[SR-Users] Need Help: how to make Presence, RLS, PUA and XCAP work

Carsten Bock carsten at ng-voice.com
Fri Sep 6 09:07:31 CEST 2013


Hi Evgeny,

unfortunately, it's not that easy to use Kamailio in an RCS-setup (as
expected). Kamailio supports all basic protocols (e.g. SIP & MSRP) and
functionalities (e.g. SIP-Simple-Presence), but the RCS-specs have all
sorts of extensions to these specs, which are not implemented in
Kamailio (yet).

One prominent example is MSRP:
- Camarillo wrote in "The 3G IP Multimedia Subsystem" (the famous big
yellow book on IMS), that in order to work with NAT, MSRP-Relays (as
implemented in Kamailio) should be used (Chapter 21.4.6, page 464
ff.).
- with current RCS-specs (and especially with JOYN) you need to have a
MSRP-B2BUA and you need to provide "Store and Forward" on MSRP; hence
you cannot configure MSRP-Relays in those clients (I only checked the
Orange-RCS-Client).

With other parts of the latest RCS-releases it's almost the same; i
believe it could be added to Kamailio, but someone has to do it...

Kind regards,
Carsten

2013/9/6 Evgeny Vinnik <vinnik at broadcom.com>:
> Hello Kamailio Community,
>
>
>
> I am struggle to make presence service work on my system.
>
>
>
> Currently I have PUA list, RLS Watchers List and RLS Presentity List empty.
>
>
>
> What should I do to see anything there?
>
> I am using Media5-RCS android app and Orange Labs’ Android RCS IMS stack as
> my client.
>
>
> Basically I want to use Kamailio as an RCS server
>
>
>
> This is my configuration file:
>
>
>
> #!KAMAILIO
>
>
>
> #!ifdef ACCDB_COMMENT
>
> ALTER TABLE acc ADD COLUMN src_user VARCHAR(64) NOT NULL DEFAULT '';
>
> ALTER TABLE acc ADD COLUMN src_domain VARCHAR(128) NOT NULL DEFAULT '';
>
> ALTER TABLE acc ADD COLUMN dst_ouser VARCHAR(64) NOT NULL DEFAULT '';
>
> ALTER TABLE acc ADD COLUMN dst_user VARCHAR(64) NOT NULL DEFAULT '';
>
> ALTER TABLE acc ADD COLUMN dst_domain VARCHAR(128) NOT NULL DEFAULT '';
>
> ALTER TABLE missed_calls ADD COLUMN src_user VARCHAR(64) NOT NULL
>
> DEFAULT '';
>
> ALTER TABLE missed_calls ADD COLUMN src_domain VARCHAR(128) NOT NULL
>
> DEFAULT '';
>
> ALTER TABLE missed_calls ADD COLUMN dst_ouser VARCHAR(64) NOT NULL
>
> DEFAULT '';
>
> ALTER TABLE missed_calls ADD COLUMN dst_user VARCHAR(64) NOT NULL
>
> DEFAULT '';
>
> ALTER TABLE missed_calls ADD COLUMN dst_domain VARCHAR(128) NOT NULL
>
> DEFAULT '';
>
> #!endif
>
>
>
> ####### Defined Values #########
>
>
>
> #!define WITH_DEBUG
>
> #!define WITH_AUTH
>
> #!define WITH_MYSQL
>
> #!define WITH_USRLOCDB
>
> #!define WITH_PRESENCE
>
> #!define WITH_XCAPSRV
>
>
>
>
>
> # *** Value defines - IDs used later in config
>
> #!ifdef WITH_MYSQL
>
> # - database URL - used to connect to database server by modules such
>
> # as: auth_db, acc, usrloc, a.s.o.
>
> #!define DBURL "mysql://kamailio:kamailiorw@localhost/kamailio"
>
> #!endif
>
> #!ifdef WITH_MULTIDOMAIN
>
> # - the value for 'use_domain' parameters
>
> #!define MULTIDOMAIN 1
>
> #!else
>
> #!define MULTIDOMAIN 0
>
> #!endif
>
>
>
> # - flags
>
> # FLT_ - per transaction (message) flags
>
> # FLB_ - per branch flags
>
> #!define FLT_ACC 1
>
> #!define FLT_ACCMISSED 2
>
> #!define FLT_ACCFAILED 3
>
> #!define FLT_NATS 5
>
>
>
> #!define FLB_NATB 6
>
> #!define FLB_NATSIPPING 7:5060"
>
>
>
> ####### Global Parameters #########
>
>
>
> #!ifdef WITH_DEBUG
>
> debug=4
>
> log_stderror=yes
>
> #!else
>
> debug=2
>
> log_stderror=no
>
> #!endif
>
>
>
> memdbg=5
>
> memlog=5
>
>
>
> log_facility=LOG_LOCAL0
>
>
>
> fork=yes
>
> children=4
>
>
>
> /* uncomment the next line to disable TCP (default on) */
>
> #disable_tcp=yes
>
>
>
>
>
> /* uncomment the next line to disable the auto discovery of local aliases
>
> based on reverse DNS on IPs (default on) */
>
> #auto_aliases=no
>
>
>
> /* add local domain aliases */
>
> alias="192.168.1.120"
>
>
>
> /* uncomment and configure the following line if you want Kamailio to
>
> bind on a specific interface/port/proto (default bind on all available) */
>
> #listen=udp:10.0.0.10:5060
>
>
>
> /* port to listen to
>
> * - can be specified more than once if needed to listen on many ports */
>
> port=5060
>
>
>
> #!ifdef WITH_TLS
>
> enable_tls=yes
>
> #!endif
>
>
>
> #!ifdef WITH_XCAPSRV
>
> tcp_accept_no_cl=yes
>
> #!endif
>
>
>
> ####### Custom Parameters #########
>
>
>
> # These parameters can be modified runtime via RPC interface
>
> # - see the documentation of 'cfg_rpc' module.
>
> #
>
> # Format: group.id = value 'desc' description
>
> # Access: $sel(cfg_get.group.id) or @cfg_get.group.id
>
> #
>
>
>
> #!ifdef WITH_PSTN
>
> # PSTN GW Routing
>
> #
>
> # - pstn.gw_ip: valid IP or hostname as string value, example:
>
> # pstn.gw_ip = "10.0.0.101" desc "My PSTN GW Address"
>
> #
>
> # - by default is empty to avoid misrouting
>
> pstn.gw_ip = "" desc "PSTN GW Address"
>
> #!endif
>
>
>
>
>
> ####### Modules Section ########
>
>
>
> # set paths to location of modules
>
> #!ifdef LOCAL_TEST_RUN
>
> mpath="modules_k:modules"
>
> #!else
>
> mpath="/usr/local/lib/kamailio/modules_k/:/home/user/git/sip-router/modules/"
>
> #!endif
>
>
>
> #!ifdef WITH_MYSQL
>
> loadmodule "db_mysql.so"
>
> #!endif
>
>
>
> loadmodule "mi_fifo.so"
>
> loadmodule "kex.so"
>
> loadmodule "tm.so"
>
> loadmodule "tmx.so"
>
> loadmodule "sl.so"
>
> loadmodule "rr.so"
>
> loadmodule "pv.so"
>
> loadmodule "maxfwd.so"
>
> loadmodule "usrloc.so"
>
> loadmodule "registrar.so"
>
> loadmodule "textops.so"
>
> loadmodule "siputils.so"
>
> loadmodule "xlog.so"
>
> loadmodule "sanity.so"
>
> loadmodule "ctl.so"
>
> loadmodule "mi_rpc.so"
>
> loadmodule "acc.so"
>
> # loadmodule "pua_mi.so"
>
> # loadmodule "pua_usrloc.so"
>
> loadmodule "outbound.so"
>
>
>
>
>
> #!ifdef WITH_AUTH
>
> loadmodule "auth.so"
>
> loadmodule "auth_db.so"
>
> #!ifdef WITH_IPAUTH
>
> loadmodule "permissions.so"
>
> #!endif
>
> #!endif
>
>
>
> #!ifdef WITH_ALIASDB
>
> loadmodule "alias_db.so"
>
> #!endif
>
>
>
> #!ifdef WITH_MULTIDOMAIN
>
> loadmodule "domain.so"
>
> #!endif
>
>
>
> #!ifdef WITH_PRESENCE
>
> loadmodule "presence.so"
>
> loadmodule "presence_xml.so"
>
> loadmodule "pua.so"
>
> loadmodule "rls.so"
>
> #!endif
>
>
>
> #!ifdef WITH_NAT
>
> loadmodule "nathelper.so"
>
> loadmodule "rtpproxy.so"
>
> #!endif
>
>
>
> #!ifdef WITH_TLS
>
> loadmodule "tls.so"
>
> #!endif
>
>
>
> #!ifdef WITH_ANTIFLOOD
>
> loadmodule "htable.so"
>
> loadmodule "pike.so"
>
> #!endif
>
>
>
> #!ifdef WITH_XMLRPC
>
> loadmodule "xmlrpc.so"
>
> #!endif
>
>
>
> #!ifdef WITH_XCAPSRV
>
> loadmodule "xhttp.so"
>
> loadmodule "xcap_server.so"
>
> #!endif
>
>
>
> # ----------------- setting module-specific parameters ---------------
>
>
>
>
>
> # ----- mi_fifo params -----
>
> modparam("mi_fifo", "fifo_name", "/tmp/kamailio_fifo")
>
>
>
>
>
> # ----- tm params -----
>
> # auto-discard branches from previous serial forking leg
>
> modparam("tm", "failure_reply_mode", 3)
>
> # default retransmission timeout: 30sec
>
> modparam("tm", "fr_timer", 30000)
>
> # default invite retransmission timeout after 1xx: 120sec
>
> modparam("tm", "fr_inv_timer", 120000)
>
>
>
>
>
> # ----- rr params -----
>
> # add value to ;lr param to cope with most of the UAs
>
> modparam("rr", "enable_full_lr", 1)
>
> # do not append from tag to the RR (no need for this script)
>
> modparam("rr", "append_fromtag", 0)
>
>
>
>
>
> # ----- registrar params -----
>
> modparam("registrar", "method_filtering", 1)
>
> /* uncomment the next line to disable parallel forking via location */
>
> # modparam("registrar", "append_branches", 0)
>
> /* uncomment the next line not to allow more than 10 contacts per AOR */
>
> #modparam("registrar", "max_contacts", 10)
>
>
>
>
>
> # ----- acc params -----
>
> /* what special events should be accounted ? */
>
> modparam("acc", "early_media", 0)
>
> modparam("acc", "report_ack", 0)
>
> modparam("acc", "report_cancels", 0)
>
> /* by default ww do not adjust the direct of the sequential requests.
>
> if you enable this parameter, be sure the enable "append_fromtag"
>
> in "rr" module */
>
> modparam("acc", "detect_direction", 0)
>
> /* account triggers (flags) */
>
> modparam("acc", "log_flag", FLT_ACC)
>
> modparam("acc", "log_missed_flag", FLT_ACCMISSED)
>
> modparam("acc", "log_extra",
>
> "src_user=$fU;src_domain=$fd;dst_ouser=$tU;dst_user=$rU;dst_domain=$rd")
>
> modparam("acc", "failed_transaction_flag", FLT_ACCFAILED)
>
> /* enhanced DB accounting */
>
> #!ifdef WITH_ACCDB
>
> modparam("acc", "db_flag", FLT_ACC)
>
> modparam("acc", "db_missed_flag", FLT_ACCMISSED)
>
> modparam("acc", "db_url", DBURL)
>
> modparam("acc", "db_extra",
>
> "src_user=$fU;src_domain=$fd;dst_ouser=$tU;dst_user=$rU;dst_domain=$rd")
>
> #!endif
>
>
>
>
>
> # ----- usrloc params -----
>
> /* enable DB persistency for location entries */
>
> #!ifdef WITH_USRLOCDB
>
> modparam("usrloc", "db_url", DBURL)
>
> modparam("usrloc", "db_mode", 2)
>
> modparam("usrloc", "use_domain", MULTIDOMAIN)
>
> #!endif
>
>
>
>
>
> # ----- auth_db params -----
>
> #!ifdef WITH_AUTH
>
> modparam("auth_db", "db_url", DBURL)
>
> modparam("auth_db", "calculate_ha1", yes)
>
> modparam("auth_db", "password_column", "password")
>
> modparam("auth_db", "load_credentials", "")
>
> modparam("auth_db", "use_domain", MULTIDOMAIN)
>
>
>
> # ----- permissions params -----
>
> #!ifdef WITH_IPAUTH
>
> modparam("permissions", "db_url", DBURL)
>
> modparam("permissions", "db_mode", 1)
>
> #!endif
>
>
>
> #!endif
>
>
>
>
>
> # ----- alias_db params -----
>
> #!ifdef WITH_ALIASDB
>
> modparam("alias_db", "db_url", DBURL)
>
> modparam("alias_db", "use_domain", MULTIDOMAIN)
>
> #!endif
>
>
>
>
>
> # ----- domain params -----
>
> #!ifdef WITH_MULTIDOMAIN
>
> modparam("domain", "db_url", DBURL)
>
> # use caching
>
> modparam("domain", "db_mode", 1)
>
> # register callback to match myself condition with domains list
>
> modparam("domain", "register_myself", 1)
>
> #!endif
>
>
>
>
>
> #!ifdef WITH_PRESENCE
>
> # ----- presence params -----
>
> modparam("presence", "db_url", DBURL)
>
> #modparam("presence", "server_address", "sip:presence at 192.168.1.120:5060")
>
>
>
> # ----- presence_xml params -----
>
> modparam("pua", "db_url", DBURL)
>
> modparam("pua", "db_table", "pua")
>
>
>
> modparam("presence_xml", "db_url", DBURL)
>
> modparam("presence_xml", "force_active", 1)
>
> #modparam("presence_xml", "pidf_manipulation", 1)
>
> modparam("presence_xml", "integrated_xcap_server", 1)
>
> modparam("rls", "db_url", DBURL)
>
> modparam("rls", "xcap_table", "xcap")
>
> modparam("rls", "rlsubs_table", "rls_watchers")
>
> modparam("rls", "rlpres_table", "rls_presentity")
>
> modparam("rls", "clean_period", 100)
>
> modparam("rls", "waitn_time", 50)
>
> modparam("rls", "max_expires", 10800)
>
> modparam("rls", "hash_size", 9)
>
> modparam("rls", "xcap_root", "http://192.168.1.120/xcap-root:5060")
>
> modparam("rls", "integrated_xcap_server", 1)
>
> modparam("rls", "to_presence_code", 10)
>
> modparam("rls", "rls_event", "presence")
>
> modparam("rls", "server_address", "sip:rls at 192.168.1.120:5060")
>
> #!endif
>
>
>
>
>
> #!ifdef WITH_NAT
>
> # ----- rtpproxy params -----
>
> modparam("rtpproxy", "rtpproxy_sock", "udp:127.0.0.1:7722")
>
>
>
> # ----- nathelper params -----
>
> modparam("nathelper", "natping_interval", 30)
>
> modparam("nathelper", "ping_nated_only", 1)
>
> modparam("nathelper", "sipping_bflag", FLB_NATSIPPING)
>
> modparam("nathelper", "sipping_from", "sip:pinger at kamailio.org")
>
>
>
> # params needed for NAT traversal in other modules
>
> modparam("nathelper|registrar", "received_avp", "$avp(RECEIVED)")
>
> modparam("usrloc", "nat_bflag", FLB_NATB)
>
> #!endif
>
>
>
>
>
> #!ifdef WITH_TLS
>
> # ----- tls params -----
>
> modparam("tls", "config", "/etc/kamailio/tls.cfg")
>
> #!endif
>
>
>
> #!ifdef WITH_ANTIFLOOD
>
> # ----- pike params -----
>
> modparam("pike", "sampling_time_unit", 2)
>
> modparam("pike", "reqs_density_per_unit", 16)
>
> modparam("pike", "remove_latency", 4)
>
>
>
> # ----- htable params -----
>
> # ip ban htable with autoexpire after 5 minutes
>
> modparam("htable", "htable", "ipban=>size=8;autoexpire=300;")
>
> #!endif
>
>
>
> #!ifdef WITH_XMLRPC
>
> # ----- xmlrpc params -----
>
> modparam("xmlrpc", "route", "XMLRPC");
>
> modparam("xmlrpc", "url_match", "^/RPC")
>
> #!endif
>
>
>
> #!ifdef WITH_XCAPSRV
>
> # ----- xcap_server params -----
>
> modparam("xcap_server", "db_url", DBURL)
>
> # modparam("rls", "integrated_xcap_server", 1)
>
> #!endif
>
>
>
> ####### Routing Logic ########
>
>
>
>
>
> # Main SIP request routing logic
>
> # - processing of any incoming SIP request starts with this route
>
> route {
>
>
>
>                 # per request initial checks
>
>                 route(REQINIT);
>
>
>
>                 # NAT detection
>
>                 route(NAT);
>
>
>
>                 # handle requests within SIP dialogs
>
>                 route(WITHINDLG);
>
>
>
>                 ### only initial requests (no To tag)
>
>
>
>                 # CANCEL processing
>
>                 if (is_method("CANCEL"))
>
>                 {
>
>                                 if (t_check_trans())
>
>                                 t_relay();
>
>                                 exit;
>
>                 }
>
>
>
>                 t_check_trans();
>
>
>
>                 # authentication
>
>                 route(AUTH);
>
>
>
>                 # record routing for dialog forming requests (in case they
> are routed)
>
>                 # - remove preloaded route headers
>
>                 remove_hf("Route");
>
>
>
>                 if(is_method("NOTIFY"))
>
>                 {
>
>                                 xlog("  pua_update_contact  $rm from $fu
> (IP:$si:$sp)  \n");
>
>
>
>         if(!pua_update_contact())
>
>              xlog("pua update failed \n");
>
>                 }
>
>
>
>                 if (is_method("INVITE|SUBSCRIBE"))
>
>                                 record_route();
>
>
>
>                 # account only INVITEs
>
>                 if (is_method("INVITE"))
>
>                 {
>
>                                 setflag(FLT_ACC); # do accounting
>
>                 }
>
>
>
>                 # dispatch requests to foreign domains
>
>                 route(SIPOUT);
>
>
>
>                 ### requests for my local domains
>
>
>
>                 # handle presence related requests
>
>                 route(PRESENCE);
>
>
>
>                 # handle registrations
>
>                 route(REGISTRAR);
>
>
>
>                 if ($rU==$null)
>
>                 {
>
>                                 # request with no Username in RURI
>
>                                 sl_send_reply("484","Address Incomplete");
>
>                                 exit;
>
>                 }
>
>
>
>                 # dispatch destinations to PSTN
>
>                 route(PSTN);
>
>
>
>                 # user location service
>
>                 route(LOCATION);
>
>
>
>                 route(RELAY);
>
> }
>
>
>
>
>
> route[RELAY] {
>
>                 #!ifdef WITH_NAT
>
>                 if (check_route_param("nat=yes")) {
>
>                                 setbflag(FLB_NATB);
>
>                 }
>
>                 if (isflagset(FLT_NATS) || isbflagset(FLB_NATB)) {
>
>                                 route(RTPPROXY);
>
>                 }
>
>                 #!endif
>
>
>
>                 /* example how to enable some additional event routes */
>
>                 if (is_method("INVITE")) {
>
>                                 #t_on_branch("BRANCH_ONE");
>
>                                 t_on_reply("REPLY_ONE");
>
>                                 t_on_failure("FAIL_ONE");
>
>                 }
>
>
>
>                 if (!t_relay()) {
>
>                                 sl_reply_error();
>
>                 }
>
>                 exit;
>
> }
>
>
>
> # Per SIP request initial checks
>
> route[REQINIT] {
>
>                 #!ifdef WITH_ANTIFLOOD
>
>                 # flood dection from same IP and traffic ban for a while
>
>                 # be sure you exclude checking trusted peers, such as pstn
> gateways
>
>                 # - local host excluded (e.g., loop to self)
>
>                 if(src_ip!=myself)
>
>                 {
>
>                                 if($sht(ipban=>$si)!=$null)
>
>                                 {
>
>                                                 # ip is already blocked
>
>                                                 xdbg("request from blocked
> IP - $rm from $fu (IP:$si:$sp)\n");
>
>                                                 exit;
>
>                                 }
>
>                                 if (!pike_check_req())
>
>                                 {
>
>                                                 xlog("L_ALERT","ALERT: pike
> blocking $rm from $fu (IP:$si:$sp)\n");
>
>                                                 $sht(ipban=>$si) = 1;
>
>                                                 exit;
>
>                                 }
>
>                 }
>
>                 #!endif
>
>
>
>                 if (!mf_process_maxfwd_header("10")) {
>
>                                 sl_send_reply("483","Too Many Hops");
>
>                                 exit;
>
>                 }
>
>
>
>                 if(!sanity_check("1511", "7"))
>
>                 {
>
>                                 xlog("Malformed SIP message from
> $si:$sp\n");
>
>                                 exit;
>
>                 }
>
> }
>
>
>
> # Handle requests within SIP dialogs
>
> route[WITHINDLG] {
>
>
>
>                 if (has_totag()) {
>
>                                 # sequential request withing a dialog should
>
>                                 # take the path determined by record-routing
>
>                                 if (loose_route()) {
>
>                                                 if (is_method("BYE")) {
>
>
> setflag(FLT_ACC); # do accounting ...
>
>
> setflag(FLT_ACCFAILED); # ... even if the transaction fails
>
>                                                 }
>
>                                                 route(RELAY);
>
>                                 } else {
>
>                                                 if (is_method("SUBSCRIBE")
> && uri == myself) {
>
>                                                 # in-dialog subscribe
> requests
>
>                                                 route(PRESENCE);
>
>                                                 exit;
>
>                                                 }
>
>
>
>                                                 if ( is_method("ACK") ) {
>
>                                                                 if (
> t_check_trans() ) {
>
>
> # no loose-route, but stateful ACK;
>
>
> # must be an ACK after a 487
>
>
> # or e.g. 404 from upstream server
>
>
> t_relay();
>
>
> exit;
>
>                                                                 } else {
>
>
> # ACK without matching transaction ... ignore and discard
>
>
> exit;
>
>                                                                 }
>
>                                                 }
>
>                                                 sl_send_reply("404","Not
> here");
>
>                                 }
>
>                                 exit;
>
>                 }
>
> }
>
>
>
> # Handle SIP registrations
>
> route[REGISTRAR] {
>
>                 if (is_method("REGISTER"))
>
>                 {
>
>                                 if(isflagset(FLT_NATS))
>
>                                 {
>
>                                                 setbflag(FLB_NATB);
>
>                                                 # uncomment next line to do
> SIP NAT pinging
>
>                                                 ## setbflag(FLB_NATSIPPING);
>
>                                 }
>
>                                 if (!save("location"))
>
>                                                 sl_reply_error();
>
>
>
>                                 exit;
>
>                 }
>
> }
>
>
>
> # USER location service
>
> route[LOCATION] {
>
>
>
>                 #!ifdef WITH_ALIASDB
>
>                 # search in DB-based aliases
>
>                 alias_db_lookup("dbaliases");
>
>                 #!endif
>
>
>
>                 if (!lookup("location")) {
>
>                                 switch ($rc) {
>
>                                                 case -1:
>
>                                                 case -3:
>
>                                                                 t_newtran();
>
>
> t_reply("404", "Not Found");
>
>                                                                 exit;
>
>                                                 case -2:
>
>
> sl_send_reply("405", "Method Not Allowed");
>
>                                                                 exit;
>
>                                 }
>
>                 }
>
>
>
>                 # when routing via usrloc, log the missed calls also
>
>                 if (is_method("INVITE"))
>
>                 {
>
>                                 setflag(FLT_ACCMISSED);
>
>                 }
>
> }
>
>
>
> # Presence server route
>
> route[PRESENCE] {
>
>
>
>                 if(!is_method("PUBLISH|SUBSCRIBE"))
>
>                                 return;
>
>
>
>                 #!ifdef WITH_PRESENCE
>
>
>
>                 if (!t_newtran())
>
>                 {
>
>                                 sl_reply_error();
>
>                                 exit;
>
>                 };
>
>
>
>                 if(is_method("PUBLISH"))
>
>                 {
>
>                                 handle_publish();
>
>                                 t_release();
>
>                 }
>
>                 else if( is_method("SUBSCRIBE"))
>
>                 {
>
>                                 $var(ret_code)= rls_handle_subscribe();
>
>
>
>                                 if($var(ret_code)== 10) {
>
>                                                 handle_subscribe();
>
>                                 }
>
>                                 t_release();
>
>
>
>                 }else if(method=="NOTIFY") {
>
>
>
>                                 rls_handle_notify();
>
>                 }
>
>
>
>                 exit;
>
>                 #!endif
>
>                 # if presence enabled, this part will not be executed
>
>                 if (is_method("PUBLISH") || $rU==$null)
>
>                 {
>
>                                 sl_send_reply("404", "Not here");
>
>                                 exit;
>
>                 }
>
>                 return;
>
> }
>
>
>
> # Authentication route
>
> route[AUTH] {
>
>                 return;
>
>                 #!ifdef WITH_AUTH
>
>                 if (is_method("REGISTER"))
>
>                 {
>
>                                 # authenticate the REGISTER requests
> (uncomment to enable auth)
>
>                                 if (!www_authorize("$td", "subscriber"))
>
>                                 {
>
>                                 www_challenge("$td", "0");
>
>                                 exit;
>
>                                 }
>
>
>
>                                 if ($au!=$tU)
>
>                                 {
>
>
> sl_send_reply("403","Forbidden auth ID");
>
>                                                 exit;
>
>                                 }
>
>                 } else {
>
>
>
>                                 #!ifdef WITH_IPAUTH
>
>                                 if(allow_source_address())
>
>                                 {
>
>                                                 # source IP allowed
>
>                                                 return;
>
>                                 }
>
>                                 #!endif
>
>                                 # authenticate if from local subscriber
>
>                                 if (from_uri==myself)
>
>                                 {
>
>                                                 if (!proxy_authorize("$fd",
> "subscriber")) {
>
>                                                 proxy_challenge("$fd", "0");
>
>                                                 exit;
>
>                                 }
>
>                                 if (is_method("PUBLISH"))
>
>                                 {
>
>                                                 if ($au!=$tU) {
>
>
> sl_send_reply("403","Forbidden auth ID");
>
>                                                                 exit;
>
>                                                 }
>
>                                 } else {
>
>                                                 if ($au!=$fU) {
>
>
> sl_send_reply("403","Forbidden auth ID");
>
>                                                                 exit;
>
>                                                 }
>
>                                 }
>
>
>
>                                 consume_credentials();
>
>                                 # caller authenticated
>
>                                 } else {
>
>                                                 # caller is not local
> subscriber, then check if it calls
>
>                                                 # a local destination,
> otherwise deny, not an open relay here
>
>                                                 if (!uri==myself)
>
>                                                 {
>
>
> sl_send_reply("403","Not relaying");
>
>                                                                 exit;
>
>                                                 }
>
>                                 }
>
>                 }
>
>                 #!endif
>
>                 return;
>
> }
>
>
>
>                 # Caller NAT detection route
>
> route[NAT] {
>
>                 #!ifdef WITH_NAT
>
>                                 force_rport();
>
>                                 if (nat_uac_test("19")) {
>
>                                                 if (method=="REGISTER") {
>
>
> fix_nated_register();
>
>                                                 } else {
>
>
> fix_nated_contact();
>
>                                                 }
>
>                                                 setflag(FLT_NATS);
>
>                                 }
>
>                 #!endif
>
>                 return;
>
> }
>
>
>
> # RTPProxy control
>
> route[RTPPROXY] {
>
>                 #!ifdef WITH_NAT
>
>                 if (is_method("BYE")) {
>
>                                 unforce_rtp_proxy();
>
>                 } else if (is_method("INVITE")){
>
>                                 force_rtp_proxy();
>
>                 }
>
>                 if (!has_totag()) add_rr_param(";nat=yes");
>
>                 #!endif
>
>                 return;
>
> }
>
>
>
> # Routing to foreign domains
>
> route[SIPOUT] {
>
>                 if (!uri==myself)
>
>                 {
>
>                                 append_hf("P-hint: outbound\r\n");
>
>                                 route(RELAY);
>
>                 }
>
> }
>
>
>
> # PSTN GW routing
>
> route[PSTN] {
>
>                 #!ifdef WITH_PSTN
>
>                 # check if PSTN GW IP is defined
>
>                 if (strempty($sel(cfg_get.pstn.gw_ip))) {
>
>                                 xlog("SCRIPT: PSTN rotuing enabled but
> pstn.gw_ip not defined\n");
>
>                                 return;
>
>                 }
>
>
>
>                 # route to PSTN dialed numbers starting with '+' or '00'
>
>                 # (international format)
>
>                 # - update the condition to match your dialing rules for
> PSTN routing
>
>                 if(!($rU=~"^(\+|00)[1-9][0-9]{3,20}$"))
>
>                                 return;
>
>
>
>                 # only local users allowed to call
>
>                 if(from_uri!=myself) {
>
>                                 sl_send_reply("403", "Not Allowed");
>
>                                 exit;
>
>                 }
>
>
>
>                 $ru = "sip:" + $rU + "@" + $sel(cfg_get.pstn.gw_ip);
>
>
>
>                 route(RELAY);
>
>                 exit;
>
>                 #!endif
>
>
>
>                 return;
>
> }
>
>
>
> # XMLRPC routing
>
> #!ifdef WITH_XMLRPC
>
> route[XMLRPC]
>
> {
>
>                 # allow XMLRPC from localhost
>
>                 if ((method=="POST" || method=="GET")
>
>                                 && (src_ip==127.0.0.1)) {
>
>                                 # close connection only for xmlrpclib user
> agents (there is a bug in
>
>                                 # xmlrpclib: it waits for EOF before
> interpreting the response).
>
>                                 if ($hdr(User-Agent) =~ "xmlrpclib")
>
>                                                 set_reply_close();
>
>                                 set_reply_no_connect();
>
>                                 dispatch_rpc();
>
>                                 exit;
>
>                 }
>
>                 send_reply("403", "Forbidden");
>
>                 exit;
>
> }
>
> #!endif
>
>
>
> # Sample branch router
>
> branch_route[BRANCH_ONE] {
>
>                 xdbg("new branch at $ru\n");
>
> }
>
>
>
> # Sample onreply route
>
> onreply_route[REPLY_ONE] {
>
>                 xdbg("incoming reply\n");
>
>                 #!ifdef WITH_NAT
>
>                 if ((isflagset(FLT_NATS) || isbflagset(FLB_NATB))
>
>                 && status=~"(183)|(2[0-9][0-9])") {
>
>                                 force_rtp_proxy();
>
>                 }
>
>                 if (isbflagset("6")) {
>
>                                 fix_nated_contact();
>
>                 }
>
>                 #!endif
>
> }
>
>
>
> # Sample failure route
>
> failure_route[FAIL_ONE] {
>
>                 #!ifdef WITH_NAT
>
>                 if (is_method("INVITE")
>
>                 && (isbflagset(FLB_NATB) || isflagset(FLT_NATS))) {
>
>                                 unforce_rtp_proxy();
>
>                 }
>
>                 #!endif
>
>
>
>                 if (t_is_canceled()) {
>
>                                 exit;
>
>                 }
>
>
>
>                 # uncomment the following lines if you want to block client
>
>                 # redirect based on 3xx replies.
>
>                 ##if (t_check_status("3[0-9][0-9]")) {
>
>                 ##t_reply("404","Not found");
>
>                 ## exit;
>
>                 ##}
>
>
>
>                 # uncomment the following lines if you want to redirect the
> failed
>
>                 # calls to a different new destination
>
>                 ##if (t_check_status("486|408")) {
>
>                 ## sethostport("192.168.2.100:5060");
>
>                 ## append_branch();
>
>                 ## # do not set the missed call flag again
>
>                 ## t_relay();
>
>                 ##}
>
> }
>
>
>
> #!ifdef WITH_XCAPSRV
>
> # #!define WITH_XHTTPAUTH
>
> event_route[xhttp:request] {
>
>                                 xdbg("===== xhttp: request [$rv] $rm =>
> $hu\n");
>
>
>
>                 #!ifdef WITH_XHTTPAUTH
>
>                                 if (!www_authorize("xcap", "subscriber"))
>
>                                 {
>
>                                                 www_challenge("xcap", "0");
>
>                                                 exit;
>
>                                 }
>
>                 #!endif
>
>                 xdbg("===== xhttp: Antes del if de $hu\n");
>
>                 if($hu=~"^/xcap-root/")
>
>                 {
>
>                                 xdbg("===== xhttp: Dentro del if de $hu\n");
>
>                                 set_reply_close();
>
>                                 set_reply_no_connect();
>
>
>
>                                 # xcap ops
>
>                                 $xcapuri(u=>data) = $hu;
>
>                                 if($xcapuri(u=>xuid)=~"^sip:.+ at .+")
>
>                                                 $var(uri) =
> $xcapuri(u=>xuid);
>
>                                 else if($xcapuri(u=>xuid)=~".+ at .+")
>
>                                                 $var(uri) = "sip:" +
> $xcapuri(u=>xuid);
>
>                                 else
>
>                                                 $var(uri) = "sip:"+
> $xcapuri(u=>xuid) + "@" + $Ri;
>
> xdbg("===== xhttp: Evgeny check var uri $var(uri)\n");
>
>                                 xlog("L_NOTICE", "===== xhttp:
> $xcapuri(u=>auid) : $xcapuri(u=>xuid)\n");
>
>                                 if($xcapuri(u=>auid)=="xcap-caps")
>
>                                 {
>
>                                                 $var(xbody) =
>
>                                                 "<?xml version='1.0'
> encoding='UTF-8'?>
>
>                                                 <xcap-caps
> xmlns='urn:ietf:params:xml:ns:xcap-caps'>
>
>                                                 <auids>
>
>
> <auid>rls-services</auid>
>
>
> <auid>pidf-manipulation</auid>
>
>
> <auid>xcap-caps</auid>
>
>
> <auid>resource-lists</auid>
>
>
> <auid>pres-rules</auid>
>
>
> <auid>org.openmobilealliance.pres-rules</auid>
>
>                                                 </auids>
>
>                                                 <extensions>
>
>                                                 </extensions>
>
>                                                 <namespaces>
>
>
> <namespace>urn:ietf:params:xml:ns:rls-services</namespace>
>
>
> <namespace>urn:ietf:params:xml:ns:pidf</namespace>
>
>
> <namespace>urn:ietf:params:xml:ns:xcap-caps</namespace>
>
>
> <namespace>urn:ietf:params:xml:ns:resource-lists</namespace>
>
>
> <namespace>urn:ietf:params:xml:ns:pres-rules</namespace>
>
>                                                 </namespaces>
>
>                                                 </xcap-caps>";
>
>                                                 xhttp_reply("200", "ok",
> "application/xcap-caps+xml",
>
>
> "$var(xbody)");
>
>                                                 exit;
>
>                                 }
>
>
>
>                 #!ifdef WITH_XHTTPAUTH
>
>                                 # be sure auth user access only its
> documents
>
>                                                 if
> ($au!=$(var(uri){uri.user})) {
>
>
> xhttp_reply("403", "Forbidden", "text/html",
>
>
> "<html><body>$si:$sp</body></html>");
>
>                                                 exit;
>
>                                 }
>
>
>
>                 #!endif
>
>                 xdbg("===== xhttp: Antes del switch $rm => $hu\n");
>
>                 switch($rm) {
>
>                                 case "PUT":
>
> xdbg("===== xhttp: Evgeny something will happen after that $var(uri)\n");
>
>                                                 xcaps_put("$var(uri)",
> "$hu", "$rb");
>
> xdbg("===== xhttp: Evgeny something before that\n");
>
>
> if($xcapuri(u=>auid)=~"pres-rules") {
>
>
> pres_update_watchers("$var(uri)", "presence");
>
>
> pres_refresh_watchers("$var(uri)", "presence", 1);
>
>                                                 } else if
> ($xcapuri(u=>auid)=~"resource-lists"
>
>                                                   ||
> $xcapuri(u=>auid)=~"rls-services") {
>
>
> rls_update_subs("$var(uri)", "presence");
>
>                                                 }
>
>                                                 exit;
>
>                                 break;
>
>                                 case "GET":
>
>                                                 xlog("L_NOTICE", "=====
> xhttp: get $var(uri) => $hu\n");
>
>                                                 xcaps_get("$var(uri)",
> "$hu");
>
>                                                 exit;
>
>                                 break;
>
>                                 case "DELETE":
>
>                                                 xcaps_del("$var(uri)",
> "$hu");
>
>
> if($xcapuri(u=>auid)=~"pres-rules")
>
>                                                 {
>
>
> xlog("L_NOTICE", "===== xhttp del: refreshing watchers for $var(uri)\n");
>
>
> pres_update_watchers("$var(uri)", "presence");
>
>
> pres_refresh_watchers("$var(uri)", "presence", 1);
>
>                                                 }
>
>                                                 exit;
>
>                                 break;
>
>                                 }
>
>                 }
>
>
>
>                 # http ops
>
>                 xhttp_reply("200", "ok", "text/html",
>
>                 "<html><body>OK: $si:$sp</body></html>");
>
>                 exit;
>
> }
>
> #!endif
>
>
> _______________________________________________
> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
> sr-users at lists.sip-router.org
> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
>



-- 
Carsten Bock
CEO (Geschäftsführer)

ng-voice GmbH
Schomburgstr. 80
D-22767 Hamburg / Germany

http://www.ng-voice.com
mailto:carsten at ng-voice.com

Office +49 40 34927219
Fax +49 40 34927220

Sitz der Gesellschaft: Hamburg
Registergericht: Amtsgericht Hamburg, HRB 120189
Geschäftsführer: Carsten Bock
Ust-ID: DE279344284

Hier finden Sie unsere handelsrechtlichen Pflichtangaben:
http://www.ng-voice.com/imprint/



More information about the sr-users mailing list