[OpenSER-Users] Please help with "auth:pre_auth: credentials with given realm not found" error

mark morreny markmorreny at gmail.com
Sat May 31 16:24:25 CEST 2008


Hi,
I have found a few posts on this error from Google but none of the solutions
works.  I am able to use radius_proxy_authorize for REGISTER request without
problem.  But when I use radius_proxy_authorize for INVITE, Opensers can't
authroize it.  I have tried:

radius_proxy_authorize("192.168.1.104"))
proxy_authorize("192.168.1.104","subscriber")
radius_proxy_authorize(""))
proxy_authorize("","subscriber")

I have been stuck with this for days already and I truely hope someone can
tell me what could be wrong with my setup.  I am pretty much in a stage of
desperation right now.  Thanks in advance for all your help.


Here are the relevant lines in openser.cfg:
#if (!radius_proxy_authorize("192.168.1.104")) {
                       if (!proxy_authorize("192.168.1.104","subscriber")) {
                            www_challenge("192.168.1.104","1");
                            exit;
                        }

Here is the openser debug log, I have highlighted the part that
proxy_authorize throws error:

Jun  1 05:37:16 [29028] DBG:core:parse_msg: SIP Request:
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  method:  <INVITE>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  uri:     <
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  version: <SIP/2.0>
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232,
<branch> = <z9hG4bK-f072f593>; state=16
Jun  1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5
Jun  1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_headers: this is the first via
Jun  1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg...
Jun  1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing
scripts...
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=8
Jun  1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=10
Jun  1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>}
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [33]; uri=[
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>]
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" <
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>>
]
Jun  1 05:37:16 [29028] DBG:core:pv_get_to_attr: no To tag
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: cseq <CSeq>: <101> <INVITE>
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: content_length=393
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: found end of header
Jun  1 05:37:16 [29028] DBG:core:parse_to_param: tag=39a9124ca59076d9o0
Jun  1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29
Jun  1 05:37:16 [29028] DBG:core:parse_to: display={"1005"}, ruri={
sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>}
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=14000
Jun  1 05:37:16 [29028] DBG:core:pv_get_authattr: no [Proxy-]Authorization
header
Sun Jun  1 05:37:16 2008-192.168.1.101::method <INVITE> r-uri <
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>> to-tag <<null>>  2nd via
<<null>> to-header <sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>>
from-header <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>> auth-user
<<null>>
Jun  1 05:37:16 [29028] DBG:maxfwd:is_maxfwd_present: value = 70
Jun  1 05:37:16 [29028] DBG:core:check_via_address: params 192.168.1.101,
192.168.1.101, 0
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=80
before fix nated contact
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=80

Jun  1 05:37:16 [29028] DBG:uri:has_totag: no totag
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=78
Jun  1 05:37:16 [29028] DBG:tm:t_lookup_request: start searching:
hash=59293, isACK=0
Jun  1 05:37:16 [29028] DBG:tm:matching_3261: RFC3261 transaction matching
failed
Jun  1 05:37:16 [29028] DBG:tm:t_lookup_request: no transaction found

Jun  1 05:37:16 [29028] DBG:domain:is_domain_local: Realm '192.168.1.104' is
local
Jun  1 05:37:16 [29028] DBG:core:db_free_rows: freeing 1 rows
Jun  1 05:37:16 [29028] DBG:core:db_free_rows: row[0]=0x81a1c28
Jun  1 05:37:16 [29028] DBG:core:db_free_rows: 0x81a1c28=pkg_free() RES_ROWS

Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=10000
Jun  1 05:37:16 [29028] DBG:auth:pre_auth: credentials with given realm not
found

Jun  1 05:37:16 [29028] DBG:auth:build_auth_hf: 'WWW-Authenticate: Digest
realm="192.168.1.104", nonce="4841c6380fa8573a4e9794b1a0a2df9f3e53cb49",
qop="auth"
'
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff
Jun  1 05:37:16 [29028] DBG:core:check_via_address: params 192.168.1.101,
192.168.1.101, 0
Jun  1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list
0xb5bf9be0
Jun  1 05:37:16 [29028] DBG:core:receive_msg: cleaning up
Jun  1 05:37:16 [29028] DBG:core:parse_msg: SIP Request:
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  method:  <ACK>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  uri:     <
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  version: <SIP/2.0>
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232,
<branch> = <z9hG4bK-f072f593>; state=16
Jun  1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5
Jun  1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_headers: this is the first via
Jun  1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg...
Jun  1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing
scripts...
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=8
Jun  1 05:37:16 [29028] DBG:core:parse_to_param:
tag=026ab2c49274b4e0186dd72188f7d50a.939a
Jun  1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29
Jun  1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>}
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [75]; uri=[
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>]
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" <
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>>]
Jun  1 05:37:16 [29028] DBG:sl:sl_filter_ACK: local ACK found -> dropping
it!
Jun  1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list (nil)
Jun  1 05:37:16 [29028] DBG:core:receive_msg: cleaning up
Jun  1 05:37:16 [29028] DBG:core:parse_msg: SIP Request:
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  method:  <INVITE>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  uri:     <
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  version: <SIP/2.0>
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232,
<branch> = <z9hG4bK-dc12d56c>; state=16
Jun  1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5
Jun  1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_headers: this is the first via
Jun  1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg...
Jun  1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing
scripts...
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=8
Jun  1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=10
Jun  1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>}
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [33]; uri=[
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>]
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" <
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>>
]
Jun  1 05:37:16 [29028] DBG:core:pv_get_to_attr: no To tag
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: cseq <CSeq>: <102> <INVITE>
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: content_length=393
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: found end of header
Jun  1 05:37:16 [29028] DBG:core:parse_to_param: tag=39a9124ca59076d9o0
Jun  1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29
Jun  1 05:37:16 [29028] DBG:core:parse_to: display={"1005"}, ruri={
sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>}
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=14000
Sun Jun  1 05:37:16 2008-192.168.1.101::method <INVITE> r-uri <
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>> to-tag <<null>>  2nd via
<<null>> to-header <sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>>
from-header <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>> auth-user
<1005>
Jun  1 05:37:16 [29028] DBG:maxfwd:is_maxfwd_present: value = 70
Jun  1 05:37:16 [29028] DBG:core:check_via_address: params 192.168.1.101,
192.168.1.101, 0
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=80

Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=80

Jun  1 05:37:16 [29028] DBG:uri:has_totag: no totag
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=78
Jun  1 05:37:16 [29028] DBG:tm:t_lookup_request: start searching:
hash=59290, isACK=0
Jun  1 05:37:16 [29028] DBG:tm:matching_3261: RFC3261 transaction matching
failed
Jun  1 05:37:16 [29028] DBG:tm:t_lookup_request: no transaction found

Jun  1 05:37:16 [29028] DBG:domain:is_domain_local: Realm '192.168.1.104' is
local
Jun  1 05:37:16 [29028] DBG:core:db_free_rows: freeing 1 rows
Jun  1 05:37:16 [29028] DBG:core:db_free_rows: row[0]=0x81a1c28
Jun  1 05:37:16 [29028] DBG:core:db_free_rows: 0x81a1c28=pkg_free() RES_ROWS

Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=10000
Jun  1 05:37:16 [29028] DBG:auth:pre_auth: credentials with given realm not
found

Jun  1 05:37:16 [29028] DBG:auth:build_auth_hf: 'WWW-Authenticate: Digest
realm="192.168.1.104", nonce="4841c6380fa8573a4e9794b1a0a2df9f3e53cb49",
qop="auth"
'
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff
Jun  1 05:37:16 [29028] DBG:core:check_via_address: params 192.168.1.101,
192.168.1.101, 0
Jun  1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list
0xb5bf9be0
Jun  1 05:37:16 [29028] DBG:core:receive_msg: cleaning up
Jun  1 05:37:16 [29028] DBG:core:parse_msg: SIP Request:
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  method:  <ACK>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  uri:     <
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>>
Jun  1 05:37:16 [29028] DBG:core:parse_msg:  version: <SIP/2.0>
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232,
<branch> = <z9hG4bK-dc12d56c>; state=16
Jun  1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5
Jun  1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2
Jun  1 05:37:16 [29028] DBG:core:parse_headers: this is the first via
Jun  1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg...
Jun  1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing
scripts...
Jun  1 05:37:16 [29028] DBG:core:parse_headers: flags=8
Jun  1 05:37:16 [29028] DBG:core:parse_to_param:
tag=026ab2c49274b4e0186dd72188f7d50a.6388
Jun  1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29
Jun  1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>}
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [75]; uri=[
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>]
Jun  1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" <
sip:1006 at 192.168.1.104 <sip%3A1006 at 192.168.1.104>>]
Jun  1 05:37:16 [29028] DBG:sl:sl_filter_ACK: local ACK found -> dropping
it!
Jun  1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list (nil)
Jun  1 05:37:16 [29028] DBG:core:receive_msg: cleaning up



Here is the SIP trace:

U 192.168.1.101:5062 -> 192.168.1.104:5060
INVITE sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104> SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-d392c9a5.
From: "1005" <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=131fa1047c30f2a4o0.
To: <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>>.
Call-ID: a3888884-92d13124 at 192.168.1.101.
CSeq: 101 INVITE.
Max-Forwards: 70.
Contact: "1005" <sip:1005 at 192.168.1.101:5062>.
Expires: 240.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 395.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Content-Type: application/sdp.
.
v=0.
o=- 36185 36185 IN IP4 192.168.1.101.
s=-.
c=IN IP4 192.168.1.101.
t=0 0.
m=audio 16424 RTP/AVP 0 2 4 8 18 96 97 98 101.
a=rtpmap:0 PCMU/8000.
a=rtpmap:2 G726-32/8000.
a=rtpmap:4 G723/8000.
a=rtpmap:8 PCMA/8000.
a=rtpmap:18 G729a/8000.
a=rtpmap:96 G726-40/8000.
a=rtpmap:97 G726-24/8000.
a=rtpmap:98 G726-16/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.


U 192.168.1.104:5060 -> 192.168.1.101:5062
SIP/2.0 401 Unauthorized.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-d392c9a5;rport=5062.
From: "1005" <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=131fa1047c30f2a4o0.
To: <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=026ab2c49274b4e0186dd72188f7d50a.f608.
Call-ID: a3888884-92d13124 at 192.168.1.101.
CSeq: 101 INVITE.
WWW-Authenticate: Digest realm="192.168.1.104",
nonce="4841caae665a98cec71734a5cf84c70d10ac8f63", qop="auth".
Server: OpenSER (1.3.2-notls (i386/linux)).
Content-Length: 0.
.


U 192.168.1.101:5062 -> 192.168.1.104:5060
ACK sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104> SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-d392c9a5.
From: "1005" <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=131fa1047c30f2a4o0.
To: <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=026ab2c49274b4e0186dd72188f7d50a.f608.
Call-ID: a3888884-92d13124 at 192.168.1.101.
CSeq: 101 ACK.
Max-Forwards: 70.
Contact: "1005" <sip:1005 at 192.168.1.101:5062>.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 0.
.


U 192.168.1.101:5062 -> 192.168.1.104:5060
INVITE sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104> SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-4cf05fb6.
From: "1005" <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=131fa1047c30f2a4o0.
To: <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>>.
Call-ID: a3888884-92d13124 at 192.168.1.101.
CSeq: 102 INVITE.
Max-Forwards: 70.
Authorization: Digest username="1005",realm="192.168.1.104
",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri="
sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
",algorithm=MD5,response="e39bd9dc46a72ea191fca87e98cf9136",qop=auth,nc=00000001,cnonce="9d027a79".
Contact: "1005" <sip:1005 at 192.168.1.101:5062>.
Expires: 240.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 395.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Content-Type: application/sdp.
.
v=0.
o=- 36185 36185 IN IP4 192.168.1.101.
s=-.
c=IN IP4 192.168.1.101.
t=0 0.
m=audio 16424 RTP/AVP 0 2 4 8 18 96 97 98 101.
a=rtpmap:0 PCMU/8000.
a=rtpmap:2 G726-32/8000.
a=rtpmap:4 G723/8000.
a=rtpmap:8 PCMA/8000.
a=rtpmap:18 G729a/8000.
a=rtpmap:96 G726-40/8000.
a=rtpmap:97 G726-24/8000.
a=rtpmap:98 G726-16/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.


U 192.168.1.104:5060 -> 192.168.1.101:5062
SIP/2.0 401 Unauthorized.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-4cf05fb6;rport=5062.
From: "1005" <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=131fa1047c30f2a4o0.
To: <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=026ab2c49274b4e0186dd72188f7d50a.218e.
Call-ID: a3888884-92d13124 at 192.168.1.101.
CSeq: 102 INVITE.
WWW-Authenticate: Digest realm="192.168.1.104",
nonce="4841caae665a98cec71734a5cf84c70d10ac8f63", qop="auth".
Server: OpenSER (1.3.2-notls (i386/linux)).
Content-Length: 0.
.


U 192.168.1.101:5062 -> 192.168.1.104:5060
ACK sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104> SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-4cf05fb6.
From: "1005" <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=131fa1047c30f2a4o0.
To: <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=026ab2c49274b4e0186dd72188f7d50a.218e.
Call-ID: a3888884-92d13124 at 192.168.1.101.
CSeq: 102 ACK.
Max-Forwards: 70.
Authorization: Digest username="1005",realm="192.168.1.104
",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri="
sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
",algorithm=MD5,response="dc66b568ed8ec48f0f405aa063156eaa",qop=auth,nc=00000001,cnonce="9d027a79".
Contact: "1005" <sip:1005 at 192.168.1.101:5062>.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 0.
.


U 192.168.1.101:5062 -> 192.168.1.104:5060
INVITE sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104> SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-e2c260be.
From: "1005" <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=131fa1047c30f2a4o0.
To: <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>>.
Call-ID: a3888884-92d13124 at 192.168.1.101.
CSeq: 103 INVITE.
Max-Forwards: 70.
Authorization: Digest username="1005",realm="192.168.1.104
",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri="
sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
",algorithm=MD5,response="8d2b52278a72326a57361ec1ca2601c3",qop=auth,nc=00000001,cnonce="f4b6f3a0".
Contact: "1005" <sip:1005 at 192.168.1.101:5062>.
Expires: 240.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 395.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Content-Type: application/sdp.
.
v=0.
o=- 36185 36185 IN IP4 192.168.1.101.
s=-.
c=IN IP4 192.168.1.101.
t=0 0.
m=audio 16424 RTP/AVP 0 2 4 8 18 96 97 98 101.
a=rtpmap:0 PCMU/8000.
a=rtpmap:2 G726-32/8000.
a=rtpmap:4 G723/8000.
a=rtpmap:8 PCMA/8000.
a=rtpmap:18 G729a/8000.
a=rtpmap:96 G726-40/8000.
a=rtpmap:97 G726-24/8000.
a=rtpmap:98 G726-16/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.


U 192.168.1.104:5060 -> 192.168.1.101:5062
SIP/2.0 401 Unauthorized.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-e2c260be;rport=5062.
From: "1005" <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=131fa1047c30f2a4o0.
To: <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=026ab2c49274b4e0186dd72188f7d50a.8d8a.
Call-ID: a3888884-92d13124 at 192.168.1.101.
CSeq: 103 INVITE.
WWW-Authenticate: Digest realm="192.168.1.104",
nonce="4841caae665a98cec71734a5cf84c70d10ac8f63", qop="auth".
Server: OpenSER (1.3.2-notls (i386/linux)).
Content-Length: 0.
.


U 192.168.1.101:5062 -> 192.168.1.104:5060
ACK sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104> SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-e2c260be.
From: "1005" <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=131fa1047c30f2a4o0.
To: <sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
>;tag=026ab2c49274b4e0186dd72188f7d50a.8d8a.
Call-ID: a3888884-92d13124 at 192.168.1.101.
CSeq: 103 ACK.
Max-Forwards: 70.
Authorization: Digest username="1005",realm="192.168.1.104
",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri="
sip:1005 at 192.168.1.104 <sip%3A1005 at 192.168.1.104>
",algorithm=MD5,response="8ebde837f7c7c49f721d9f2c44b3797d",qop=auth,nc=00000001,cnonce="f4b6f3a0".
Contact: "1005" <sip:1005 at 192.168.1.101:5062>.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 0.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.kamailio.org/pipermail/users/attachments/20080531/07a0ffdd/attachment.htm 


More information about the Users mailing list