[SR-Users] OpenIMSCore and Kamalio Integration
"Andrés S. García Ruiz"
asgarcia at um.es
Mon Jan 10 09:01:10 CET 2011
Thanks Daniel!!!
El 07/01/11 10:48, Daniel-Constantin Mierla escribió:
> Btw, fyi, Carsten Bock is working on Git branch 'cartenbock/ims' for
> making straightforward usage of openimscore modules with latest
> kamailio. If you are interested in this kind of platform, maybe you
> should fetch that branch, help testing and integration work.
>
> Cheers,
> Daniel
>
> On 12/3/10 10:56 AM, "Andrés S. García Ruiz" wrote:
>>
>>
>> It works now! Thanks a lot!
>>
>> Regards,
>> Andrés.
>>
>> El 30/11/10 21:56, Daniel-Constantin Mierla escribió:
>>> Hello,
>>>
>>> the comments at the beginning of the configuration files tells you
>>> more about how some features are enabled/disabled. I assume you read
>>> them as you enabled authenitcation (by default is disabled) -- you
>>> have #!define WITH_AUTH.
>>>
>>> Maybe in your particular case the best solution is to enable IP
>>> authentication and add the IP address of OpenIMSCore in address
>>> table with group id 1.
>>>
>>> Cheers,
>>> Daniel
>>>
>>> On 11/29/10 3:27 PM, "Andrés S. García Ruiz" wrote:
>>>>
>>>> Thanks for your comment,
>>>>
>>>> This is my configuration, could you please tell me how to disable
>>>> authentication?
>>>>
>>>> #!KAMAILIO
>>>> #
>>>> # Kamailio (OpenSER) SIP Server v3.1 - default configuration script
>>>> # - web: http://www.kamailio.org
>>>> # - git: http://sip-router.org
>>>> #
>>>> # Direct your questions about this file to:
>>>> <sr-users at lists.sip-router.org>
>>>> #
>>>> # Refer to the Core CookBook at
>>>> http://www.kamailio.org/dokuwiki/doku.php
>>>> # for an explanation of possible statements, functions and parameters.
>>>> #
>>>> # Several features can be enabled using '#!define WITH_FEATURE'
>>>> directives:
>>>> #
>>>> # *** To run in debug mode:
>>>> # - define WITH_DEBUG
>>>> #
>>>> # *** To enable mysql:
>>>> # - define WITH_MYSQL
>>>> #
>>>> # *** To enable authentication execute:
>>>> # - enable mysql
>>>> # - define WITH_AUTH
>>>> # - add users using 'kamctl'
>>>> #
>>>> # *** To enable IP authentication execute:
>>>> # - enable mysql
>>>> # - enable authentication
>>>> # - define WITH_IPAUTH
>>>> # - add IP addresses with group id '1' to 'address' table
>>>> #
>>>> # *** To enable persistent user location execute:
>>>> # - enable mysql
>>>> # - define WITH_USRLOCDB
>>>> #
>>>> # *** To enable presence server execute:
>>>> # - enable mysql
>>>> # - define WITH_PRESENCE
>>>> #
>>>> # *** To enable nat traversal execute:
>>>> # - define WITH_NAT
>>>> # - install RTPProxy: http://www.rtpproxy.org
>>>> # - start RTPProxy:
>>>> # rtpproxy -l _your_public_ip_ -s udp:localhost:7722
>>>> #
>>>> # *** To enable PSTN gateway routing execute:
>>>> # - define WITH_PSTN
>>>> # - set the value of pstn.gw_ip
>>>> # - check route[PSTN] for regexp routing condition
>>>> #
>>>> # *** To enable database aliases lookup execute:
>>>> # - enable mysql
>>>> # - define WITH_ALIASDB
>>>> #
>>>> # *** To enable multi-domain support execute:
>>>> # - enable mysql
>>>> # - define WITH_MULTIDOMAIN
>>>> #
>>>> # *** To enable TLS support execute:
>>>> # - adjust CFGDIR/tls.cfg as needed
>>>> # - define WITH_TLS
>>>> #
>>>> # *** To enable XMLRPC support execute:
>>>> # - define WITH_XMLRPC
>>>> # - adjust route[XMLRPC] for access policy
>>>> #
>>>> # *** To enable anti-flood detection execute:
>>>> # - adjust pike and htable=>ipban settings as needed (default is
>>>> # block if more than 16 requests in 2 seconds and ban for 300
>>>> seconds)
>>>> # - define WITH_ANTIFLOOD
>>>> #
>>>> # *** To enhance accounting execute:
>>>> # - enable mysql
>>>> # - define WITH_ACCDB
>>>> # - add following columns to database
>>>> #!ifdef ACCDB_COMMENT
>>>> ALTER TABLE acc ADD COLUMN src_user VARCHAR(64) NOT NULL DEFAULT '';
>>>> ALTER TABLE acc ADD COLUMN src_domain VARCHAR(128) NOT NULL
>>>> DEFAULT '';
>>>> ALTER TABLE acc ADD COLUMN dst_ouser VARCHAR(64) NOT NULL DEFAULT
>>>> '';
>>>> ALTER TABLE acc ADD COLUMN dst_user VARCHAR(64) NOT NULL DEFAULT '';
>>>> ALTER TABLE acc ADD COLUMN dst_domain VARCHAR(128) NOT NULL
>>>> DEFAULT '';
>>>> ALTER TABLE missed_calls ADD COLUMN src_user VARCHAR(64) NOT NULL
>>>> DEFAULT '';
>>>> ALTER TABLE missed_calls ADD COLUMN src_domain VARCHAR(128) NOT
>>>> NULL DEFAULT '';
>>>> ALTER TABLE missed_calls ADD COLUMN dst_ouser VARCHAR(64) NOT
>>>> NULL DEFAULT '';
>>>> ALTER TABLE missed_calls ADD COLUMN dst_user VARCHAR(64) NOT NULL
>>>> DEFAULT '';
>>>> ALTER TABLE missed_calls ADD COLUMN dst_domain VARCHAR(128) NOT
>>>> NULL DEFAULT '';
>>>> #!endif
>>>>
>>>> ####### Defined Values #########
>>>>
>>>> #!define WITH_DEBUG
>>>> #!define WITH_AUTH
>>>> #!define WITH_MYSQL
>>>> #!define WITH_USRLOCDB
>>>>
>>>> # *** Value defines - IDs used later in config
>>>> #!ifdef WITH_MYSQL
>>>> # - database URL - used to connect to database server by modules such
>>>> # as: auth_db, acc, usrloc, a.s.o.
>>>> #!define DBURL "mysql://openser:openserrw@localhost/openser"
>>>> #!endif
>>>> #!ifdef WITH_MULTIDOMAIN
>>>> # - the value for 'use_domain' parameters
>>>> #!define MULTIDOMAIN 1
>>>> #!else
>>>> #!define MULTIDOMAIN 0
>>>> #!endif
>>>>
>>>> # - flags
>>>> # FLT_ - per transaction (message) flags
>>>> # FLB_ - per branch flags
>>>> #!define FLT_ACC 1
>>>> #!define FLT_ACCMISSED 2
>>>> #!define FLT_ACCFAILED 3
>>>> #!define FLT_NATS 5
>>>>
>>>> #!define FLB_NATB 6
>>>> #!define FLB_NATSIPPING 7
>>>>
>>>> ####### Global Parameters #########
>>>>
>>>> #!ifdef WITH_DEBUG
>>>> debug=4
>>>> log_stderror=yes
>>>> #!else
>>>> debug=2
>>>> log_stderror=no
>>>> #!endif
>>>>
>>>> memdbg=5
>>>> memlog=5
>>>>
>>>> log_facility=LOG_LOCAL0
>>>>
>>>> fork=yes
>>>> children=4
>>>>
>>>> /* uncomment the next line to disable TCP (default on) */
>>>> #disable_tcp=yes
>>>>
>>>>
>>>> /* uncomment the next line to disable the auto discovery of local
>>>> aliases
>>>> based on reverse DNS on IPs (default on) */
>>>> #auto_aliases=no
>>>>
>>>> /* add local domain aliases */
>>>> alias="open-ims.test"
>>>>
>>>> /* uncomment and configure the following line if you want Kamailio to
>>>> bind on a specific interface/port/proto (default bind on all
>>>> available) */
>>>> #listen=udp:10.0.0.10:5060
>>>>
>>>> /* port to listen to
>>>> * - can be specified more than once if needed to listen on many
>>>> ports */
>>>> port=5060
>>>>
>>>> #!ifdef WITH_TLS
>>>> enable_tls=yes
>>>> #!endif
>>>>
>>>> ####### Custom Parameters #########
>>>>
>>>> # These parameters can be modified runtime via RPC interface
>>>> # - see the documentation of 'cfg_rpc' module.
>>>> #
>>>> # Format: group.id = value 'desc' description
>>>> # Access: $sel(cfg_get.group.id) or @cfg_get.group.id
>>>> #
>>>>
>>>> #!ifdef WITH_PSTN
>>>> # PSTN GW Routing
>>>> #
>>>> # - pstn.gw_ip: valid IP or hostname as string value, example:
>>>> # pstn.gw_ip = "10.0.0.101" desc "My PSTN GW Address"
>>>> #
>>>> # - by default is empty to avoid misrouting
>>>> pstn.gw_ip = "" desc "PSTN GW Address"
>>>> #!endif
>>>>
>>>>
>>>> ####### Modules Section ########
>>>>
>>>> # set paths to location of modules
>>>> #!ifdef LOCAL_TEST_RUN
>>>> mpath="modules_k:modules"
>>>> #!else
>>>> mpath="/usr/local/lib/kamailio/modules_k/:/usr/local/lib/kamailio/modules/"
>>>>
>>>> #!endif
>>>>
>>>> #!ifdef WITH_MYSQL
>>>> loadmodule "db_mysql.so"
>>>> #!endif
>>>>
>>>> loadmodule "mi_fifo.so"
>>>> loadmodule "kex.so"
>>>> loadmodule "tm.so"
>>>> loadmodule "tmx.so"
>>>> loadmodule "sl.so"
>>>> loadmodule "rr.so"
>>>> loadmodule "pv.so"
>>>> loadmodule "maxfwd.so"
>>>> loadmodule "usrloc.so"
>>>> loadmodule "registrar.so"
>>>> loadmodule "textops.so"
>>>> loadmodule "siputils.so"
>>>> loadmodule "xlog.so"
>>>> loadmodule "sanity.so"
>>>> loadmodule "ctl.so"
>>>> loadmodule "mi_rpc.so"
>>>> loadmodule "acc.so"
>>>>
>>>> #!ifdef WITH_AUTH
>>>> loadmodule "auth.so"
>>>> loadmodule "auth_db.so"
>>>> #!ifdef WITH_IPAUTH
>>>> loadmodule "permissions.so"
>>>> #!endif
>>>> #!endif
>>>>
>>>> #!ifdef WITH_ALIASDB
>>>> loadmodule "alias_db.so"
>>>> #!endif
>>>>
>>>> #!ifdef WITH_MULTIDOMAIN
>>>> loadmodule "domain.so"
>>>> #!endif
>>>>
>>>> #!ifdef WITH_PRESENCE
>>>> loadmodule "presence.so"
>>>> loadmodule "presence_xml.so"
>>>> #!endif
>>>>
>>>> #!ifdef WITH_NAT
>>>> loadmodule "nathelper.so"
>>>> loadmodule "rtpproxy.so"
>>>> #!endif
>>>>
>>>> #!ifdef WITH_TLS
>>>> loadmodule "tls.so"
>>>> #!endif
>>>>
>>>> #!ifdef WITH_ANTIFLOOD
>>>> loadmodule "htable.so"
>>>> loadmodule "pike.so"
>>>> #!endif
>>>>
>>>> #!ifdef WITH_XMLRPC
>>>> loadmodule "xmlrpc.so"
>>>> #!endif
>>>>
>>>> # ----------------- setting module-specific parameters ---------------
>>>>
>>>>
>>>> # ----- mi_fifo params -----
>>>> modparam("mi_fifo", "fifo_name", "/tmp/kamailio_fifo")
>>>>
>>>>
>>>> # ----- tm params -----
>>>> # auto-discard branches from previous serial forking leg
>>>> modparam("tm", "failure_reply_mode", 3)
>>>> # default retransmission timeout: 30sec
>>>> modparam("tm", "fr_timer", 30000)
>>>> # default invite retransmission timeout after 1xx: 120sec
>>>> modparam("tm", "fr_inv_timer", 120000)
>>>>
>>>>
>>>> # ----- rr params -----
>>>> # add value to ;lr param to cope with most of the UAs
>>>> modparam("rr", "enable_full_lr", 1)
>>>> # do not append from tag to the RR (no need for this script)
>>>> modparam("rr", "append_fromtag", 0)
>>>>
>>>>
>>>> # ----- registrar params -----
>>>> modparam("registrar", "method_filtering", 1)
>>>> /* uncomment the next line to disable parallel forking via location */
>>>> # modparam("registrar", "append_branches", 0)
>>>> /* uncomment the next line not to allow more than 10 contacts per
>>>> AOR */
>>>> #modparam("registrar", "max_contacts", 10)
>>>>
>>>>
>>>> # ----- acc params -----
>>>> /* what special events should be accounted ? */
>>>> modparam("acc", "early_media", 0)
>>>> modparam("acc", "report_ack", 0)
>>>> modparam("acc", "report_cancels", 0)
>>>> /* by default ww do not adjust the direct of the sequential requests.
>>>> if you enable this parameter, be sure the enable "append_fromtag"
>>>> in "rr" module */
>>>> modparam("acc", "detect_direction", 0)
>>>> /* account triggers (flags) */
>>>> modparam("acc", "log_flag", FLT_ACC)
>>>> modparam("acc", "log_missed_flag", FLT_ACCMISSED)
>>>> modparam("acc", "log_extra",
>>>>
>>>> "src_user=$fU;src_domain=$fd;dst_ouser=$tU;dst_user=$rU;dst_domain=$rd")
>>>>
>>>> modparam("acc", "failed_transaction_flag", FLT_ACCFAILED)
>>>> /* enhanced DB accounting */
>>>> #!ifdef WITH_ACCDB
>>>> modparam("acc", "db_flag", FLT_ACC)
>>>> modparam("acc", "db_missed_flag", FLT_ACCMISSED)
>>>> modparam("acc", "db_url", DBURL)
>>>> modparam("acc", "db_extra",
>>>>
>>>> "src_user=$fU;src_domain=$fd;dst_ouser=$tU;dst_user=$rU;dst_domain=$rd")
>>>>
>>>> #!endif
>>>>
>>>>
>>>> # ----- usrloc params -----
>>>> /* enable DB persistency for location entries */
>>>> #!ifdef WITH_USRLOCDB
>>>> modparam("usrloc", "db_url", DBURL)
>>>> modparam("usrloc", "db_mode", 2)
>>>> modparam("usrloc", "use_domain", MULTIDOMAIN)
>>>> #!endif
>>>>
>>>>
>>>> # ----- auth_db params -----
>>>> #!ifdef WITH_AUTH
>>>> modparam("auth_db", "db_url", DBURL)
>>>> modparam("auth_db", "calculate_ha1", yes)
>>>> modparam("auth_db", "password_column", "password")
>>>> modparam("auth_db", "load_credentials", "")
>>>> modparam("auth_db", "use_domain", MULTIDOMAIN)
>>>>
>>>> # ----- permissions params -----
>>>> #!ifdef WITH_IPAUTH
>>>> modparam("permissions", "db_url", DBURL)
>>>> modparam("permissions", "db_mode", 1)
>>>> #!endif
>>>>
>>>> #!endif
>>>>
>>>>
>>>> # ----- alias_db params -----
>>>> #!ifdef WITH_ALIASDB
>>>> modparam("alias_db", "db_url", DBURL)
>>>> modparam("alias_db", "use_domain", MULTIDOMAIN)
>>>> #!endif
>>>>
>>>>
>>>> # ----- domain params -----
>>>> #!ifdef WITH_MULTIDOMAIN
>>>> modparam("domain", "db_url", DBURL)
>>>> # use caching
>>>> modparam("domain", "db_mode", 1)
>>>> # register callback to match myself condition with domains list
>>>> modparam("domain", "register_myself", 1)
>>>> #!endif
>>>>
>>>>
>>>> #!ifdef WITH_PRESENCE
>>>> # ----- presence params -----
>>>> modparam("presence", "db_url", DBURL)
>>>>
>>>> # ----- presence_xml params -----
>>>> modparam("presence_xml", "db_url", DBURL)
>>>> modparam("presence_xml", "force_active", 1)
>>>> #!endif
>>>>
>>>>
>>>> #!ifdef WITH_NAT
>>>> # ----- rtpproxy params -----
>>>> modparam("rtpproxy", "rtpproxy_sock", "udp:127.0.0.1:7722")
>>>>
>>>> # ----- nathelper params -----
>>>> modparam("nathelper", "natping_interval", 30)
>>>> modparam("nathelper", "ping_nated_only", 1)
>>>> modparam("nathelper", "sipping_bflag", FLB_NATSIPPING)
>>>> modparam("nathelper", "sipping_from", "sip:pinger at kamailio.org")
>>>>
>>>> # params needed for NAT traversal in other modules
>>>> modparam("nathelper|registrar", "received_avp", "$avp(RECEIVED)")
>>>> modparam("usrloc", "nat_bflag", FLB_NATB)
>>>> #!endif
>>>>
>>>>
>>>> #!ifdef WITH_TLS
>>>> # ----- tls params -----
>>>> modparam("tls", "config", "/usr/local/etc/kamailio/tls.cfg")
>>>> #!endif
>>>>
>>>> #!ifdef WITH_ANTIFLOOD
>>>> # ----- pike params -----
>>>> modparam("pike", "sampling_time_unit", 2)
>>>> modparam("pike", "reqs_density_per_unit", 16)
>>>> modparam("pike", "remove_latency", 4)
>>>>
>>>> # ----- htable params -----
>>>> # ip ban htable with autoexpire after 5 minutes
>>>> modparam("htable", "htable", "ipban=>size=8;autoexpire=300;")
>>>> #!endif
>>>>
>>>> #!ifdef WITH_XMLRPC
>>>> # ----- xmlrpc params -----
>>>> modparam("xmlrpc", "route", "XMLRPC");
>>>> modparam("xmlrpc", "url_match", "^/RPC")
>>>> #!endif
>>>>
>>>> ####### Routing Logic ########
>>>>
>>>>
>>>> # Main SIP request routing logic
>>>> # - processing of any incoming SIP request starts with this route
>>>> route {
>>>>
>>>> # per request initial checks
>>>> route(REQINIT);
>>>>
>>>> # NAT detection
>>>> route(NAT);
>>>>
>>>> # handle requests within SIP dialogs
>>>> route(WITHINDLG);
>>>>
>>>> ### only initial requests (no To tag)
>>>>
>>>> # CANCEL processing
>>>> if (is_method("CANCEL"))
>>>> {
>>>> if (t_check_trans())
>>>> t_relay();
>>>> exit;
>>>> }
>>>>
>>>> t_check_trans();
>>>>
>>>> # authentication
>>>> route(AUTH);
>>>>
>>>> # record routing for dialog forming requests (in case they are
>>>> routed)
>>>> # - remove preloaded route headers
>>>> remove_hf("Route");
>>>> if (is_method("INVITE|SUBSCRIBE"))
>>>> record_route();
>>>>
>>>> # account only INVITEs
>>>> if (is_method("INVITE"))
>>>> {
>>>> setflag(FLT_ACC); # do accounting
>>>> }
>>>>
>>>> # dispatch requests to foreign domains
>>>> route(SIPOUT);
>>>>
>>>> ### requests for my local domains
>>>>
>>>> # handle presence related requests
>>>> route(PRESENCE);
>>>>
>>>> # handle registrations
>>>> route(REGISTRAR);
>>>>
>>>> if ($rU==$null)
>>>> {
>>>> # request with no Username in RURI
>>>> sl_send_reply("484","Address Incomplete");
>>>> exit;
>>>> }
>>>>
>>>> # dispatch destinations to PSTN
>>>> route(PSTN);
>>>>
>>>> # user location service
>>>> route(LOCATION);
>>>>
>>>> route(RELAY);
>>>> }
>>>>
>>>>
>>>> route[RELAY] {
>>>> #!ifdef WITH_NAT
>>>> if (check_route_param("nat=yes")) {
>>>> setbflag(FLB_NATB);
>>>> }
>>>> if (isflagset(FLT_NATS) || isbflagset(FLB_NATB)) {
>>>> route(RTPPROXY);
>>>> }
>>>> #!endif
>>>>
>>>> /* example how to enable some additional event routes */
>>>> if (is_method("INVITE")) {
>>>> #t_on_branch("BRANCH_ONE");
>>>> t_on_reply("REPLY_ONE");
>>>> t_on_failure("FAIL_ONE");
>>>> }
>>>>
>>>> if (!t_relay()) {
>>>> sl_reply_error();
>>>> }
>>>> exit;
>>>> }
>>>>
>>>> # Per SIP request initial checks
>>>> route[REQINIT] {
>>>> #!ifdef WITH_ANTIFLOOD
>>>> # flood dection from same IP and traffic ban for a while
>>>> # be sure you exclude checking trusted peers, such as pstn
>>>> gateways
>>>> # - local host excluded (e.g., loop to self)
>>>> if(src_ip!=myself)
>>>> {
>>>> if($sht(ipban=>$si)!=$null)
>>>> {
>>>> # ip is already blocked
>>>> xdbg("request from blocked IP - $rm from $fu
>>>> (IP:$si:$sp)\n");
>>>> exit;
>>>> }
>>>> if (!pike_check_req())
>>>> {
>>>> xlog("L_ALERT","ALERT: pike blocking $rm from $fu
>>>> (IP:$si:$sp)\n");
>>>> $sht(ipban=>$si) = 1;
>>>> exit;
>>>> }
>>>> }
>>>> #!endif
>>>>
>>>> if (!mf_process_maxfwd_header("10")) {
>>>> sl_send_reply("483","Too Many Hops");
>>>> exit;
>>>> }
>>>>
>>>> if(!sanity_check("1511", "7"))
>>>> {
>>>> xlog("Malformed SIP message from $si:$sp\n");
>>>> exit;
>>>> }
>>>> }
>>>>
>>>> # Handle requests within SIP dialogs
>>>> route[WITHINDLG] {
>>>> if (has_totag()) {
>>>> # sequential request withing a dialog should
>>>> # take the path determined by record-routing
>>>> if (loose_route()) {
>>>> if (is_method("BYE")) {
>>>> setflag(FLT_ACC); # do accounting ...
>>>> setflag(FLT_ACCFAILED); # ... even if the
>>>> transaction fails
>>>> }
>>>> route(RELAY);
>>>> } else {
>>>> if (is_method("SUBSCRIBE") && uri == myself) {
>>>> # in-dialog subscribe requests
>>>> route(PRESENCE);
>>>> exit;
>>>> }
>>>> if ( is_method("ACK") ) {
>>>> if ( t_check_trans() ) {
>>>> # no loose-route, but stateful ACK;
>>>> # must be an ACK after a 487
>>>> # or e.g. 404 from upstream server
>>>> t_relay();
>>>> exit;
>>>> } else {
>>>> # ACK without matching transaction ... ignore
>>>> and discard
>>>> exit;
>>>> }
>>>> }
>>>> sl_send_reply("404","Not here");
>>>> }
>>>> exit;
>>>> }
>>>> }
>>>>
>>>> # Handle SIP registrations
>>>> route[REGISTRAR] {
>>>> if (is_method("REGISTER"))
>>>> {
>>>> if(isflagset(FLT_NATS))
>>>> {
>>>> setbflag(FLB_NATB);
>>>> # uncomment next line to do SIP NAT pinging
>>>> ## setbflag(FLB_NATSIPPING);
>>>> }
>>>> if (!save("location"))
>>>> sl_reply_error();
>>>>
>>>> exit;
>>>> }
>>>> }
>>>>
>>>> # USER location service
>>>> route[LOCATION] {
>>>>
>>>> #!ifdef WITH_ALIASDB
>>>> # search in DB-based aliases
>>>> alias_db_lookup("dbaliases");
>>>> #!endif
>>>>
>>>> if (!lookup("location")) {
>>>> switch ($rc) {
>>>> case -1:
>>>> case -3:
>>>> t_newtran();
>>>> t_reply("404", "Not Found");
>>>> exit;
>>>> case -2:
>>>> sl_send_reply("405", "Method Not Allowed");
>>>> exit;
>>>> }
>>>> }
>>>>
>>>> # when routing via usrloc, log the missed calls also
>>>> if (is_method("INVITE"))
>>>> {
>>>> setflag(FLT_ACCMISSED);
>>>> }
>>>> }
>>>>
>>>> # Presence server route
>>>> route[PRESENCE] {
>>>> if(!is_method("PUBLISH|SUBSCRIBE"))
>>>> return;
>>>>
>>>> #!ifdef WITH_PRESENCE
>>>> if (!t_newtran())
>>>> {
>>>> sl_reply_error();
>>>> exit;
>>>> };
>>>>
>>>> if(is_method("PUBLISH"))
>>>> {
>>>> if($hdr(Sender)!= NULL)
>>>> handle_publish("$hdr(Sender)");
>>>> else
>>>> handle_publish("");
>>>> t_release();
>>>> }
>>>> else
>>>> if( is_method("SUBSCRIBE"))
>>>> {
>>>> handle_subscribe();
>>>> t_release();
>>>> }
>>>> exit;
>>>> #!endif
>>>>
>>>> # if presence enabled, this part will not be executed
>>>> if (is_method("PUBLISH") || $rU==$null)
>>>> {
>>>> sl_send_reply("404", "Not here");
>>>> exit;
>>>> }
>>>> return;
>>>> }
>>>>
>>>> # Authentication route
>>>> route[AUTH] {
>>>> #!ifdef WITH_AUTH
>>>> if (is_method("REGISTER"))
>>>> {
>>>> # authenticate the REGISTER requests (uncomment to enable
>>>> auth)
>>>> if (!www_authorize("$td", "subscriber"))
>>>> {
>>>> www_challenge("$td", "0");
>>>> exit;
>>>> }
>>>>
>>>> if ($au!=$tU)
>>>> {
>>>> sl_send_reply("403","Forbidden auth ID");
>>>> exit;
>>>> }
>>>> } else {
>>>>
>>>> #!ifdef WITH_IPAUTH
>>>> if(allow_source_address())
>>>> {
>>>> # source IP allowed
>>>> return;
>>>> }
>>>> #!endif
>>>> # authenticate if from local subscriber
>>>> if (from_uri==myself)
>>>> {
>>>> if (!proxy_authorize("$fd", "subscriber")) {
>>>> proxy_challenge("$fd", "0");
>>>> exit;
>>>> }
>>>> if (is_method("PUBLISH"))
>>>> {
>>>> if ($au!=$tU) {
>>>> sl_send_reply("403","Forbidden auth ID");
>>>> exit;
>>>> }
>>>> } else {
>>>> if ($au!=$fU) {
>>>> sl_send_reply("403","Forbidden auth ID");
>>>> exit;
>>>> }
>>>> }
>>>>
>>>> consume_credentials();
>>>> # caller authenticated
>>>> } else {
>>>> # caller is not local subscriber, then check if it calls
>>>> # a local destination, otherwise deny, not an open
>>>> relay here
>>>> if (!uri==myself)
>>>> {
>>>> sl_send_reply("403","Not relaying");
>>>> exit;
>>>> }
>>>> }
>>>> }
>>>> #!endif
>>>> return;
>>>> }
>>>>
>>>> # Caller NAT detection route
>>>> route[NAT] {
>>>> #!ifdef WITH_NAT
>>>> force_rport();
>>>> if (nat_uac_test("19")) {
>>>> if (method=="REGISTER") {
>>>> fix_nated_register();
>>>> } else {
>>>> fix_nated_contact();
>>>> }
>>>> setflag(FLT_NATS);
>>>> }
>>>> #!endif
>>>> return;
>>>> }
>>>>
>>>> # RTPProxy control
>>>> route[RTPPROXY] {
>>>> #!ifdef WITH_NAT
>>>> if (is_method("BYE")) {
>>>> unforce_rtp_proxy();
>>>> } else if (is_method("INVITE")){
>>>> force_rtp_proxy();
>>>> }
>>>> if (!has_totag()) add_rr_param(";nat=yes");
>>>> #!endif
>>>> return;
>>>> }
>>>>
>>>> # Routing to foreign domains
>>>> route[SIPOUT] {
>>>> if (!uri==myself)
>>>> {
>>>> append_hf("P-hint: outbound\r\n");
>>>> route(RELAY);
>>>> }
>>>> }
>>>>
>>>> # PSTN GW routing
>>>> route[PSTN] {
>>>> #!ifdef WITH_PSTN
>>>> # check if PSTN GW IP is defined
>>>> if (strempty($sel(cfg_get.pstn.gw_ip))) {
>>>> xlog("SCRIPT: PSTN rotuing enabled but pstn.gw_ip not
>>>> defined\n");
>>>> return;
>>>> }
>>>>
>>>> # route to PSTN dialed numbers starting with '+' or '00'
>>>> # (international format)
>>>> # - update the condition to match your dialing rules for PSTN
>>>> routing
>>>> if(!($rU=~"^(\+|00)[1-9][0-9]{3,20}$"))
>>>> return;
>>>>
>>>> # only local users allowed to call
>>>> if(from_uri!=myself) {
>>>> sl_send_reply("403", "Not Allowed");
>>>> exit;
>>>> }
>>>>
>>>> $ru = "sip:" + $rU + "@" + $sel(cfg_get.pstn.gw_ip);
>>>>
>>>> route(RELAY);
>>>> exit;
>>>> #!endif
>>>>
>>>> return;
>>>> }
>>>>
>>>> # XMLRPC routing
>>>> #!ifdef WITH_XMLRPC
>>>> route[XMLRPC]
>>>> {
>>>> # allow XMLRPC from localhost
>>>> if ((method=="POST" || method=="GET")
>>>> && (src_ip==127.0.0.1)) {
>>>> # close connection only for xmlrpclib user agents (there is
>>>> a bug in
>>>> # xmlrpclib: it waits for EOF before interpreting the
>>>> response).
>>>> if ($hdr(User-Agent) =~ "xmlrpclib")
>>>> set_reply_close();
>>>> set_reply_no_connect();
>>>> dispatch_rpc();
>>>> exit;
>>>> }
>>>> send_reply("403", "Forbidden");
>>>> exit;
>>>> }
>>>> #!endif
>>>>
>>>> # Sample branch router
>>>> branch_route[BRANCH_ONE] {
>>>> xdbg("new branch at $ru\n");
>>>> }
>>>>
>>>> # Sample onreply route
>>>> onreply_route[REPLY_ONE] {
>>>> xdbg("incoming reply\n");
>>>> #!ifdef WITH_NAT
>>>> if ((isflagset(FLT_NATS) || isbflagset(FLB_NATB))
>>>> && status=~"(183)|(2[0-9][0-9])") {
>>>> force_rtp_proxy();
>>>> }
>>>> if (isbflagset("6")) {
>>>> fix_nated_contact();
>>>> }
>>>> #!endif
>>>> }
>>>>
>>>> # Sample failure route
>>>> failure_route[FAIL_ONE] {
>>>> #!ifdef WITH_NAT
>>>> if (is_method("INVITE")
>>>> && (isbflagset(FLB_NATB) || isflagset(FLT_NATS))) {
>>>> unforce_rtp_proxy();
>>>> }
>>>> #!endif
>>>>
>>>> if (t_is_canceled()) {
>>>> exit;
>>>> }
>>>>
>>>> # uncomment the following lines if you want to block client
>>>> # redirect based on 3xx replies.
>>>> ##if (t_check_status("3[0-9][0-9]")) {
>>>> ##t_reply("404","Not found");
>>>> ## exit;
>>>> ##}
>>>>
>>>> # uncomment the following lines if you want to redirect the failed
>>>> # calls to a different new destination
>>>> ##if (t_check_status("486|408")) {
>>>> ## sethostport("192.168.2.100:5060");
>>>> ## append_branch();
>>>> ## # do not set the missed call flag again
>>>> ## t_relay();
>>>> ##}
>>>> }
>>>>
>>>>
>>>> Thanks a lot,
>>>> Andrés.
>>>>
>>>> El 29/11/2010 15:15, Klaus Darilion escribió:
>>>>> If you do not want to authenticate the requests then disable
>>>>> authentication kamailio.cfg
>>>>>
>>>>> regards
>>>>> Klaus
>>>>>
>>>>> Am 29.11.2010 12:53, schrieb "Andrés S. García Ruiz":
>>>>>>
>>>>>> Hi everybody,
>>>>>>
>>>>>> I'm trying to deploy an IMS network with OpenIMSCore and
>>>>>> Kamailio. Since
>>>>>> OpenIMSCore has been already tested along with Mobicents, now I want
>>>>>> substitute Mobicents for Kamailio. I've also successfully installed
>>>>>> Kamailio. I can run it without any problem, but when SIP Publish
>>>>>> messages arrive at Kamalio, it answers with "407 Proxy
>>>>>> Authentication
>>>>>> Required". The IMS presentity is already registered against the
>>>>>> OpenIMSCore. How can I solve that problem?
>>>>>>
>>>>>> The publish message sent:
>>>>>>
>>>>>> PUBLISH sip:testuser01 at open-ims.test SIP/2.0
>>>>>> Route: <sip:ciervo.inf.um.es:5060;lr>,
>>>>>> <sip:iscmark at scscf.open-ims.test:6060;lr;s=1;h=0;d=0;a=7369703a74657374757365723031406f70656e2d696d732e74657374>
>>>>>>
>>>>>>
>>>>>> Call-ID: K28QO9PYAE5vn3RNdYOkIEddMEd6yDiqeAW7DwSt6XV.
>>>>>> CSeq: 1 PUBLISH
>>>>>> From: "testuser01" <sip:testuser01 at open-ims.test>;tag=ff123bda
>>>>>> To: "testuser01" <sip:testuser01 at open-ims.test>
>>>>>> Via: SIP/2.0/UDP 155.54.210.135:6060;branch=z9hG4bKa31a.6cba1cd2.0
>>>>>> Via: SIP/2.0/UDP
>>>>>> 155.54.210.134:4060;branch=z9hG4bKa31a.71481d13.0;i=1
>>>>>> Via: SIP/2.0/TCP
>>>>>> 155.54.190.166:8060;rport=41624;branch=z9hG4bK-d8754z-ce7487ff34be55f9-1---d8754z-
>>>>>>
>>>>>>
>>>>>> Max-Forwards: 15
>>>>>> Content-Type: application/pidf+xml
>>>>>> Expires: 30000
>>>>>> Event: presence
>>>>>> Contact: <sip:testuser01 at 155.54.190.166:8060>
>>>>>> Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
>>>>>> SUBSCRIBE, INFO
>>>>>> User-Agent: X-Lite IMS-OSGi-Client 0.1
>>>>>> CVS-Mon_Nov_29_10-14-33_CET_2010
>>>>>> Content-Length: 451
>>>>>> P-Asserted-Identity: <sip:testuser01 at open-ims.test>
>>>>>> P-Charging-Vector:
>>>>>> icid-value="P-CSCFabcd000000004cf3708400000002";icid-generated-at=155.54.210.134;orig-ioi="open-ims.test"
>>>>>>
>>>>>>
>>>>>>
>>>>>> <?xml version='1.0' encoding='UTF-8'?><presence
>>>>>> xmlns='urn:ietf:params:xml:ns:pidf'
>>>>>> xmlns:c='urn:ietf:params:xml:ns:pidf:cipid'
>>>>>> xmlns:dm='urn:ietf:params:xml:ns:pidf:data-model'
>>>>>> xmlns:rpid='urn:ietf:params:xml:ns:pidf:rpid'
>>>>>> entity='sip:testuser01 at open-ims.test'><tuple
>>>>>> id='t6b9a6ab3'><status><basic>open</basic></status></tuple><dm:person
>>>>>>
>>>>>> id='p34b126e5'><rpid:activities><rpid:Online/></rpid:activities><dm:note>Online</dm:note></dm:person></presence>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> Kamailio answer:
>>>>>> SIP/2.0 407 Proxy Authentication Required
>>>>>> Call-ID: K28QO9PYAE5vn3RNdYOkIEddMEd6yDiqeAW7DwSt6XV.
>>>>>> CSeq: 1 PUBLISH
>>>>>> From: "testuser01" <sip:testuser01 at open-ims.test>;tag=ff123bda
>>>>>> To: "testuser01"
>>>>>> <sip:testuser01 at open-ims.test>;tag=b27e1a1d33761e85846fc98f5f3a7e58.3d3a
>>>>>>
>>>>>> Via: SIP/2.0/UDP 155.54.210.135:6060;branch=z9hG4bKa31a.6cba1cd2.0
>>>>>> Via: SIP/2.0/UDP
>>>>>> 155.54.210.134:4060;branch=z9hG4bKa31a.71481d13.0;i=1
>>>>>> Via: SIP/2.0/TCP
>>>>>> 155.54.190.166:8060;rport=41624;branch=z9hG4bK-d8754z-ce7487ff34be55f9-1---d8754z-
>>>>>>
>>>>>>
>>>>>> Proxy-Authenticate: Digest realm="open-ims.test",
>>>>>> nonce="TPNwMkzzbwZRE1piAM8yHaXGsXvwS16v"
>>>>>> Server: kamailio (3.1.0 (i386/linux))
>>>>>> Content-Length: 0
>>>>>>
>>>>>>
>>>>>> Kamailio log:
>>>>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:628]: SIP Request:
>>>>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:630]: method: <PUBLISH>
>>>>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:632]: uri:
>>>>>> <sip:testuser01 at open-ims.test>
>>>>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:634]: version: <SIP/2.0>
>>>>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:165]: get_hdr_field:
>>>>>> cseq
>>>>>> <CSeq>: <1> <PUBLISH>
>>>>>> 5(15391) DEBUG: <core> [parser/parse_to.c:803]: end of header
>>>>>> reached,
>>>>>> state=10
>>>>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:185]: DEBUG:
>>>>>> get_hdr_field:
>>>>>> <To> [45]; uri=[sip:testuser01 at open-ims.test]
>>>>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:187]: DEBUG: to body
>>>>>> ["testuser01" <sip:testuser01 at open-ims.test>
>>>>>> ]
>>>>>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param
>>>>>> type 232,
>>>>>> <branch> = <z9hG4bKa31a.6cba1cd2.0>; state=16
>>>>>> 5(15391) DEBUG: <core> [parser/parse_via.c:2300]: end of header
>>>>>> reached,
>>>>>> state=5
>>>>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:513]: parse_headers: Via
>>>>>> found, flags=2
>>>>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:515]: parse_headers:
>>>>>> this is
>>>>>> the first via
>>>>>> 5(15391) DEBUG: <core> [receive.c:145]: After parse_msg...
>>>>>> 5(15391) DEBUG: <core> [receive.c:186]: preparing to run routing
>>>>>> scripts...
>>>>>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param
>>>>>> type 232,
>>>>>> <branch> = <z9hG4bKa31a.71481d13.0>; state=6
>>>>>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param
>>>>>> type 236,
>>>>>> <i> = <1>; state=16
>>>>>> 5(15391) DEBUG: <core> [parser/parse_via.c:2300]: end of header
>>>>>> reached,
>>>>>> state=5
>>>>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:513]: parse_headers: Via
>>>>>> found, flags=100
>>>>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:526]: parse_headers:
>>>>>> this is
>>>>>> the second via
>>>>>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param
>>>>>> type 235,
>>>>>> <rport> = <41624>; state=6
>>>>>> 5(15391) DEBUG: <core> [parser/parse_via.c:1287]: Found param
>>>>>> type 232,
>>>>>> <branch> = <z9hG4bK-d8754z-ce7487ff34be55f9-1---d8754z->; state=16
>>>>>> 5(15391) DEBUG: <core> [parser/parse_via.c:2300]: end of header
>>>>>> reached,
>>>>>> state=5
>>>>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:513]: parse_headers: Via
>>>>>> found, flags=100
>>>>>> 5(15391) DEBUG: maxfwd [mf_funcs.c:85]: value = 15
>>>>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:199]: DEBUG:
>>>>>> get_hdr_body :
>>>>>> content_length=451
>>>>>> 5(15391) DEBUG: <core> [parser/msg_parser.c:101]: found end of
>>>>>> header
>>>>>> 5(15391) DEBUG: <core> [parser/parse_to.c:174]: DEBUG: add_param:
>>>>>> tag=ff123bda
>>>>>> 5(15391) DEBUG: <core> [parser/parse_to.c:803]: end of header
>>>>>> reached,
>>>>>> state=29
>>>>>> 5(15391) DEBUG: sanity [mod_sanity.c:217]: all sanity checks passed
>>>>>> 5(15391) DEBUG: siputils [checks.c:73]: no totag
>>>>>> 5(15391) DEBUG: tm [t_lookup.c:1081]: DEBUG: t_check_msg: msg id=1
>>>>>> global id=0 T start=0xffffffff
>>>>>> 5(15391) DEBUG: tm [t_lookup.c:528]: t_lookup_request: start
>>>>>> searching:
>>>>>> hash=41274, isACK=0
>>>>>> 5(15391) DEBUG: tm [t_lookup.c:485]: DEBUG: RFC3261 transaction
>>>>>> matching
>>>>>> failed
>>>>>> 5(15391) DEBUG: tm [t_lookup.c:711]: DEBUG: t_lookup_request: no
>>>>>> transaction found
>>>>>> 5(15391) DEBUG: tm [t_lookup.c:1150]: DEBUG: t_check_msg: msg id=1
>>>>>> global id=1 T end=(nil)
>>>>>> 5(15391) DEBUG: <core> [socket_info.c:501]: grep_sock_info -
>>>>>> checking if
>>>>>> host==us: 13==9 && [open-ims.test] == [127.0.0.1]
>>>>>> 5(15391) DEBUG: <core> [socket_info.c:504]: grep_sock_info -
>>>>>> checking if
>>>>>> port 5060 matches port 5060
>>>>>> 5(15391) DEBUG: <core> [socket_info.c:501]: grep_sock_info -
>>>>>> checking if
>>>>>> host==us: 13==14 && [open-ims.test] == [155.54.190.245]
>>>>>> 5(15391) DEBUG: <core> [socket_info.c:504]: grep_sock_info -
>>>>>> checking if
>>>>>> port 5060 matches port 5060
>>>>>> 5(15391) DEBUG: <core> [socket_info.c:501]: grep_sock_info -
>>>>>> checking if
>>>>>> host==us: 13==9 && [open-ims.test] == [127.0.0.1]
>>>>>> 5(15391) DEBUG: <core> [socket_info.c:504]: grep_sock_info -
>>>>>> checking if
>>>>>> port 5060 matches port 5060
>>>>>> 5(15391) DEBUG: <core> [socket_info.c:501]: grep_sock_info -
>>>>>> checking if
>>>>>> host==us: 13==14 && [open-ims.test] == [155.54.190.245]
>>>>>> 5(15391) DEBUG: <core> [socket_info.c:504]: grep_sock_info -
>>>>>> checking if
>>>>>> port 5060 matches port 5060
>>>>>> 5(15391) DEBUG: auth_db [authorize.c:239]: realm value
>>>>>> [open-ims.test]
>>>>>> 5(15391) DEBUG: auth [api.c:85]: auth:pre_auth: Credentials with
>>>>>> realm
>>>>>> 'open-ims.test' not found
>>>>>> 5(15391) DEBUG: auth_db [authorize.c:257]: not authenticated
>>>>>> 5(15391) DEBUG: auth [challenge.c:102]: build_challenge_hf:
>>>>>> realm='open-ims.test'
>>>>>> 5(15391) DEBUG: auth [challenge.c:236]: auth: 'Proxy-Authenticate:
>>>>>> Digest realm="open-ims.test",
>>>>>> nonce="TPNwMkzzbwZRE1piAM8yHaXGsXvwS16v"
>>>>>> '
>>>>>> 5(15391) DEBUG: sl [sl.c:278]: reply in stateless mode (sl)
>>>>>> 5(15391) DEBUG: <core> [msg_translator.c:207]:
>>>>>> check_via_address(155.54.210.135, 155.54.210.135, 0)
>>>>>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>>>>>> destroying list (nil)
>>>>>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>>>>>> destroying list (nil)
>>>>>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>>>>>> destroying list (nil)
>>>>>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>>>>>> destroying list (nil)
>>>>>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>>>>>> destroying list (nil)
>>>>>> 5(15391) DEBUG: <core> [usr_avp.c:646]: DEBUG:destroy_avp_list:
>>>>>> destroying list (nil)
>>>>>> 5(15391) DEBUG: <core> [receive.c:289]: receive_msg: cleaning up
>>>>>>
>>>>>>
>>>>>> Thanks in advance,
>>>>>> Andrés.
>>>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing
>>>> list
>>>> sr-users at lists.sip-router.org
>>>> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
>>>
>>
>>
>> _______________________________________________
>> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
>> sr-users at lists.sip-router.org
>> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
>
More information about the sr-users
mailing list