[Users] SIPS in openSER

Bogdan-Andrei Iancu bogdan at voice-system.ro
Thu Mar 23 19:31:06 CET 2006


Hi Chris,

does the error persist? if so, please let me know what relaying function 
are you using, in what format and what is the RURI.

regards,
bogdan

Christoph Fürstaller wrote:

>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
> 
>
>Hi Bogdan,
>
>I think I found a way to connect minisip to SER. I had to open up a
>UDP Port (5060) as well. Then minisip is registering imidiatly.
>(didn't changed a think in openser.cfg). But why do I have to do that?
>I captured all the traffic, but there is nothing transmitted in
>cleartext (sip) everything is encypted. I also upgraded to the lates
>cvs version. (tried this with/without the UDP Port)
>
>The only thing i'm checking in the cfg is authentication against mysql
>db. Nothing more.
>
>chris...
>
>
>chris...
>Bogdan-Andrei Iancu schrieb:
>  
>
>>Hi Chris,
>>
>>what relaying script function are you using and what format? looks
>>like even for REGISTER you are doing a sort of relaying...
>>
>>also be sure you are using the latest cvs version (for devel
>>branch).
>>
>>regards, bogdan
>>
>>Christoph Fürstaller wrote:
>>
>>Hi,
>>
>>I've managed minisip to connect to tls enabled openser. The tls
>>connection is established fine, but when i try to register or try
>>to call i get errors. See attached ser debug output.
>>
>>Anybody knows what that means? Is the SIP Request from minisip not
>>correct? Or is it a failure in my openser.cfg?
>>
>>Any help would be nice.
>>
>>chris...
>>
>>    
>>
>>------------------------------------------------------------------------
>>
>>    
>>
>>7(11894) tcpconn_new: new tcp connection to: 192.168.20.130
>>7(11894) tcpconn_new: on port 35957, type 3 7(11894)
>>tls_tcpconn_init: Entered: Creating a whole new ssl connection
>>7(11894) tls_tcpconn_init: Looking up tls domain
>>[192.168.20.156:5061] 7(11894) tls_tcpconn_init: Using default tls
>>settings 7(11894) tls_tcpconn_init: Setting in ACCEPT mode (server)
>> 7(11894) tcpconn_add: hashes: 181, 2 7(11894) tcp_main_loop: new
>>connection: 0x405b4b90 19 7(11894) send2child: to tcp child 0
>>3(11880), 0x405b4b90 3(11880) received n=4 con=0x405b4b90, fd=14
>>3(11880) tls_update_fd: New fd is 14 3(11880) tls_update_fd: New fd
>>is 14 3(11880) tls_accept: TLS handshake successful 3(11880)
>>tls_update_fd: New fd is 14 3(11880) tls_update_fd: New fd is 14
>>3(11880) _tls_read: 403 bytes read 3(11880) tcp_read_req:
>>content-length= 0 3(11880) SIP Request: 3(11880)  method:
>><REGISTER> 3(11880)  uri:     <sip:192.168.20.156> 3(11880)
>>version: <SIP/2.0> 3(11880) parse_headers: flags=2 3(11880)
>>DEBUG:parse_to:end of header reached, state=9 3(11880) DEBUG:
>>get_hdr_field: <To> [28]; uri=[sip:chris at 192.168.20.156] 3(11880)
>>DEBUG: to body [<sip:chris at 192.168.20.156> ] 3(11880)
>>get_hdr_field: cseq <CSeq>: <601> <REGISTER> 3(11880) Found param
>>type 232, <branch> = <z9hG4bK1327458630>; state=16 3(11880) end of
>>header reached, state=5 3(11880) parse_headers: Via found, flags=2
>>3(11880) parse_headers: this is the first via 3(11880) After
>>parse_msg... 3(11880) preparing to run routing scripts... 3(11880)
>>DEBUG:maxfwd:is_maxfwd_present: value = 70 3(11880) parse_headers:
>>flags=200 3(11880) is_preloaded: Yes 3(11880) grep_sock_info -
>>checking if host==us: 14==14 && [192.168.20.156] ==
>>[192.168.20.156] 3(11880) grep_sock_info - checking if port 5061
>>matches port 5061 3(11880) after_loose: Topmost route URI:
>>'sip:192.168.20.156:5061;transport=TLS;lr' is me 3(11880)
>>parse_headers: flags=200 3(11880) DEBUG: get_hdr_body :
>>content_length=0 3(11880) found end of header 3(11880)
>>find_next_route: No next Route HF found 3(11880) after_loose: No
>>next URI found 3(11880) grep_sock_info - checking if host==us:
>>14==14 && [192.168.20.156] == [192.168.20.156] 3(11880)
>>grep_sock_info - checking if port 5061 matches port 5060 3(11880)
>>check_self: host != me 3(11880) parse_headers:
>>flags=ffffffffffffffff 3(11880) DEBUG: t_newtran: msg id=3 , global
>>msg id=2 , T on entrance=0xffffffff 3(11880) parse_headers:
>>flags=ffffffffffffffff 3(11880) parse_headers: flags=78 3(11880)
>>t_lookup_request: start searching: hash=19221, isACK=0 3(11880)
>>DEBUG: RFC3261 transaction matching failed 3(11880) DEBUG:
>>t_lookup_request: no transaction found 3(11880) DEBUG: mk_proxy:
>>doing DNS lookup... 3(11880) ERROR:tm:add_uac: can't fwd to af 2,
>>proto 1  (no corresponding listening socket) 3(11880)
>>ERROR:tm:t_forward_nonack: failure to add branches 3(11880)
>>ERROR:tm:t_relay_to:  t_forward_nonack returned error 3(11880)
>>parse_headers: flags=ffffffffffffffff 3(11880)
>>check_via_address(192.168.20.130, 192.168.20.130, 3) 3(11880)
>>WARNING:vqm_resize: resize(0) called 3(11880) DEBUG:
>>cleanup_uac_timers: RETR/FR timers reset 3(11880) DEBUG:
>>add_to_tail_of_timer[2]: 0x405dc5c0 3(11880) tcp_send: tcp
>>connection found (0x405b4b90), acquiring fd 3(11880) tcp_send, c=
>>0x405b4b90, n=8 7(11894) tcp_main_loop: read response= 405b4b90, 1
>>from 3 (11880) 3(11880) tcp_send: after receive_fd: c= 0x405b4b90
>>n=4 fd=15 3(11880) tcp_send: sending... 3(11880) tls_update_fd: New
>>fd is 15 3(11880) tls_write: Write was successful (530 bytes)
>>3(11880) tcp_send: after write: c= 0x405b4b90 n=530 fd=15 3(11880)
>>tcp_send: buf= SIP/2.0 500 I'm terribly sorry, server error
>>occurred (7/TM) From: <sip:chris at 192.168.20.156> To:
>><sip:chris at 192.168.20.156>;tag=ddf051b13744e2e8329237e95d7a9ade-7b3d
>> Call-ID: 407398382 at 192.168.20.130 CSeq: 601 REGISTER Via:
>>SIP/2.0/TLS 192.168.20.130:15061;branch=z9hG4bK1327458630 Server:
>>OpenSer (1.0.0-tls (i386/linux)) Content-Length: 0 Warning: 392
>>192.168.20.156:5061 "Noisy feedback tells:  pid=11880
>>req_src_ip=192.168.20.130 req_src_port=35957
>>in_uri=sip:192.168.20.156 out_uri=sip:192.168.20.156 via_cnt==1"
>>    
>>
>>>>        
>>>>
>>3(11880) DEBUG:tm:_reply_light: reply sent out. buf=0x811a978:
>>SIP/2.0 5..., shmem=0x405d9750: SIP/2.0 5 3(11880)
>>DEBUG:tm:_reply_light: finished 3(11880) ERROR: generation of a
>>stateful reply on error succeeded 3(11880) DEBUG:destroy_avp_list:
>>destroying list (nil) 3(11880) receive_msg: cleaning up 2(11878)
>>DEBUG: timer routine:2,tl=0x405dc5c0 next=(nil) 2(11878) DEBUG:
>>wait_handler : removing 0x405dc578 from table 2(11878) DEBUG:
>>delete transaction 0x405dc578 2(11878) DEBUG: wait_handler : done
>>3(11880) tcp_receive_loop: 0x405b4b90 expired (172, 173) 3(11880)
>>releasing con 0x405b4b90, state 0, fd=14, id=2 3(11880)  extra_data
>>0x4042fd70 7(11894) tcp_main_loop: reader response= 405b4b90, 0
>>from 0 7(11894) tcp_main_loop: CONN_RELEASE  0x405b4b90 refcnt= 0
>>
>>    
>>
>>------------------------------------------------------------------------
>>
>>    
>>
>>_______________________________________________ Users mailing list
>>Users at openser.org http://openser.org/cgi-bin/mailman/listinfo/users
>>
>>
>>    
>>
>-----BEGIN PGP SIGNATURE-----
>Version: GnuPG v1.4.1 (MingW32)
>Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
> 
>iD8DBQFEICh1R0exH8dhr/YRAvj2AKCkJ28VCwpxbUjpjUAa3C9G2ab5tACfWr6d
>luODIjjobISdFTRyRwDu/f8=
>=qPD5
>-----END PGP SIGNATURE-----
>
>
>_______________________________________________
>Users mailing list
>Users at openser.org
>http://openser.org/cgi-bin/mailman/listinfo/users
>
>  
>





More information about the Users mailing list