Hi.
My problem is. In the detail fail only apear Start
records but the stop records dosen't, i red in the
documentation the necesary of drive the transaction in
stateful mode but i don't understand very well how can
i set up to SER in stateful mode, i think when finish
the call the method BYE don't send de stop accounting
to freeradius. Anybody knows something about this.
I use:
SER 0.9.6
freeradius 1.1.1
Mysql 5
Thank's Alex.
___________________________________________________________
Do You Yahoo!?
La mejor conexión a Internet y <b >2GB</b> extra a tu correo por $100 al mes. http://net.yahoo.com.mx
Hi Everybody,
I Installed OPENSER-1.0.1 from CVS.
Now I want to Work on SERWEB with OPENSER.
How can I change the config.php file in serweb to reflect the openser.
Can U help me in this regarding. please its very important and urgent for
me.
Thanks
Sunkara Ravi Prakash
Hyperion Techologies.
Hi all,
I would like to setup a SER (as registrar and call router) listening on
two port of the same interface, say 5060 and 5062. In order to manage
NATed clients, I have to set a flag different for those client from 5060
and for those from 5062: that's ok.
When SER gets an INVITE for a NATed client registered on port 5062, SER
should use that port, delivering the SIP message to the called party. Is
there a way to t_relay() using a particular port among those SER is
listening on? Any suggestions?
Thanks
Francesco
Hi all,
I was enabling features like call forwarding and voicemail in my openser script. I also took some idea from the call forward configuration available at Onsip.org. But I find a strange problem:
When the user has set his call forwarding to forwarding on no answer and if someone calls this user it rings for the request timeout period but after request timeout the invite goes again to the same user instead of the forwarded number and the phone keeps on ringing.
Then I jus used the onsip.org configuration and again I face the same problem.
Can someone help me on this please.
I remember that this script worked well in the 0.9.5 version of openser but now I am using 1.1.x from the cvs and I am facing this problem.
The problem somewhere seems to be with the append_branch function.
I inserted the log function at different places in the script to check the flow, it behaves as needed but after the append_branch() I dont know what goes wrong but the call is not forwarded somehow.
The blind forwarding concept works fine as it does not need any append_branch() in it.
The ngrep after request timeout happens is given below:
202.XXX.60.XXX:5060 -> 202.80.XXX.XXX:1443
CANCEL sip:6468621545@192.168.2.18:8469 SIP/2.0..Via: SIP/2.0/UDP 202.XXX.60.XXX;branch=z9hG4bK39ec.b7193062.0..From: "jaye
sh"<sip:6468621547@202.XXX.60.XXX>;tag=1b0d5617..Call-ID: 83236e2f50004a44@SkFZRVNI..To: <sip:6468621545@202.XXX.60.XXX>..CSe
q: 2 CANCEL..User-Agent: OpenSer (1.1.0-dev16 -notls (i386/linux))..Content-Length: 0....
#
U 202.XXX.60.XXX:5060 -> 202.80.XXX.XXX:2650
SIP/2.0 407 Proxy Authentication Required..Via: SIP/2.0/UDP 192.168.2.18:8466;received=202.80.XXX.XXX;branch=z9hG4bK-d8754
3-c63a9f56aa2b013d-1--d87543-;rport=2650..To: <sip:6468621545@202.XXX.60.XXX>;tag=71ff39c351286642530928b88b3f93ba.d71b..Fr
om: "jayesh"<sip:6468621547@202.XXX.60.XXX>;tag=1b0d5617..Call-ID: 83236e2f50004a44@SkFZRVNI..CSeq: 2 INVITE..Proxy-Authent
icate: Digest realm="202.XXX.60.XXX", nonce="4444ecd2d1559130637b185152e48a75efecca04"..Server: OpenSer (1.1.0-dev16 -notls
(i386/linux))..Content-Length: 0..Warning: 392 202.XXX.60.XXX:5060 "Noisy feedback tells: pid=11598 req_src_ip=202.80.61.
10 req_src_port=5060 in_uri=sip:00919833171405@202.XXX.60.XXX out_uri=sip:00919833171405@202.XXX.60.XXX via_cnt==2"....
#
U 202.80.XXX.XXX:2650 -> 202.XXX.60.XXX:5060
ACK sip:6468621545@202.XXX.60.XXX SIP/2.0..Via: SIP/2.0/UDP 192.168.2.18:8466;branch=z9hG4bK-d87543-c63a9f56aa2b013d-1--d87
543-;rport..To: <sip:6468621545@202.XXX.60.XXX>;tag=71ff39c351286642530928b88b3f93ba.d71b..From: "jayesh"<sip:6468621547@20
2.80.61.10>;tag=1b0d5617..Call-ID: 83236e2f50004a44@SkFZRVNI..CSeq: 2 ACK..Content-Length: 0....
#
U 202.80.XXX.XXX:2650 -> 202.XXX.60.XXX:5060
INVITE sip:6468621545@202.XXX.60.XXX SIP/2.0..Via: SIP/2.0/UDP 192.168.2.18:8466;branch=z9hG4bK-d87543-1b1c6b50b550ef43-1--
d87543-;rport..Max-Forwards: 70..Contact: <sip:6468621547@192.168.2.18:8466>..To: <sip:6468621545@202.XXX.60.XXX>..From: "jayesh"<sip:6468621547@202.XXX.60.XXX>;tag=1b0d5617..Call-ID: 83236e2f50004a44@SkFZRVNI..CSeq: 3 INVITE..Allow: INVITE, ACK,
CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO..Content-Type: application/sdp..Proxy-Authorization: Diges
t username="6468621547",realm="202.XXX.60.XXX",nonce="4444ecd2d1559130637b185152e48a75efecca04",uri="sip:6468621545@202.80.
61.10",response="752c0923d00e9a7a4a8611835ea0c649",algorithm=MD5..Supported: eventlist..User-Agent: eyeBeam release 3010n
stamp 19039..Content-Length: 235....v=0..o=- 18498030 18498049 IN IP4 192.168.2.18..s=eyeBeam..c=IN IP4 192.168.2.18..t=
0 0..m=audio 8470 RTP/AVP 8 18 5 101..a=alt:1 1 : 3E35CA80 000000D3 192.168.2.18 8470..a=fmtp:101 0-15..a=rtpmap:101 tele
phone-event/8000..a=sendrecv..
#
U 202.XXX.60.XXX:5060 -> 202.80.XXX.XXX:2650
SIP/2.0 100 trying -- your call is important to us..Via: SIP/2.0/UDP 192.168.2.18:8466;branch=z9hG4bK-d87543-1b1c6b50b550
ef43-1--d87543-;rport=2650;received=202.80.XXX.XXX..To: <sip:6468621545@202.XXX.60.XXX>..From: "jayesh"<sip:6468621547@202.8
0.61.10>;tag=1b0d5617..Call-ID: 83236e2f50004a44@SkFZRVNI..CSeq: 3 INVITE..Server: OpenSer (1.1.0-dev16 -notls (i386/linu
x))..Content-Length: 0..Warning: 392 202.XXX.60.XXX:5060 "Noisy feedback tells: pid=11594 req_src_ip=202.80.XXX.XXX req_src
_port=2650 in_uri=sip:6468621545@202.XXX.60.XXX out_uri=sip:6468621545@192.168.2.18:8469 via_cnt==1"....
#
U 202.XXX.60.XXX:5060 -> 202.80.XXX.XXX:1443
INVITE sip:6468621545@192.168.2.18:8469 SIP/2.0..Record-Route: <sip:202.XXX.60.XXX:5060;nat=yes;ftag=1b0d5617;lr=on>..Via:
SIP/2.0/UDP 202.XXX.60.XXX;branch=z9hG4bK49ec.e5a8534.0..Via: SIP/2.0/UDP 192.168.2.18:8466;received=202.80.XXX.XXX;branch=z
9hG4bK-d87543-1b1c6b50b550ef43-1--d87543-;rport=2650..Max-Forwards: 69..Contact: <sip:6468621547@202.80.XXX.XXX:2650>..To:
<sip:6468621545@202.XXX.60.XXX>..From: "jayesh"<sip:6468621547@202.XXX.60.XXX>;tag=1b0d5617..Call-ID: 83236e2f50004a44@SkFZR
VNI..CSeq: 3 INVITE..Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO..Content-Type: app
lication/sdp..Supported: eventlist..User-Agent: eyeBeam release 3010n stamp 19039..Content-Length: 236....v=0..o=- 184980
30 18498049 IN IP4 192.168.2.18..s=eyeBeam..c=IN IP4 202.XXX.60.XXX..t=0 0..m=audio 10108 RTP/AVP 8 18 5 101..a=alt:1 1 : 3
E35CA80 000000D3 192.168.2.18 8470..a=fmtp:101 0-15..a=rtpmap:101 telephone-event/8000..a=sendrecv..
#
U 202.80.XXX.XXX:1443 -> 202.XXX.60.XXX:5060
SIP/2.0 200 OK..Via: SIP/2.0/UDP 202.XXX.60.XXX;branch=z9hG4bK39ec.b7193062.0..Contact: <sip:6468621545@192.168.2.18:8469>.
.To: <sip:6468621545@202.XXX.60.XXX>;tag=023e0170..From: "jayesh"<sip:6468621547@202.XXX.60.XXX>;tag=1b0d5617..Call-ID: 83236
e2f50004a44@SkFZRVNI..CSeq: 2 CANCEL..User-Agent: eyeBeam release 3010n stamp 19039..Content-Length: 0....
#
U 202.80.XXX.XXX:1443 -> 202.XXX.60.XXX:5060
SIP/2.0 487 Request Terminated..Via: SIP/2.0/UDP 202.XXX.60.XXX;branch=z9hG4bK39ec.b7193062.0..Via: SIP/2.0/UDP 192.168.2.1
8:8466;received=202.80.XXX.XXX;branch=z9hG4bK-d87543-c63a9f56aa2b013d-1--d87543-;rport=2650..To: <sip:6468621545@202.80.61
.10>;tag=023e0170..From: "jayesh"<sip:6468621547@202.XXX.60.XXX>;tag=1b0d5617..Call-ID: 83236e2f50004a44@SkFZRVNI..CSeq: 2
INVITE..User-Agent: eyeBeam release 3010n stamp 19039..Content-Length: 0....
#
U 202.XXX.60.XXX:5060 -> 202.80.XXX.XXX:1443
ACK sip:6468621545@192.168.2.18:8469 SIP/2.0..Via: SIP/2.0/UDP 202.XXX.60.XXX;branch=z9hG4bK39ec.b7193062.0..From: "jayesh"
<sip:6468621547@202.XXX.60.XXX>;tag=1b0d5617..Call-ID: 83236e2f50004a44@SkFZRVNI..To: <sip:6468621545@202.XXX.60.XXX>;tag=023
e0170..CSeq: 2 ACK..User-Agent: OpenSer (1.1.0-dev16 -notls (i386/linux))..Content-Length: 0....
#
U 202.80.XXX.XXX:1443 -> 202.XXX.60.XXX:5060
SIP/2.0 180 Ringing..Via: SIP/2.0/UDP 202.XXX.60.XXX;branch=z9hG4bK49ec.e5a8534.0..Via: SIP/2.0/UDP 192.168.2.18:8466;recei
ved=202.80.XXX.XXX;branch=z9hG4bK-d87543-1b1c6b50b550ef43-1--d87543-;rport=2650..Record-Route: <sip:202.XXX.60.XXX:5060;lr;n
at=yes;ftag=1b0d5617>..Contact: <sip:6468621545@192.168.2.18:8469>..To: <sip:6468621545@202.XXX.60.XXX>;tag=f6570b78..From:
"jayesh"<sip:6468621547@202.XXX.60.XXX>;tag=1b0d5617..Call-ID: 83236e2f50004a44@SkFZRVNI..CSeq: 3 INVITE..User-Agent: eyeB
eam release 3010n stamp 19039..Content-Length: 0....
#
U 202.XXX.60.XXX:5060 -> 202.80.XXX.XXX:2650
SIP/2.0 180 Ringing..Via: SIP/2.0/UDP 192.168.2.18:8466;received=202.80.XXX.XXX;branch=z9hG4bK-d87543-1b1c6b50b550ef43-1--
d87543-;rport=2650..Record-Route: <sip:202.XXX.60.XXX:5060;lr;nat=yes;ftag=1b0d5617>..Contact: <sip:6468621545@202.80.61.25
4:1443>..To: <sip:6468621545@202.XXX.60.XXX>;tag=f6570b78..From: "jayesh"<sip:6468621547@202.XXX.60.XXX>;tag=1b0d5617..Call-I
D: 83236e2f50004a44@SkFZRVNI..CSeq: 3 INVITE..User-Agent: eyeBeam release 3010n stamp 19039..Content-Length: 0....
The one that I have made bold is the forwarded number. It recognises but it somehow again asks for proxy authentication after the call is forwarded.
User 6468621545 has forwarded the call on no answer to 00919833171405.
Please help me in this regard as many must have used that script.
w/regards,
jayesh.
---------------------------------
Jiyo cricket on Yahoo! India cricket
Yahoo! Messenger Mobile Stay in touch with your buddies all the time.
---------------------------------
Jiyo cricket on Yahoo! India cricket
Yahoo! Messenger Mobile Stay in touch with your buddies all the time.
Hi,
I am using SER.cfg file with the following configuration for the registerd users,
if (method=="REGISTER" & proxy_authorize("localhost" , "subscriber"))
{
if (!check_to())
{
log(1, "LOG: unregistered user registration attempt\n");
sl_send_reply("403", "Only registered users are allowed");
break;
};
};
but it does not work and i gets this error,
Stopping ser: [FAILED]
Starting ser: 0(7109) loading module /usr/lib/ser/modules/mysql.so
0(7109) loading module /usr/lib/ser/modules/sl.so
0(7109) loading module /usr/lib/ser/modules/tm.so
0(7109) loading module /usr/lib/ser/modules/rr.so
0(7109) loading module /usr/lib/ser/modules/maxfwd.so
0(7109) loading module /usr/lib/ser/modules/usrloc.so
0(7109) loading module /usr/lib/ser/modules/registrar.so
0(7109) loading module /usr/lib/ser/modules/auth.so
0(7109) loading module /usr/lib/ser/modules/auth_db.so
0(7109) loading module /usr/lib/ser/modules/acc.so
0(7109) loading module /usr/lib/ser/modules/exec.so
0(7109) loading module /usr/lib/ser/modules/group.so
0(7109) loading module /usr/lib/ser/modules/print.so
0(7109) loading module /usr/lib/ser/modules/textops.so
0(7109) set_mod_param_regex: usrloc matches module usrloc
0(7109) set_mod_param_regex: found <db_mode> in module usrloc [/usr/lib/ser/modules/usrloc.so]
0(7109) set_mod_param_regex: usrloc matches module usrloc
0(7109) set_mod_param_regex: found <db_url> in module usrloc [/usr/lib/ser/modules/usrloc.so]
0(7109) set_mod_param_regex: auth_db matches module auth_db
0(7109) set_mod_param_regex: found <calculate_ha1> in module auth_db [/usr/lib/ser/modules/auth_db.so]
0(7109) set_mod_param_regex: auth_db matches module auth_db
0(7109) set_mod_param_regex: found <password_column> in module auth_db [/usr/lib/ser/modules/auth_db.so]
0(7109) set_mod_param_regex: rr matches module rr
0(7109) set_mod_param_regex: found <enable_full_lr> in module rr [/usr/lib/ser/modules/rr.so]
0(7109) find_export: found <mf_process_maxfwd_header> in module maxfwd_module [/usr/lib/ser/modules/maxfwd.so]
0(7109) find_export: found <sl_send_reply> in module sl_module [/usr/lib/ser/modules/sl.so]
0(7109) find_export: found <sl_send_reply> in module sl_module [/usr/lib/ser/modules/sl.so]
0(7109) find_export: found <record_route> in module rr [/usr/lib/ser/modules/rr.so]
0(7109) find_export: found <loose_route> in module rr [/usr/lib/ser/modules/rr.so]
0(7109) find_export: found <t_relay> in module tm [/usr/lib/ser/modules/tm.so]
0(7109) find_export: found <search> in module textops [/usr/lib/ser/modules/textops.so]
0(7109) find_export: found <sl_send_reply> in module sl_module [/usr/lib/ser/modules/sl.so]
0(7109) find_export: found <sl_send_reply> in module sl_module [/usr/lib/ser/modules/sl.so]
0(7109) find_export: found <www_authorize> in module auth_db [/usr/lib/ser/modules/auth_db.so]
0(7109) find_export: found <www_challenge> in module auth [/usr/lib/ser/modules/auth.so]
0(7109) find_export: found <save> in module registrar [/usr/lib/ser/modules/registrar.so]
0(7109) find_export: found <proxy_authorize> in module auth_db [/usr/lib/ser/modules/auth_db.so]
0(7109) find_export: <check_to> not found
0(7109) find_export: <check_to> not found
0(7109) parse error (139,21-22): unknown command, missing loadmodule?
0(7109) find_export: found <sl_send_reply> in module sl_module [/usr/lib/ser/modules/sl.so]
0(7109) find_export: found <lookup> in module registrar [/usr/lib/ser/modules/registrar.so]
0(7109) find_export: found <sl_send_reply> in module sl_module [/usr/lib/ser/modules/sl.so]
0(7109) find_export: found <t_relay> in module tm [/usr/lib/ser/modules/tm.so]
0(7109) find_export: found <sl_reply_error> in module sl_module [/usr/lib/ser/modules/sl.so]
ERROR: bad config file (1 errors)
0(7109) DEBUG: tm_shutdown : start
0(7109) DEBUG: tm_shutdown : empting hash table
0(7109) DEBUG: tm_shutdown: releasing timers
0(7109) DEBUG: tm_shutdown : removing semaphores
0(7109) DEBUG: tm_shutdown : done
0(7109) shm_mem_destroy
0(7109) destroying the shared memory lock
[FAILED]
can any body help me in this matter,
Best Regards
---------------------------------
Talk is cheap. Use Yahoo! Messenger to make PC-to-Phone calls. Great rates starting at 1¢/min.
Somone on this topic ?
Thanks!
Ricardo.-
> -----Mensaje original-----
> De: Ricardo Martinez [mailto:rmartinez@redvoiss.net]
> Enviado el: Jueves, 13 de Abril de 2006 18:00
> Para: 'serusers(a)lists.iptel.org'
> Asunto: [Serusers] Call Forward and Billing.
>
>
> Hello list.
> It is been a while since i wrote here, that's ok, it
> means that my
> SER box is working flawless. :)
> Well, if is not to much problem i want to ask a
> question about the
> Diversion module and how the Forward procedure works.
>
> Suppose that i want to implement a Blind Call Forward
> system, that
> works catching the First INVITE and then changing the R-URI for the
> forwarded number, like the "getting started" doc from onsip.
> Something
> like this example :
>
> INVITE sip:bob@sip.org SIP/2.0
> Via: SIP/2.0/UDP 1.2.3.4:5060
> From: "mark" <sip:mark@sip.org>;tag=ldgheoihege
> To: "Bob" <sip:bob@sip.org>
> Call-ID: adgasdkgjhkjha(a)1.2.3.4
> CSeq: 3 INVITE
> Contact: <sip:mark@1.2.3.4>
> Content-Length: 0
>
> The INVITE message is diverted and the new destination is
> sip:alice@sip.org
> :
>
> INVITE sip:alice@sip.org SIP/2.0
> Via: SIP/2.0/UDP 5.6.7.8:5060
> Via: SIP/2.0/UDP 1.2.3.4:5060
> From: "mark" <sip:mark@sip.org>;tag=ldgheoihege
> To: "Bob" <sip:bob@sip.org>
> Call-ID: adgasdkgjhkjha(a)1.2.3.4
> CSeq: 3 INVITE
> Diversion: <sip:bob@sip.org>;reason=user-busy
> Contact: <sip:mark@1.2.3.4>
> Content-Length: 0
>
> How this new INVITE is reflected in the Start and Stop message for the
> accounting ??. How the "divertor" is billed ?
> Hope that someone can clarify this.
>
> Thanks in advance
>
> Ricardo Martinez
>
> _______________________________________________
> Serusers mailing list
> serusers(a)lists.iptel.org
> http://lists.iptel.org/mailman/listinfo/serusers
>
Hi,
What's the meaning of the flags in avp_copy()? There's no description
available at http://www.openser.org/docs/modules/1.1.x/avpops.html#AEN387
g - copy all src_avps matching the name?
d - delete src_avp after copy?
n - ?
s - ?
Thanks,
Andy
Hi folks!!
Finally I had time to test the new TLS module and faced lots of
problems...probably due to my lack of security knowledge. If somebody
can point me few links where I can gain some knowledge I'll appreciate
it..
The problem:
I create the cert,key and ca-list using the scripts present in
openser's TLS module. I am using the latest CVS version and SER does
not start giving the next error:
ERROR: tls/tls_domain.c:200: TLSc<default>: Unable to load
certificate file '/usr/local/etc/ser/certs/user-cert.pem'
ERROR: tls/tls_domain.c:201: load_cert:error:0906D06C:PEM
routines:PEM_read_bio:no start line
Probably I did something wrong in the key creation or configure
something wrong in ser.cfg....The config is taken from a thread
present in serdev about the status of the SER TLS module and it's
really simple so I don't think it's wrong but anyway, here it is:
loadmodule "/usr/local/lib/ser/modules/tls.so"
loadmodule "/usr/local/lib/ser/modules/sl.so"
loadmodule "/usr/local/lib/ser/modules/xmlrpc.so"
listen=tls:a.b.c.d:5061
listen=tcp:a.b.c.d:5060
listen=udp:a.b.c.d:5060
alias=mydomain.com
#modparam("tls", "tls_method", "TLSv1")
modparam("tls", "tls_method", "SSLv23")
modparam("tls", "verify_certificate", 1)
modparam("tls", "require_certificate", 0)
modparam("tls", "private_key", "/usr/local/etc/ser/certs/user-privkey.pem")
modparam("tls", "certificate", "/usr/local/etc/ser/certs/user-cert.pem")
modparam("tls", "ca_list", "/usr/local/etc/ser/certs/user-calist.pem")
#modparam("tls", "config", "tls.cfg")
route {
if (proto == TLS && (method == "POST" || method == "GET")) {
create_via(); # XMLRPC requests do not contain via, create it
if (!(a)tls.peer.verified) {
# Client did not provide certificate or it is not valid
xmlrpc_reply("400", "Unauthorized");
break;
}
if (@xmlrpc.method == "core.kill") {
# Make sure the client has the permission to execute the command
if (@tls.peer != "SER-Killer") {
xmlrpc_reply("400", "Access to core.kill denied");
break;
}
}
dispatch_rpc();
break;
}
}
Any comments are highly appreciated, thanks!
Samuel.