[SR-Users] [SR_USers] Authenticate asterisk-kamailio

SamyGo govoiper at gmail.com
Thu Apr 30 09:38:32 CEST 2015


Hi,
The important thing to consider here is this line.

#!define WITH_ASTERISK

 so if you've defined this on the very top of your kamailio.cfg then it
will go and check username/passwords from the sipusers table from the
Database defined by this: DBASTURL

if (!auth_check("$fd", "sipusers", "1")) {

Make sure you've the same user defined and username and passwords are
defined in these columns:

modparam("auth_db", "user_column", "name")

modparam("auth_db", "password_column", "sippasswd")

the sipasswd column is text based so dont use encrypted PASSWORD() in there.


Once you follow these steps your user should get registered.



On Wed, Apr 29, 2015 at 9:52 AM, Mauricio Tejeda <mauricio.tejeda at outlook.cl
> wrote:

> Hello All.
>
> My English is bad so I hope you can understand.
>
>
>
> I have been working with Kamailio some time, I following some of Guides of
> http://kb.asipto.com, http://saevolgo.blogspot.com and http://nil.uniza.sk
> .
>
>
>
> To Authenticate Asterisk sipusers I'm not have problems, but subscriber of
> Kamailio  authenticate is my problem.
>
> Autenticate are denied to subscriber Kamailio.
>
>
>
> In spanish I can explain it better  :-)
>
>
>
> best regards
>
>
>
>
>
> my Settings:
>
>
>
> #######################
>
> # ----- auth_db params -----
>
> #!ifdef WITH_AUTH
>
> modparam("auth_db", "calculate_ha1", yes)
>
> modparam("auth_db", "load_credentials", "")
>
>
>
> #!ifdef WITH_ASTERISK
>
> modparam("auth_db", "user_column", "name")
>
> modparam("auth_db", "password_column", "sippasswd")
>
> modparam("auth_db", "db_url", DBASTURL)
>
> modparam("auth_db", "version_table", 0)
>
> #!else
>
> modparam("auth_db", "db_url", DBURL)
>
> modparam("auth_db", "password_column", "password")
>
> modparam("auth_db", "use_domain", MULTIDOMAIN)
>
> #!endif
>
>
>
> ####################
>
>
>
> #!ifdef WITH_AUTH
>
>
>
> #!ifdef WITH_ASTERISK
>
>                 # do not auth traffic from Asterisk - trusted!
>
>                 if(route(FROMASTERISK))
>
>                                return;
>
> #!endif
>
>
>
> #!ifdef WITH_IPAUTH
>
>                 if((!is_method("REGISTER")) && allow_source_address())
>
>                 {
>
>                                # source IP allowed
>
>                                return;
>
>                 }
>
> #!endif
>
>
>
>                 if (is_method("REGISTER") || from_uri==myself)
>
>                 {
>
>                                # authenticate requests
>
> #!ifdef WITH_ASTERISK
>
>                                if (!auth_check("$fd", "sipusers", "1"))
> {                      #### Aquí autentifica sin problemas en caso de ser
> un usuario asterisk
>
> #!else
>                                                        #### Pero hace caso
> omiso al switch.
>
>                                if (!auth_check("$fd", "subscriber", "1"))
> {                 #### No autentifica subscriber de la base de datos de
> kamailio
>
> #!endif
>
>                                                auth_challenge("$fd", "0");
>
>                                                exit;
>
>                                }
>
>                                # user authenticated - remove auth header
>
>                                if(!is_method("REGISTER|PUBLISH"))
>
>                                                consume_credentials();
>
>                 }
>
> #!endif
>
>                 return;
>
> }
>
>
>
> #########################
>
>
>
> DEBUG KAMAILIO
>
>
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/msg_parser.c:623]: parse_msg(): SIP Request:
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/msg_parser.c:625]: parse_msg():  method:  <REGISTER>
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/msg_parser.c:627]: parse_msg():  uri:     <sip:192.168.65.132>
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/msg_parser.c:629]: parse_msg():  version: <SIP/2.0>
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/parse_addr_spec.c:898]: parse_addr_spec(): end of header reached,
> state=10
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/msg_parser.c:190]: get_hdr_field(): DEBUG: get_hdr_field: <To>
> [29]; uri=[sip:107 at 192.168.65.132]
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/msg_parser.c:192]: get_hdr_field(): DEBUG: to body [107<
> sip:107 at 192.168.65.132>#015#012]
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/parse_via.c:1284]: parse_via_param(): Found param type 232,
> <branch> = <z9hG4bK-d87543-733510592-1--d87543->; state=6
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/parse_via.c:1284]: parse_via_param(): Found param type 235, <rport>
> = <n/a>; state=17
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/parse_via.c:2672]: parse_via(): end of header reached, state=5
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/msg_parser.c:513]: parse_headers(): parse_headers: Via found,
> flags=2
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/msg_parser.c:515]: parse_headers(): parse_headers: this is the
> first via
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [receive.c:154]: receive_msg(): After parse_msg...
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [receive.c:197]: receive_msg(): preparing to run routing scripts...
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/msg_parser.c:170]: get_hdr_field(): get_hdr_field: cseq <CSeq>: <1>
> <REGISTER>
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: maxfwd
> [mf_funcs.c:85]: is_maxfwd_present(): value = 70
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/msg_parser.c:204]: get_hdr_field(): DEBUG: get_hdr_body :
> content_length=0
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/msg_parser.c:106]: get_hdr_field(): found end of header
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/parse_addr_spec.c:176]: parse_to_param(): DEBUG: add_param:
> tag=306ac106
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [parser/parse_addr_spec.c:898]: parse_addr_spec(): end of header reached,
> state=29
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: sanity
> [mod_sanity.c:255]: w_sanity_check(): sanity checks result: 1
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: siputils
> [checks.c:103]: has_totag(): no totag
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:1072]:
> t_check_msg(): DEBUG: t_check_msg: msg id=2 global id=1 T
> start=0xffffffffffffffff
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:527]:
> t_lookup_request(): t_lookup_request: start searching: hash=16161, isACK=0
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:485]:
> matching_3261(): DEBUG: RFC3261 transaction matching failed
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:709]:
> t_lookup_request(): DEBUG: t_lookup_request: no transaction found
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:1141]:
> t_check_msg(): DEBUG: t_check_msg: msg id=2 global id=2 T end=(nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [socket_info.c:583]: grep_sock_info(): grep_sock_info - checking if
> host==us: 14==14 && [192.168.65.132] == [192.168.65.132]
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [socket_info.c:587]: grep_sock_info(): grep_sock_info - checking if port
> 5060 (advertise 0) matches port 5060
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [select.c:429]:
> run_select(): Calling SELECT 0x7f213171d950
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [select.c:429]:
> run_select(): Calling SELECT 0x7f21317216c0
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth_db
> [authorize.c:498]: auth_check(): realm [192.168.65.132] table [sipusers]
> flags [1]
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth [api.c:86]:
> pre_auth(): auth:pre_auth: Credentials with realm '192.168.65.132' not found
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth_db
> [authorize.c:264]: digest_authenticate_hdr(): no credentials
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth
> [challenge.c:127]: get_challenge_hf(): build_challenge_hf:
> realm='192.168.65.132'
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth
> [challenge.c:269]: get_challenge_hf(): auth: 'WWW-Authenticate: Digest
> realm="192.168.65.132", nonce="VUDgjFVA32CFnv6lYnT/fxOzv3M7Mw7n"#015#012'
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: sl [sl.c:296]:
> send_reply(): reply in stateless mode (sl)
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [xavp.c:448]:
> xavp_destroy_list(): destroying xavp list (nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
> [receive.c:298]: receive_msg(): receive_msg: cleaning up
>
>
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/msg_parser.c:623]: parse_msg(): SIP Request:
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/msg_parser.c:625]: parse_msg():  method:  <REGISTER>
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/msg_parser.c:627]: parse_msg():  uri:     <sip:192.168.65.132>
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/msg_parser.c:629]: parse_msg():  version: <SIP/2.0>
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/parse_addr_spec.c:898]: parse_addr_spec(): end of header reached,
> state=10
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/msg_parser.c:190]: get_hdr_field(): DEBUG: get_hdr_field: <To>
> [29]; uri=[sip:107 at 192.168.65.132]
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/msg_parser.c:192]: get_hdr_field(): DEBUG: to body [107<
> sip:107 at 192.168.65.132>#015#012]
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/parse_via.c:1284]: parse_via_param(): Found param type 232,
> <branch> = <z9hG4bK-d87543-600273073-1--d87543->; state=6
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/parse_via.c:1284]: parse_via_param(): Found param type 235, <rport>
> = <n/a>; state=17
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/parse_via.c:2672]: parse_via(): end of header reached, state=5
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/msg_parser.c:513]: parse_headers(): parse_headers: Via found,
> flags=2
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/msg_parser.c:515]: parse_headers(): parse_headers: this is the
> first via
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [receive.c:154]: receive_msg(): After parse_msg...
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [receive.c:197]: receive_msg(): preparing to run routing scripts...
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/msg_parser.c:170]: get_hdr_field(): get_hdr_field: cseq <CSeq>: <2>
> <REGISTER>
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: maxfwd
> [mf_funcs.c:85]: is_maxfwd_present(): value = 70
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/msg_parser.c:204]: get_hdr_field(): DEBUG: get_hdr_body :
> content_length=0
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/msg_parser.c:106]: get_hdr_field(): found end of header
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/parse_addr_spec.c:176]: parse_to_param(): DEBUG: add_param:
> tag=306ac106
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [parser/parse_addr_spec.c:898]: parse_addr_spec(): end of header reached,
> state=29
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: sanity
> [mod_sanity.c:255]: w_sanity_check(): sanity checks result: 1
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: siputils
> [checks.c:103]: has_totag(): no totag
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:1072]:
> t_check_msg(): DEBUG: t_check_msg: msg id=2 global id=1 T
> start=0xffffffffffffffff
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:527]:
> t_lookup_request(): t_lookup_request: start searching: hash=16158, isACK=0
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:485]:
> matching_3261(): DEBUG: RFC3261 transaction matching failed
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:709]:
> t_lookup_request(): DEBUG: t_lookup_request: no transaction found
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:1141]:
> t_check_msg(): DEBUG: t_check_msg: msg id=2 global id=2 T end=(nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [socket_info.c:583]: grep_sock_info(): grep_sock_info - checking if
> host==us: 14==14 && [192.168.65.132] == [192.168.65.132]
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [socket_info.c:587]: grep_sock_info(): grep_sock_info - checking if port
> 5060 (advertise 0) matches port 5060
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [select.c:429]:
> run_select(): Calling SELECT 0x7f213171d950
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [select.c:429]:
> run_select(): Calling SELECT 0x7f21317216c0
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth_db
> [authorize.c:498]: auth_check(): realm [192.168.65.132] table [sipusers]
> flags [1]
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth [api.c:96]:
> pre_auth(): auth: digest-algo: MD5 parsed value: 1
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:118]:
> db_new_result(): allocate 56 bytes for result set at 0x7f213171c1a0
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql
> [km_res.c:68]: db_mysql_get_columns(): 1 columns returned from the query
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:156]:
> db_allocate_columns(): allocate 8 bytes for result names at 0x7f21317236a8
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:167]:
> db_allocate_columns(): allocate 4 bytes for result types at 0x7f2131739f10
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql
> [km_res.c:86]: db_mysql_get_columns(): allocate 16 bytes for RES_NAMES[0]
> at 0x7f21317605f8
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql
> [km_res.c:93]: db_mysql_get_columns():
> RES_NAMES(0x7f21317605f8)[0]=[sippasswd]
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql
> [km_res.c:137]: db_mysql_get_columns(): use DB1_STRING result type
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql
> [km_res.c:170]: db_mysql_convert_rows(): no rows returned from the query
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth_db
> [authorize.c:196]: get_ha1(): no result for user '107@'
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:81]:
> db_free_columns(): freeing 1 columns
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:85]:
> db_free_columns(): freeing RES_NAMES[0] at 0x7f21317605f8
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:94]:
> db_free_columns(): freeing result names at 0x7f21317236a8
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:99]:
> db_free_columns(): freeing result types at 0x7f2131739f10
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:136]:
> db_free_result(): freeing result set at 0x7f213171c1a0
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth
> [challenge.c:127]: get_challenge_hf(): build_challenge_hf:
> realm='192.168.65.132'
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth
> [challenge.c:269]: get_challenge_hf(): auth: 'WWW-Authenticate: Digest
> realm="192.168.65.132", nonce="VUDgjFVA32CFnv6lYnT/fxOzv3M7Mw7n"#015#012'
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: sl [sl.c:296]:
> send_reply(): reply in stateless mode (sl)
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [xavp.c:448]:
> xavp_destroy_list(): destroying xavp list (nil)
>
> Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
> [receive.c:298]: receive_msg(): receive_msg: cleaning up
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Ngrep sipusers asterisk
>
>
>
> U 192.168.65.1:6018 -> 192.168.65.132:5060
>
> REGISTER sip:192.168.65.132 SIP/2.0.
>
> To: 101<sip:101 at 192.168.65.132>.
>
> From: 101<sip:101 at 192.168.65.132>;tag=622d132b.
>
> Via: SIP/2.0/UDP 192.168.65.1:6018
> ;branch=z9hG4bK-d87543-11473800-1--d87543-;rport.
>
> Call-ID: 45522f4e99747d39.
>
> CSeq: 1 REGISTER.
>
> Contact: <sip:101 at 192.168.65.1:6018>.
>
> Expires: 3600.
>
> Max-Forwards: 70.
>
> Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
> SUBSCRIBE, INFO.
>
> User-Agent: eyeBeam release 3004w stamp 16863.
>
> Content-Length: 0.
>
> .
>
>
>
> #
>
> U 192.168.65.132:5060 -> 192.168.65.1:6018
>
> SIP/2.0 401 Unauthorized.
>
> To: 101<sip:101 at 192.168.65.132>;tag=65b56d053bca97da69d7accef5da903f.bfcc.
>
> From: 101<sip:101 at 192.168.65.132>;tag=622d132b.
>
> Via: SIP/2.0/UDP 192.168.65.1:6018
> ;branch=z9hG4bK-d87543-11473800-1--d87543-;rport=6018;received=192.168.65.1.
>
> Call-ID: 45522f4e99747d39.
>
> CSeq: 1 REGISTER.
>
> WWW-Authenticate: Digest realm="192.168.65.132",
> nonce="VUDfOlVA3g5sSAKxFPg/zsB0qvueMh8Y".
>
> Server: kamailio (4.2.4 (x86_64/linux)).
>
> Content-Length: 0.
>
> .
>
>
>
> #
>
> U 192.168.65.1:6018 -> 192.168.65.132:5060
>
> REGISTER sip:192.168.65.132 SIP/2.0.
>
> To: 101<sip:101 at 192.168.65.132>.
>
> From: 101<sip:101 at 192.168.65.132>;tag=622d132b.
>
> Via: SIP/2.0/UDP 192.168.65.1:6018
> ;branch=z9hG4bK-d87543-426128389-1--d87543-;rport.
>
> Call-ID: 45522f4e99747d39.
>
> CSeq: 2 REGISTER.
>
> Contact: <sip:101 at 192.168.65.1:6018>.
>
> Expires: 3600.
>
> Max-Forwards: 70.
>
> Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
> SUBSCRIBE, INFO.
>
> User-Agent: eyeBeam release 3004w stamp 16863.
>
> Authorization: Digest
> username="101",realm="192.168.65.132",nonce="VUDfOlVA3g5sSAKxFPg/zsB0qvueMh8Y",uri="sip:192.168.65.132",response="792b60f48b2da3bb93f5d808fd87c09c",algorithm=MD5.
>
> Content-Length: 0.
>
> .
>
>
>
> #
>
> U 192.168.65.132:5060 -> 192.168.65.1:6018
>
> SIP/2.0 200 OK.
>
> To: 101<sip:101 at 192.168.65.132>;tag=65b56d053bca97da69d7accef5da903f.92bc.
>
> From: 101<sip:101 at 192.168.65.132>;tag=622d132b.
>
> Via: SIP/2.0/UDP 192.168.65.1:6018
> ;branch=z9hG4bK-d87543-426128389-1--d87543-;rport=6018;received=192.168.65.1.
>
> Call-ID: 45522f4e99747d39.
>
> CSeq: 2 REGISTER.
>
> Contact: <sip:101 at 192.168.65.1:6018>;expires=3600.
>
> Server: kamailio (4.2.4 (x86_64/linux)).
>
> Content-Length: 0.
>
>
>
>
>
>
>
> Ngrep subscriber Kamailio
>
>
>
> U 192.168.65.1:6018 -> 192.168.65.132:5060
>
> REGISTER sip:192.168.65.132 SIP/2.0.
>
> To: 107<sip:107 at 192.168.65.132>.
>
> From: 107<sip:107 at 192.168.65.132>;tag=7b070e2d.
>
> Via: SIP/2.0/UDP 192.168.65.1:6018
> ;branch=z9hG4bK-d87543-536609279-1--d87543-;rport.
>
> Call-ID: 77019a2d9e70df3f.
>
> CSeq: 1 REGISTER.
>
> Contact: <sip:107 at 192.168.65.1:6018>.
>
> Expires: 3600.
>
> Max-Forwards: 70.
>
> Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
> SUBSCRIBE, INFO.
>
> User-Agent: eyeBeam release 3004w stamp 16863.
>
> Content-Length: 0.
>
> .
>
>
>
> #
>
> U 192.168.65.132:5060 -> 192.168.65.1:6018
>
> SIP/2.0 401 Unauthorized.
>
> To: 107<sip:107 at 192.168.65.132>;tag=65b56d053bca97da69d7accef5da903f.1c0e.
>
> From: 107<sip:107 at 192.168.65.132>;tag=7b070e2d.
>
> Via: SIP/2.0/UDP 192.168.65.1:6018
> ;branch=z9hG4bK-d87543-536609279-1--d87543-;rport=6018;received=192.168.65.1.
>
> Call-ID: 77019a2d9e70df3f.
>
> CSeq: 1 REGISTER.
>
> WWW-Authenticate: Digest realm="192.168.65.132",
> nonce="VUDf21VA3q+Px29K8cRa5tWIadNTI5e6".
>
> Server: kamailio (4.2.4 (x86_64/linux)).
>
> Content-Length: 0.
>
> .
>
>
>
> #
>
> U 192.168.65.1:6018 -> 192.168.65.132:5060
>
> REGISTER sip:192.168.65.132 SIP/2.0.
>
> To: 107<sip:107 at 192.168.65.132>.
>
> From: 107<sip:107 at 192.168.65.132>;tag=7b070e2d.
>
> Via: SIP/2.0/UDP 192.168.65.1:6018
> ;branch=z9hG4bK-d87543-1058472151-1--d87543-;rport.
>
> Call-ID: 77019a2d9e70df3f.
>
> CSeq: 2 REGISTER.
>
> Contact: <sip:107 at 192.168.65.1:6018>.
>
> Expires: 3600.
>
> Max-Forwards: 70.
>
> Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
> SUBSCRIBE, INFO.
>
> User-Agent: eyeBeam release 3004w stamp 16863.
>
> Authorization: Digest
> username="107",realm="192.168.65.132",nonce="VUDf21VA3q+Px29K8cRa5tWIadNTI5e6",uri="sip:192.168.65.132",response="c9ca6eff16e3b661337b6d99d74027de",algorithm=MD5.
>
> Content-Length: 0.
>
> .
>
>
>
> #
>
> U 192.168.65.132:5060 -> 192.168.65.1:6018
>
> SIP/2.0 401 Unauthorized.
>
> To: 107<sip:107 at 192.168.65.132>;tag=65b56d053bca97da69d7accef5da903f.8cc0.
>
> From: 107<sip:107 at 192.168.65.132>;tag=7b070e2d.
>
> Via: SIP/2.0/UDP 192.168.65.1:6018
> ;branch=z9hG4bK-d87543-1058472151-1--d87543-;rport=6018;received=192.168.65.1.
>
> Call-ID: 77019a2d9e70df3f.
>
> CSeq: 2 REGISTER.
>
> WWW-Authenticate: Digest realm="192.168.65.132",
> nonce="VUDf21VA3q+Px29K8cRa5tWIadNTI5e6".
>
> Server: kamailio (4.2.4 (x86_64/linux)).
>
> Content-Length: 0.
>
> .
>
> _______________________________________________
> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
> sr-users at lists.sip-router.org
> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sip-router.org/pipermail/sr-users/attachments/20150430/3ded6bfe/attachment.html>


More information about the sr-users mailing list