7722")
>
> # ----- nathelper params -----
> modparam("nathelper", "natping_interval", 30)
> modparam("nathelper", "ping_nated_only", 1)
> modparam("nathelper", "sipping_bflag", FLB_NATSIPPING)
> modparam("nathelper", "sipping_from", "sip:pinger at kamailio.org")
>
> # params needed for NAT traversal in other modules
> modparam("nathelper|registrar", "received_avp", "$avp(RECEIVED)")
> modparam("usrloc", "nat_bflag", FLB_NATB)
> #!endif
>
>
> #!ifdef WITH_TLS
> # ----- tls params -----
> modparam("tls", "config", "/usr/local/etc/kamailio/tls.cfg")
> #!endif
>
> #!ifdef WITH_ANTIFLOOD
> # ----- pike params -----
> modparam("pike", "sampling_time_unit", 2)
> modparam("pike", "reqs_density_per_unit", 16)
> modparam("pike", "remove_latency", 4)
>
> # ----- htable params -----
> # ip ban htable with autoexpire after 5 minutes
> modparam("htable", "htable", "ipban=>size=8;autoexpire=300;")
> #!endif
>
> #!ifdef WITH_XMLRPC
> # ----- xmlrpc params -----
> modparam("xmlrpc", "route", "XMLRPC");
> modparam("xmlrpc", "url_match", "^/RPC")
> #!endif
>
> ####### Routing Logic ########
>
>
> # Main SIP request routing logic
> # - processing of any incoming SIP request starts with this route
> route {
>
>     # per request initial checks
>     route(REQINIT);
>
>     # NAT detection
>     route(NAT);
>
>     # handle requests within SIP dialogs
>     route(WITHINDLG);
>
>     ### only initial requests (no To tag)
>
>     # CANCEL processing
>     if (is_method("CANCEL"))
>     {
>         if (t_check_trans())
>             t_relay();
>         exit;
>     }
>
>     t_check_trans();
>
>     # authentication
>     route(AUTH);
>
>     # record routing for dialog forming requests (in case they are 
> routed)
>     # - remove preloaded route headers
>     remove_hf("Route");
>     if (is_method("INVITE|SUBSCRIBE"))
>         record_route();
>
>     # account only INVITEs
>     if (is_method("INVITE"))
>     {
>         setflag(FLT_ACC); # do accounting
>     }
>
>     # dispatch requests to foreign domains
>     route(SIPOUT);
>
>     ### requests for my local domains
>
>     # handle presence related requests
>     route(PRESENCE);
>
>     # handle registrations
>     route(REGISTRAR);
>
>     if ($rU==$null)
>     {
>         # request with no Username in RURI
>         sl_send_reply("484","Address Incomplete");
>         exit;
>     }
>
>     # dispatch destinations to PSTN
>     route(PSTN);
>
>     # user location service
>     route(LOCATION);
>
>     route(RELAY);
> }
>
>
> route[RELAY] {
> #!ifdef WITH_NAT
>     if (check_route_param("nat=yes")) {
>         setbflag(FLB_NATB);
>     }
>     if (isflagset(FLT_NATS) || isbflagset(FLB_NATB)) {
>         route(RTPPROXY);
>     }
> #!endif
>
>     /* example how to enable some additional event routes */
>     if (is_method("INVITE")) {
>         #t_on_branch("BRANCH_ONE");
>         t_on_reply("REPLY_ONE");
>         t_on_failure("FAIL_ONE");
>     }
>
>     if (!t_relay()) {
>         sl_reply_error();
>     }
>     exit;
> }
>
> # Per SIP request initial checks
> route[REQINIT] {
> #!ifdef WITH_ANTIFLOOD
>     # flood dection from same IP and traffic ban for a while
>     # be sure you exclude checking trusted peers, such as pstn gateways
>     # - local host excluded (e.g., loop to self)
>     if(src_ip!=myself)
>     {
>         if($sht(ipban=>$si)!=$null)
>         {
>             # ip is already blocked
>             xdbg("request from blocked IP - $rm from $fu 
> (IP:$si:$sp)\n");
>             exit;
>         }
>         if (!pike_check_req())
>         {
>             xlog("L_ALERT","ALERT: pike blocking $rm from $fu 
> (IP:$si:$sp)\n");
>             $sht(ipban=>$si) = 1;
>             exit;
>         }
>     }
> #!endif
>
>     if (!mf_process_maxfwd_header("10")) {
>         sl_send_reply("483","Too Many Hops");
>         exit;
>     }
>
>     if(!sanity_check("1511", "7"))
>     {
>         xlog("Malformed SIP message from $si:$sp\n");
>         exit;
>     }
> }
>
> # Handle requests within SIP dialogs
> route[WITHINDLG] {
>     if (has_totag()) {
>         # sequential request withing a dialog should
>         # take the path determined by record-routing
>         if (loose_route()) {
>             if (is_method("BYE")) {
>                 setflag(FLT_ACC); # do accounting ...
>                 setflag(FLT_ACCFAILED); # ... even if the transaction 
> fails
>             }
>             route(RELAY);
>         } else {
>             if (is_method("SUBSCRIBE") && uri == myself) {
>                 # in-dialog subscribe requests
>                 route(PRESENCE);
>                 exit;
>             }
>             if ( is_method("ACK") ) {
>                 if ( t_check_trans() ) {
>                     # no loose-route, but stateful ACK;
>                     # must be an ACK after a 487
>                     # or e.g. 404 from upstream server
>                     t_relay();
>                     exit;
>                 } else {
>                     # ACK without matching transaction ... ignore and 
> discard
>                     exit;
>                 }
>             }
>             sl_send_reply("404","Not here");
>         }
>         exit;
>     }
> }
>
> # Handle SIP registrations
> route[REGISTRAR] {
>     if (is_method("REGISTER"))
>     {
>         if(isflagset(FLT_NATS))
>         {
>             setbflag(FLB_NATB);
>             # uncomment next line to do SIP NAT pinging
>             ## setbflag(FLB_NATSIPPING);
>         }
>         if (!save("location"))
>             sl_reply_error();
>
>         exit;
>     }
> }
>
> # USER location service
> route[LOCATION] {
>
> #!ifdef WITH_ALIASDB
>     # search in DB-based aliases
>     alias_db_lookup("dbaliases");
> #!endif
>
>     if (!lookup("location")) {
>         switch ($rc) {
>             case -1:
>             case -3:
>                 t_newtran();
>                 t_reply("404", "Not Found");
>                 exit;
>             case -2:
>                 sl_send_reply("405", "Method Not Allowed");
>                 exit;
>         }
>     }
>
>     # when routing via usrloc, log the missed calls also
>     if (is_method("INVITE"))
>     {
>         setflag(FLT_ACCMISSED);
>     }
> }
>
> # Presence server route
> route[PRESENCE] {
>     if(!is_method("PUBLISH|SUBSCRIBE"))
>         return;
>
> #!ifdef WITH_PRESENCE
>     if (!t_newtran())
>     {
>         sl_reply_error();
>         exit;
>     };
>
>     if(is_method("PUBLISH"))
>     {
>                 if($hdr(Sender)!= NULL)
>                         handle_publish("$hdr(Sender)");
>                 else
>                         handle_publish("");
>                 t_release();
>     }
>     else
>     if( is_method("SUBSCRIBE"))
>     {
>         handle_subscribe();
>         t_release();
>     }
>     exit;
> #!endif
>
>     # if presence enabled, this part will not be executed
>     if (is_method("PUBLISH") || $rU==$null)
>     {
>         sl_send_reply("404", "Not here");
>         exit;
>     }
>     return;
> }
>
> # Authentication route
> route[AUTH] {
> #!ifdef WITH_AUTH
>     if (is_method("REGISTER"))
>     {
>         # authenticate the REGISTER requests (uncomment to enable auth)
>         if (!www_authorize("$td", "subscriber"))
>         {
>             www_challenge("$td", "0");
>             exit;
>         }
>
>         if ($au!=$tU)
>         {
>             sl_send_reply("403","Forbidden auth ID");
>             exit;
>         }
>     } else {
>
> #!ifdef WITH_IPAUTH
>         if(allow_source_address())
>         {
>             # source IP allowed
>             return;
>         }
> #!endif
>         # authenticate if from local subscriber
>         if (from_uri==myself)
>         {
>             if (!proxy_authorize("$fd", "subscriber")) {
>                 proxy_challenge("$fd", "0");
>                 exit;
>             }
>             if (is_method("PUBLISH"))
>             {
>                 if ($au!=$tU) {
>                     sl_send_reply("403","Forbidden auth ID");
>                     exit;
>                 }
>             } else {
>                 if ($au!=$fU) {
>                     sl_send_reply("403","Forbidden auth ID");
>                     exit;
>                 }
>             }
>
>             consume_credentials();
>             # caller authenticated
>         } else {
>             # caller is not local subscriber, then check if it calls
>             # a local destination, otherwise deny, not an open relay here
>             if (!uri==myself)
>             {
>                 sl_send_reply("403","Not relaying");
>                 exit;
>             }
>         }
>     }
> #!endif
>     return;
> }
>
> # Caller NAT detection route
> route[NAT] {
> #!ifdef WITH_NAT
>     force_rport();
>     if (nat_uac_test("19")) {
>         if (method=="REGISTER") {
>             fix_nated_register();
>         } else {
>             fix_nated_contact();
>         }
>         setflag(FLT_NATS);
>     }
> #!endif
>     return;
> }
>
> # RTPProxy control
> route[RTPPROXY] {
> #!ifdef WITH_NAT
>     if (is_method("BYE")) {
>         unforce_rtp_proxy();
>     } else if (is_method("INVITE")){
>         force_rtp_proxy();
>     }
>     if (!has_totag()) add_rr_param(";nat=yes");
> #!endif
>     return;
> }
>
> # Routing to foreign domains
> route[SIPOUT] {
>     if (!uri==myself)
>     {
>         append_hf("P-hint: outbound\r\n");
>         route(RELAY);
>     }
> }
>
> # PSTN GW routing
> route[PSTN] {
> #!ifdef WITH_PSTN
>     # check if PSTN GW IP is defined
>     if (strempty($sel(cfg_get.pstn.gw_ip))) {
>         xlog("SCRIPT: PSTN rotuing enabled but pstn.gw_ip not 
> defined\n");
>         return;
>     }
>
>     # route to PSTN dialed numbers starting with '+' or '00'
>     #     (international format)
>     # - update the condition to match your dialing rules for PSTN routing
>     if(!($rU=~"^(\+|00)[1-9][0-9]{3,20}$"))
>         return;
>
>     # only local users allowed to call
>     if(from_uri!=myself) {
>         sl_send_reply("403", "Not Allowed");
>         exit;
>     }
>
>     $ru = "sip:" + $rU + "@" + $sel(cfg_get.pstn.gw_ip);
>
>     route(RELAY);
>     exit;
> #!endif
>
>     return;
> }
>
> # XMLRPC routing
> #!ifdef WITH_XMLRPC
> route[XMLRPC]
> {
>     # allow XMLRPC from localhost
>     if ((method=="POST" || method=="GET")
> && (src_ip==127.0.0.1)) {
>         # close connection only for xmlrpclib user agents (there is a 
> bug in
>         # xmlrpclib: it waits for EOF before interpreting the response).
>         if ($hdr(User-Agent) =~ "xmlrpclib")
>             set_reply_close();
>         set_reply_no_connect();
>         dispatch_rpc();
>         exit;
>     }
>     send_reply("403", "Forbidden");
>     exit;
> }
> #!endif
>
> # Sample branch router
> branch_route[BRANCH_ONE] {
>     xdbg("new branch at $ru\n");
> }
>
> # Sample onreply route
> onreply_route[REPLY_ONE] {
>     xdbg("incoming reply\n");
> #!ifdef WITH_NAT
>     if ((isflagset(FLT_NATS) || isbflagset(FLB_NATB))
> && status=~"(183)|(2[0-9][0-9])") {
>         force_rtp_proxy();
>     }
>     if (isbflagset("6")) {
>         fix_nated_contact();
>     }
> #!endif
> }
>
> # Sample failure route
> failure_route[FAIL_ONE] {
> #!ifdef WITH_NAT
>     if (is_method("INVITE")
> && (isbflagset(FLB_NATB) || isflagset(FLT_NATS))) {
>         unforce_rtp_proxy();
>     }
> #!endif
>
>     if (t_is_canceled()) {
>         exit;
>     }
>
>     # uncomment the following lines if you want to block client
>     # redirect based on 3xx replies.
>     ##if (t_check_status("3[0-9][0-9]")) {
>     ##t_reply("404","Not found");
>     ##    exit;
>     ##}
>
>     # uncomment the following lines if you want to redirect the failed
>     # calls to a different new destination
>     ##if (t_check_status("486|408")) {
>     ##    sethostport("192.168.2.100:5060");
>     ##    append_branch();
>     ##    # do not set the missed call flag again
>     ##    t_relay();
>     ##}
> }
>
>
> Thanks a lot,
>   Andrés.
>
> El 29/11/2010 15:15, Klaus Darilion escribió:
>> If you do not want to authenticate the requests then disable 
>> authentication kamailio.cfg
>>
>> regards
>> Klaus
>>
>> Am 29.11.2010 12:53, schrieb "Andrés S. García Ruiz":
>>>
>>> Hi everybody,
>>>
>>> I'm trying to deploy an IMS network with OpenIMSCore and Kamailio. 
>>> Since
>>> OpenIMSCore has been already tested along with Mobicents, now I want
>>> substitute Mobicents for Kamailio. I've also successfully installed
>>> Kamailio. I can run it without any problem, but when SIP Publish
>>> messages arrive at Kamalio, it answers with "407 Proxy Authentication
>>> Required". The IMS presentity is already registered against the
>>> OpenIMSCore. How can I solve that problem?
>>>
>>> The publish message sent:
>>>
>>> PUBLISH sip:testuser01 at open-ims.test SIP/2.0
>>> Route: <sip:ciervo.inf.um.es:5060;lr>,
>>> <sip:iscmark at scscf.open-ims.test:6060;lr;s=1;h=0;d=0;a=7369703a74657374757365723031406f70656e2d696d732e74657374> 
>>>
>>>
>>> Call-ID: K28QO9PYAE5vn3RNdYOkIEddMEd6yDiqeAW7DwSt6XV.
>>> CSeq: 1 PUBLISH
>>> From: "testuser01" <sip:testuser01 at open-ims.test>;tag=ff123bda
>>> To: "testuser01" <sip:testuser01 at open-ims.test>
>>> Via: SIP/2.0/UDP 155.54.210.135:6060;branch=z9hG4bKa31a.6cba1cd2.0
>>> Via: SIP/2.0/UDP 155.54.210.134:4060;branch=z9hG4bKa31a.71481d13.0;i=1
>>> Via: SIP/2.0/TCP
>>> 155.54.190.166:8060;rport=41624;branch=z9hG4bK-d8754z-ce7487ff34be55f9-1---d8754z- 
>>>
>>>
>>> Max-Forwards: 15
>>> Content-Type: application/pidf+xml
>>> Expires: 30000
>>> Event: presence
>>> Contact: <sip:testuser01 at 155.54.190.166:8060>
>>> Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
>>> SUBSCRIBE, INFO
>>> User-Agent: X-Lite IMS-OSGi-Client 0.1 CVS-Mon_Nov_29_10-14-33_CET_2010
>>> Content-Length: 451
>>> P-Asserted-Identity: <sip:testuser01 at open-ims.test>
>>> P-Charging-Vector:
>>> icid-value="P-CSCFabcd000000004cf3708400000002";icid-generated-at=155.54.210.134;orig-ioi="open-ims.test" 
>>>
>>>
>>>
>>> <?xml version='1.0' encoding='UTF-8'?><presence
>>> xmlns='urn:ietf:params:xml:ns:pidf'
>>> xmlns:c='urn:ietf:params:xml:ns:pidf:cipid'
>>> xmlns:dm='urn:ietf:params:xml:ns:pidf:data-model'
>>> xmlns:rpid='urn:ietf:params:xml:ns:pidf:rpid'
>>> entity='sip:testuser01 at open-ims.test'><tuple
>>> id='t6b9a6ab3'><status><basic>open</basic></status></tuple><dm:person
>>> id='p34b126e5'><rpid:activities><rpid:Online/></rpid:activities><dm:note>Online</dm:note></dm:person></presence> 
>>>
>>>
>>>
>>>
>>> Kamailio answer:
>>> SIP/2.0 407 Proxy Authentication Required
>>> Call-ID: K28QO9PYAE5vn3RNdYOkIEddMEd6yDiqeAW7DwSt6XV.
>>> CSeq: 1 PUBLISH
>>> From: "testuser01" <sip:testuser01 at open-ims.test>;tag=ff123bda
>>> To: "testuser01"
>>> <sip:testuser01 at open-ims.test>;tag=b27e1a1d33761e85846fc98f5f3a7e58.3d3a 
>>>
>>> Via: SIP/2.0/UDP 155.54.210.135:6060;branch=z9hG4bKa31a.6cba1cd2.0
>>> Via: SIP/2.0/UDP 155.54.210.134:4060;branch=z9hG4bKa31a.71481d13.0;i=1
>>> Via: SIP/2.0/TCP
>>> 155.54.190.166:8060;rport=41624;branch=z9hG4bK-d8754z-ce7487ff34be55f9-1---d8754z- 
>>>
>>>
>>> Proxy-Authenticate: Digest realm="open-ims.test",
>>> nonce="TPNwMkzzbwZRE1piAM8yHaXGsXvwS16v"
>>> Server: kamailio (3.1.0 (i386/linux))
>>> Content-Length: 0
>>>
>>>
>>> Kamailio log:
>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:628]: SIP Request:
>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:630]: method: <PUBLISH>
>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:632]: uri:
>>> <sip:testuser01 at open-ims.test>
>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:634]: version: <SIP/2.0>
>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:165]: get_hdr_field: cseq
>>> <CSeq>: <1> <PUBLISH>
>>> 5(15391) DEBUG: <core> [parser/parse_to.c:803]: end of header reached,
>>> state=10
>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:185]: DEBUG: get_hdr_field:
>>> <To> [45]; uri=[sip:testuser01 at open-ims.test]
>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:187]: DEBUG: to body
>>> ["testuser01" <sip:testuser01 at open-ims.test>
>>> ]
>>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param type 232,
>>> <branch> = <z9hG4bKa31a.6cba1cd2.0>; state=16
>>> 5(15391) DEBUG: <core> [parser/parse_via.c:2300]: end of header 
>>> reached,
>>> state=5
>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:513]: parse_headers: Via
>>> found, flags=2
>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:515]: parse_headers: 
>>> this is
>>> the first via
>>> 5(15391) DEBUG: <core> [receive.c:145]: After parse_msg...
>>> 5(15391) DEBUG: <core> [receive.c:186]: preparing to run routing 
>>> scripts...
>>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param type 232,
>>> <branch> = <z9hG4bKa31a.71481d13.0>; state=6
>>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param type 236,
>>> <i> = <1>; state=16
>>> 5(15391) DEBUG: <core> [parser/parse_via.c:2300]: end of header 
>>> reached,
>>> state=5
>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:513]: parse_headers: Via
>>> found, flags=100
>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:526]: parse_headers: 
>>> this is
>>> the second via
>>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param type 235,
>>> <rport> = <41624>; state=6
>>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param type 232,
>>> <branch> = <z9hG4bK-d8754z-ce7487ff34be55f9-1---d8754z->; state=16
>>> 5(15391) DEBUG: <core> [parser/parse_via.c:2300]: end of header 
>>> reached,
>>> state=5
>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:513]: parse_headers: Via
>>> found, flags=100
>>> 5(15391) DEBUG: maxfwd [mf_funcs.c:85]: value = 15
>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:199]: DEBUG: get_hdr_body :
>>> content_length=451
>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:101]: found end of header
>>> 5(15391) DEBUG: <core> [parser/parse_to.c:174]: DEBUG: add_param:
>>> tag=ff123bda
>>> 5(15391) DEBUG: <core> [parser/parse_to.c:803]: end of header reached,
>>> state=29
>>> 5(15391) DEBUG: sanity [mod_sanity.c:217]: all sanity checks passed
>>> 5(15391) DEBUG: siputils [checks.c:73]: no totag
>>> 5(15391) DEBUG: tm [t_lookup.c:1081]: DEBUG: t_check_msg: msg id=1
>>> global id=0 T start=0xffffffff
>>> 5(15391) DEBUG: tm [t_lookup.c:528]: t_lookup_request: start searching:
>>> hash=41274, isACK=0
>>> 5(15391) DEBUG: tm [t_lookup.c:485]: DEBUG: RFC3261 transaction 
>>> matching
>>> failed
>>> 5(15391) DEBUG: tm [t_lookup.c:711]: DEBUG: t_lookup_request: no
>>> transaction found
>>> 5(15391) DEBUG: tm [t_lookup.c:1150]: DEBUG: t_check_msg: msg id=1
>>> global id=1 T end=(nil)
>>> 5(15391) DEBUG: <core> [socket_info.c:501]: grep_sock_info - 
>>> checking if
>>> host==us: 13==9 && [open-ims.test] == [127.0.0.1]
>>> 5(15391) DEBUG: <core> [socket_info.c:504]: grep_sock_info - 
>>> checking if
>>> port 5060 matches port 5060
>>> 5(15391) DEBUG: <core> [socket_info.c:501]: grep_sock_info - 
>>> checking if
>>> host==us: 13==14 && [open-ims.test] == [155.54.190.245]
>>> 5(15391) DEBUG: <core> [socket_info.c:504]: grep_sock_info - 
>>> checking if
>>> port 5060 matches port 5060
>>> 5(15391) DEBUG: <core> [socket_info.c:501]: grep_sock_info - 
>>> checking if
>>> host==us: 13==9 && [open-ims.test] == [127.0.0.1]
>>> 5(15391) DEBUG: <core> [socket_info.c:504]: grep_sock_info - 
>>> checking if
>>> port 5060 matches port 5060
>>> 5(15391) DEBUG: <core> [socket_info.c:501]: grep_sock_info - 
>>> checking if
>>> host==us: 13==14 && [open-ims.test] == [155.54.190.245]
>>> 5(15391) DEBUG: <core> [socket_info.c:504]: grep_sock_info - 
>>> checking if
>>> port 5060 matches port 5060
>>> 5(15391) DEBUG: auth_db [authorize.c:239]: realm value [open-ims.test]
>>> 5(15391) DEBUG: auth [api.c:85]: auth:pre_auth: Credentials with realm
>>> 'open-ims.test' not found
>>> 5(15391) DEBUG: auth_db [authorize.c:257]: not authenticated
>>> 5(15391) DEBUG: auth [challenge.c:102]: build_challenge_hf:
>>> realm='open-ims.test'
>>> 5(15391) DEBUG: auth [challenge.c:236]: auth: 'Proxy-Authenticate:
>>> Digest realm="open-ims.test", nonce="TPNwMkzzbwZRE1piAM8yHaXGsXvwS16v"
>>> '
>>> 5(15391) DEBUG: sl [sl.c:278]: reply in stateless mode (sl)
>>> 5(15391) DEBUG: <core> [msg_translator.c:207]:
>>> check_via_address(155.54.210.135, 155.54.210.135, 0)
>>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>>> destroying list (nil)
>>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>>> destroying list (nil)
>>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>>> destroying list (nil)
>>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>>> destroying list (nil)
>>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>>> destroying list (nil)
>>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>>> destroying list (nil)
>>> 5(15391) DEBUG: <core> [receive.c:289]: receive_msg: cleaning up
>>>
>>>
>>> Thanks in advance,
>>> Andrés.
>>>
>
>
> _______________________________________________
> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
> sr-users at lists.sip-router.org
> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

-- 
Daniel-Constantin Mierla
Kamailio (OpenSER) Advanced Training
Jan 24-26, 2011, Irvine, CA, USA
http://www.asipto.com




More information about the sr-users mailing list