Hi users,

I'm cracking my head with "500  :-I'm terribly sorry, server error occurred (1/SL)  " .
What's mean this...
When I trying to calls  from softphone to softphone  " its says above  message  '.

 openser server  ip 192.168.2.4
 sip -domain is  xxx.xxx.xxx.xxx
softphones ip are 192.168.2.21 and 20  which   behind the  NAT ( i.e  not in server  location ,its some where place )

please  check the marked one in  debug.

SIP Request:
 0(29266)  method:  <INVITE>
 0(29266)  uri:     <sip:104@24.98.157.209>
 0(29266)  version: <SIP/2.0>
 0(29266) parse_headers: flags=2
 0(29266) Found param type 235, <rport> = <n/a>; state=6
 0(29266) Found param type 232, <branch> = <z9hG4bK1EA935B35FA14629985951EBA8B3F547>; state=16
 0(29266) end of header reached, state=5
 0(29266) parse_headers: Via found, flags=2
 0(29266) parse_headers: this is the first via
 0(29266) After parse_msg...
 0(29266) preparing to run routing scripts...
 0(29266) LOG:-  step1
 0(29266) parse_headers: flags=100
 0(29266) DEBUG:parse_to:end of header reached, state=9
 0(29266) DEBUG: get_hdr_field: <t> [25]; uri=[sip:104@xxx.xxx.xxx.xxx]
 0(29266) DEBUG: to body [<sip:104@
xxx.xxx.xxx.xxx >
]
 0(29266) get_hdr_field: cseq <CSeq>: <3472> <INVITE>
 0(29266) DEBUG:maxfwd:is_maxfwd_present: value = 70
 0(29266) parse_headers: flags=200
 0(29266) DEBUG: get_hdr_body : content_length=149
 0(29266) found end of header
 0(29266) find_first_route: No Route headers found
 0(29266) loose_route: There is no Route HF
 0(29266) LOG:- method not reg
 0(29266) DEBUG: add_param: tag=612182576
 0(29266) DEBUG:parse_to:end of header reached, state=29
 0(29266) parse_headers: flags=200
 0(29266) find_first_route: No Route headers found
 0(29266) loose_route: There is no Route HF
 0(29266) grep_sock_info - checking if host==us: 13==11 && 
xxx.xxx.xxx.xxx ] == [192.168.2.4]
 0(29266) grep_sock_info - checking if port 5060 matches port 5060
 0(29266) grep_sock_info - checking if host==us: 13==13 && 
xxx.xxx.xxx.xxx ] == [ xxx.xxx.xxx.xxx ]
 0(29266) grep_sock_info - checking if port 5060 matches port 5060
 0(29266) LOG:-  uri  method myself
 0(29266) LOG:- INVITE & ACK IN URI
 0(29266) parse_headers: flags=ffffffffffffffff
 0(29266) DEBUG:check_content_type: type <application/sdp> found valid
 0(29266) record_route(): Double attempt to record-route
 0(29266) parse_headers: flags=58
 0(29266) parse_headers: flags=ffffffffffffffff
 0(29266) DEBUG:check_content_type: type <application/sdp> found valid
 0(29266) parse_headers: flags=40
 0(29266) force_rtp_proxy2: proxy reply: 35002

 0(29266) DEBUG: t_newtran: msg id=5 , global msg id=0 , T on entrance=0xffffffff
 0(29266) parse_headers: flags=ffffffffffffffff
 0(29266) parse_headers: flags=78
 0(29266) t_lookup_request: start searching: hash=43828, isACK=0
 0(29266) DEBUG: RFC3261 transaction matching failed
 0(29266) DEBUG: t_lookup_request: no transaction found
 0(29266) DBG: trans=0xb6123100, callback type 1, id 0 entered
 0(29266) DEBUG:tm:t_relay: new INVITE
 0(29266) parse_headers: flags=ffffffffffffffff
 0(29266) check_via_address(61.17.248.68, 192.168.2.21, 0)
 0(29266) WARNING:vqm_resize: resize(0) called
 0(29266) DEBUG:tm:_reply_light: reply sent out. buf=0x81213a0: SIP/2.0 1..., shmem=0xb61247a8: SIP/2.0 1
 0(29266) DEBUG:tm:_reply_light: finished
 0(29266) DEBUG: mk_proxy: doing DNS lookup...
 0(29266) parse_headers: flags=1000
 0(29266) parse_headers: flags=ffffffffffffffff
 0(29266) clen_builder: content-length: 187 (187)
 0(29266) check_via_address(61.17.248.68, 192.168.2.21, 0)
 0(29266) DEBUG: add_to_tail_of_timer[4]: 0xb612321c
 0(29266) DEBUG: add_to_tail_of_timer[0]: 0xb612322c
 0(29266) SER: new transaction fwd'ed
 0(29266) rewrite_uri: Rewriting Request-URI with 'sip:104@192.168.2.20:5060'
 0(29266) lookup(): '104' Not found in usrloc
 0(29266) grep_sock_info - checking if host==us: 12==11 &&  [192.168.2.20] == [192.168.2.4]
 0(29266) grep_sock_info - checking if port 5060 matches port 5060
 0(29266) grep_sock_info - checking if host==us: 12==13 &&  [192.168.2.20] == [
xxx.xxx.xxx.xxx ]
 0(29266) grep_sock_info - checking if port 5060 matches port 5060
 0(29266) grep_sock_info - checking if host==us: 12==11 &&  [192.168.2.20] == [192.168.2.4]
 0(29266) grep_sock_info - checking if port 5060 matches port 5060
 0(29266) grep_sock_info - checking if host==us: 12==13 &&  [192.168.2.20] ==
xxx.xxx.xxx.xxx
]
 0(29266) grep_sock_info - checking if port 5060 matches port 5060
 0(29266) check_self: host != me
 0(29266) LOG:_ uri in uri myself
 0(29266) parse_headers: flags=ffffffffffffffff
 0(29266) DEBUG: t_newtran: msg id=5 , global msg id=5 , T on entrance=0xb6123100
 0(29266) ERROR: t_newtran: transaction already in process 0xb6123100
 0(29266) parse_headers: flags=ffffffffffffffff
 0(29266) check_via_address(61.17.248.68, 192.168.2.21, 0)
 0(29266) ERROR: sl_reply_error used: I'm terribly sorry, server error occurred (1/SL)
 0(29266) LOG:- ENeter into route 1
 0(29266) DEBUG: t_newtran: msg id=5 , global msg id=5 , T on entrance=0xb6123100
 0(29266) ERROR: t_newtran: transaction already in process 0xb6123100
 0(29266) parse_headers: flags=ffffffffffffffff
 0(29266) check_via_address(61.17.248.68, 192.168.2.21, 0)
 0(29266) ERROR: sl_reply_error used: I'm terribly sorry, server error occurred (1/SL)
 0(29266) DEBUG:destroy_avp_list: destroying list (nil)
 0(29266) receive_msg: cleaning up
 0(29266) SIP Request:
 0(29266)  method:  <ACK>
 0(29266)  uri:     <sip:104@24.98.157.209>
 0(29266)  version: <SIP/2.0>
 0(29266) parse_headers: flags=2
 0(29266) Found param type 235, <rport> = <n/a>; state=6
 0(29266) Found param type 232, <branch> = <z9hG4bK1EA935B35FA14629985951EBA8B3F547>; state=16
 0(29266) end of header reached, state=5
 0(29266) parse_headers: Via found, flags=2
 0(29266) parse_headers: this is the first via
 0(29266) After parse_msg...
 0(29266) preparing to run routing scripts...
 0(29266) parse_headers: flags=8
 0(29266) DEBUG: add_param: tag=30901ad8c164fe584bedac02134d4858.65cc
 0(29266) DEBUG:parse_to:end of header reached, state=29
 0(29266) DEBUG: get_hdr_field: <t> [67]; uri=[sip:104@24.98.157.209]
 0(29266) DEBUG: to body [<sip:104@24.98.157.209>]
 0(29266) DEBUG: sl_filter_ACK : local ACK found -> dropping it!
 0(29266) DEBUG:destroy_avp_list: destroying list (nil)
 0(29266) receive_msg: cleaning up
 0(29266) SIP Request:
 0(29266)  method:  <ACK>
 0(29266)  uri:     <sip:104@24.98.157.209>
 0(29266)  version: <SIP/2.0>
 0(29266) parse_headers: flags=2
 0(29266) Found param type 235, <rport> = <n/a>; state=6
 0(29266) Found param type 232, <branch> = <z9hG4bK1EA935B35FA14629985951EBA8B3F547>; state=16
 0(29266) end of header reached, state=5
 0(29266) parse_headers: Via found, flags=2
 0(29266) parse_headers: this is the first via
 0(29266) After parse_msg...
 0(29266) preparing to run routing scripts...
 0(29266) parse_headers: flags=8
 0(29266) DEBUG: add_param: tag=30901ad8c164fe584bedac02134d4858.65cc
 0(29266) DEBUG:parse_to:end of header reached, state=29
 0(29266) DEBUG: get_hdr_field: <t> [67]; uri=[sip:104@24.98.157.209]
 0(29266) DEBUG: to body [<sip:104@24.98.157.209>]
 0(29266) DEBUG: sl_filter_ACK : local ACK found -> dropping it!
 0(29266) DEBUG:destroy_avp_list: destroying list (nil)
 

............................................................................... openser.cfg
 

route   {
        log("LOG:-  step1\n");
        if(!mf_process_maxfwd_header("13")) {
                        sl_send_reply("483","Too many hops are there ");
                        exit;
                        };
        if(msg:len>max_len)  {
                        sl_send_reply("513","Messages are Too Big ...  !");
                        exit;
                        };
#               loose_route();
        if(!method=="REGISTER")  {
                        log("LOG:- method not reg \n");
                        record_route();
                        };
        if(loose_route())  {
                        log("LOG:- loose route\n");
                        acc_rad_request("200");
                        t_relay();
                        exit;
                        };
        if(uri==myself)
        {
                log("LOG:-  uri  method myself\n");
                if(method=="REGISTER")
                {        log("LOG:- REG IN  URI MY SELF \n");
                        if(!www_authorize("xxx.xxx.xxx.xxx.","subscriber"))
                        {       log("LOG :- REG IN URI AUTH\n");
                                www_challenge("xxx.xxx.xxx.xxx","0");
                                exit;
                        };
                save("location");
                setflag(6);
                force_rport();
        exit;
                };
        if(method=="INVITE"||method=="ACK")
                {
                        log("LOG:- INVITE & ACK IN URI \n");
        #               if (uri =~ "^sip:1].@*"){
# log("LOG:-rewrite port and host\n");
 log("LOG:- Aftere the rewite \n ");
                        fix_nated_sdp("1");
                        record_route();
                        acc_rad_request("Start");
                        force_rtp_proxy();
                        t_on_reply("1");
                        t_relay();
                };
        if(method=="BYE"||method=="CANCEL")
                {
                        setflag(2);
                        acc_rad_request("200");
                        unforce_rtp_proxy();
                };
        if(!lookup("location"))
                {
                        log("LOG:- NOT IN  LOCATION \n");
                        sl_send_reply("404","sorry guy ... urs  friend Not found");
                        exit;
                };
        };
         lookup("aliases");
#        if (!uri==myself) {
#       log("LOG:_ uri in uri myself \n");
 #       append_hf("P-hint: outbound alias\r\n");
#        route(1);
  #      };
        if(!t_relay())
        {
                sl_reply_error();
        };
#       lookup("aliases");
#       exit;
route(1);
# exit;
   }
route[1]
{
        log("LOG:- ENeter into route 1\n");
if(isflagset(6))
        {
                force_rtp_proxy();
        };
        t_on_reply("1");
        if(!t_relay())
        {
                sl_reply_error();
        };
}
onreply_route[1]
        {      log("LOG :- reply_route \n");
                if(status=~"2[0-9][0-9]" && isflagset(6))
                {
                log("LOG:- staus 183| 200 \n");
                        fix_nated_contact();
                        force_rtp_proxy();
                };
        }



--
Thanks and Regards with cheers
Sunkara Ravi Prakash (Voip Developer)
Hyperion Technology
www.hyperion-tech.com
<b>