[OpenSIPS-Users] No RADIUS traffic

Uwe Kastens kiste at kiste.org
Wed Jun 10 08:29:27 CEST 2009


Hi,

Looks like that.
Jun 10 00:47:29 [24576] ERROR:auth_radius:radius_authorize_sterman:
rc_auth failed

Your radius server is a remote server? Could you try to start sniffing
at the opensips server?

BR

Uwe


Jun 10 00:47:29 [24576] ERROR:auth_radius:radius_authorize_sterman:
rc_auth failed

Leon Li schrieb:
> My radiusclient.conf is almost the same as this, except the different
> directory. I turned on debug as below and run OpenSIPs as root (-u root)
> but still nothing shows it try to send authentication to radius?
> 
> Jun 10 00:47:29 [24576] DBG:core:parse_msg: SIP Request:
> Jun 10 00:47:29 [24576] DBG:core:parse_msg:  method:  <REGISTER>
> Jun 10 00:47:29 [24576] DBG:core:parse_msg:  uri:
> <sip:202.158.197.134>
> Jun 10 00:47:29 [24576] DBG:core:parse_msg:  version: <SIP/2.0>
> Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=2
> Jun 10 00:47:29 [24576] DBG:core:parse_to: end of header reached,
> state=10
> Jun 10 00:47:29 [24576] DBG:core:parse_to: display={"test"},
> ruri={sip:test at 202.158.197.134}
> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: <To> [35];
> uri=[sip:test at 202.158.197.134]
> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: to body ["test"
> <sip:test at 202.158.197.134>
> ]
> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: cseq <CSeq>: <1>
> <REGISTER>
> Jun 10 00:47:29 [24576] DBG:core:parse_via_param: found param type 232,
> <branch> = <z9hG4bK-3ab88355ef-DL>; state=16
> Jun 10 00:47:29 [24576] DBG:core:parse_via: end of header reached,
> state=5
> Jun 10 00:47:29 [24576] DBG:core:parse_headers: via found, flags=2
> Jun 10 00:47:29 [24576] DBG:core:parse_headers: this is the first via
> Jun 10 00:47:29 [24576] DBG:core:receive_msg: After parse_msg...
> Jun 10 00:47:29 [24576] DBG:core:receive_msg: preparing to run routing
> scripts...
> Jun 10 00:47:29 [24576] DBG:maxfwd:is_maxfwd_present: value = 70
> Jun 10 00:47:29 [24576] DBG:uri:has_totag: no totag
> Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=78
> Jun 10 00:47:29 [24576] DBG:tm:t_lookup_request: start searching:
> hash=44313, isACK=0
> Jun 10 00:47:29 [24576] DBG:tm:matching_3261: RFC3261 transaction
> matching failed
> Jun 10 00:47:29 [24576] DBG:tm:t_lookup_request: no transaction found
> Jun 10 00:47:29 [24576] DBG:core:grep_sock_info: checking if host==us:
> 15==15 &&  [202.158.197.134] == [202.158.197.134]
> Jun 10 00:47:29 [24576] DBG:core:grep_sock_info: checking if port 5060
> matches port 5060
> Jun 10 00:47:29 [24576] DBG:core:parse_to_param: tag=DLdda82ca71a
> Jun 10 00:47:29 [24576] DBG:core:parse_to_param: epid=09C9A6A0
> Jun 10 00:47:29 [24576] DBG:core:parse_to: end of header reached,
> state=29
> Jun 10 00:47:29 [24576] DBG:core:parse_to: display={"test"},
> ruri={sip:test at 202.158.197.134}
> REGISTER for (test) sip:202.158.197.134
> Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=4000
> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: content_length=0
> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: found end of header
> Jun 10 00:47:29 [24576] DBG:auth:pre_auth: credentials with given realm
> not found
> Proxy Authentication Required (Digest)
> Jun 10 00:47:29 [24576] DBG:auth:build_auth_hf: 'WWW-Authenticate:
> Digest realm="202.158.197.134",
> nonce="4a2f03cd2aecc81d4dd620f4ff564bed1d4d6963"
> '
> Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=ffffffffffffffff
> Jun 10 00:47:29 [24576] DBG:core:check_via_address: params
> 202.158.213.91, 202.158.213.91, 0
> Jun 10 00:47:29 [24576] DBG:core:destroy_avp_list: destroying list (nil)
> Jun 10 00:47:29 [24576] DBG:core:receive_msg: cleaning up
> Jun 10 00:47:29 [24576] DBG:core:parse_msg: SIP Request:
> Jun 10 00:47:29 [24576] DBG:core:parse_msg:  method:  <REGISTER>
> Jun 10 00:47:29 [24576] DBG:core:parse_msg:  uri:
> <sip:202.158.197.134>
> Jun 10 00:47:29 [24576] DBG:core:parse_msg:  version: <SIP/2.0>
> Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=2
> Jun 10 00:47:29 [24576] DBG:core:parse_to: end of header reached,
> state=10
> Jun 10 00:47:29 [24576] DBG:core:parse_to: display={"test"},
> ruri={sip:test at 202.158.197.134}
> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: <To> [35];
> uri=[sip:test at 202.158.197.134]
> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: to body ["test"
> <sip:test at 202.158.197.134>
> ]
> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: cseq <CSeq>: <2>
> <REGISTER>
> Jun 10 00:47:29 [24576] DBG:core:parse_via_param: found param type 232,
> <branch> = <z9hG4bK-4e1197fe1e-DL>; state=16
> Jun 10 00:47:29 [24576] DBG:core:parse_via: end of header reached,
> state=5
> Jun 10 00:47:29 [24576] DBG:core:parse_headers: via found, flags=2
> Jun 10 00:47:29 [24576] DBG:core:parse_headers: this is the first via
> Jun 10 00:47:29 [24576] DBG:core:receive_msg: After parse_msg...
> Jun 10 00:47:29 [24576] DBG:core:receive_msg: preparing to run routing
> scripts...
> Jun 10 00:47:29 [24576] DBG:maxfwd:is_maxfwd_present: value = 70
> Jun 10 00:47:29 [24576] DBG:uri:has_totag: no totag
> Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=78
> Jun 10 00:47:29 [24576] DBG:tm:t_lookup_request: start searching:
> hash=44310, isACK=0
> Jun 10 00:47:29 [24576] DBG:tm:matching_3261: RFC3261 transaction
> matching failed
> Jun 10 00:47:29 [24576] DBG:tm:t_lookup_request: no transaction found
> Jun 10 00:47:29 [24576] DBG:core:grep_sock_info: checking if host==us:
> 15==15 &&  [202.158.197.134] == [202.158.197.134]
> Jun 10 00:47:29 [24576] DBG:core:grep_sock_info: checking if port 5060
> matches port 5060
> Jun 10 00:47:29 [24576] DBG:core:parse_to_param: tag=DLdda82ca71a
> Jun 10 00:47:29 [24576] DBG:core:parse_to_param: epid=09C9A6A0
> Jun 10 00:47:29 [24576] DBG:core:parse_to: end of header reached,
> state=29
> Jun 10 00:47:29 [24576] DBG:core:parse_to: display={"test"},
> ruri={sip:test at 202.158.197.134}
> REGISTER for (test) sip:202.158.197.134
> Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=4000
> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: content_length=0
> Jun 10 00:47:29 [24576] DBG:auth:check_nonce: comparing
> [4a2f03cd2aecc81d4dd620f4ff564bed1d4d6963] and
> [4a2f03cd2aecc81d4dd620f4ff564bed1d4d6963]
> Jun 10 00:47:29 [24576] ERROR:auth_radius:radius_authorize_sterman:
> rc_auth failed
> Proxy Authentication Required (Digest)
> Jun 10 00:47:29 [24576] DBG:auth:build_auth_hf: 'WWW-Authenticate:
> Digest realm="202.158.197.134",
> nonce="4a2f03cd2aecc81d4dd620f4ff564bed1d4d6963"
> '
> Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=ffffffffffffffff
> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: found end of header
> Jun 10 00:47:29 [24576] DBG:core:check_via_address: params
> 202.158.213.91, 202.158.213.91, 0
> Jun 10 00:47:29 [24576] DBG:core:destroy_avp_list: destroying list (nil)
> Jun 10 00:47:29 [24576] DBG:core:receive_msg: cleaning up
> 
> Regards,
> Leon 
> 
> -----Original Message-----
> From: Uwe Kastens [mailto:kiste at kiste.org] 
> Sent: Tuesday, 9 June 2009 5:27 PM
> To: Leon Li
> Cc: users at lists.opensips.org
> Subject: Re: [OpenSIPS-Users] No RADIUS traffic
> 
> Hi,
> 
> cat radiusclient.conf |grep -v ^#|grep -v ^$
> auth_order	radius,local
> login_tries	4
> login_timeout	60
> nologin /etc/nologin
> issue	/etc/radiusclient-ng/issue
> authserver 	localhost
> acctserver 	localhost
> servers		/etc/radiusclient-ng/servers
> dictionary 	/etc/radiusclient-ng/dictionary
> login_radius	/usr/sbin/login.radius
> seqfile		/var/run/opensips/radius.seq
> mapfile		/etc/radiusclient-ng/port-id-map
> default_realm
> radius_timeout	10
> radius_retries	3
> bindaddr localhost
> login_local	/bin/login
> 
> BR
> 
> Uwe
> 
> 


-- 

kiste lat: 54.322684, lon: 10.13586



More information about the Users mailing list