[OpenSIPS-Users] sst causes unnecessary 422s

Jeff Pyle jpyle at fidelityvoice.com
Mon Apr 27 16:38:05 CEST 2009


Hello,

I noticed today that if a packet comes into the proxy with a Session-Expires
header, it get's 422'ed.  Period.  Unfortunately the proxy that is doing
this has real users on it I cannot take down at the moment, so debugging is
limited during the day.  It is Opensips 1.5 build revision 5641.

Here's what I can tell you:

    loadmodule "sst.so"
    modparam("sst|dialog", "timeout_avp", "$avp(s:sst_timeout)")
    modparam("sst", "sst_flag", 6)
    modparam("sst", "enable_stats", 1)
    modparam("sst", "min_se", 1800)
    modparam("sst", "reject_to_small", 1)

and...

    if (is_method("INVITE")) {
        if (sstCheckMin("1")) {
                xlog("L_INFO", "SST too short - M=$rm RURI=$ru F=$fu T=$tu
IP=$si ID=$ci\n");
                exit;
        }

        // continue call processing...
    }

... in route[0].

This xlog trips on an invite that has:
    Session-Expires: 2400

and then sends back a 422 that has:
    MIN-SE: 1800

I looked at sst_handlers.c, and it seems to make sense to me, but
unfortunately my C skills aren't even a B.

Any assistance would be most appreciated.


Thanks,
Jeff




More information about the Users mailing list