Hi,
The important thing to consider here is this line.
#!define WITH_ASTERISK
so if you've defined this on the very top of your kamailio.cfg then it
will go and check username/passwords from the sipusers table from the
Database defined by this: DBASTURL
if (!auth_check("$fd", "sipusers", "1")) {
Make sure you've the same user defined and username and passwords are
defined in these columns:
modparam("auth_db", "user_column", "name")
modparam("auth_db", "password_column", "sippasswd")
the sipasswd column is text based so dont use encrypted PASSWORD() in there.
Once you follow these steps your user should get registered.
On Wed, Apr 29, 2015 at 9:52 AM, Mauricio Tejeda <mauricio.tejeda(a)outlook.cl
Hello All.
My English is bad so I hope you can understand.
I have been working with Kamailio some time, I following some of Guides of
http://kb.asipto.com,
http://saevolgo.blogspot.com and
http://nil.uniza.sk
.
To Authenticate Asterisk sipusers I'm not have problems, but subscriber of
Kamailio authenticate is my problem.
Autenticate are denied to subscriber Kamailio.
In spanish I can explain it better :-)
best regards
my Settings:
#######################
# ----- auth_db params -----
#!ifdef WITH_AUTH
modparam("auth_db", "calculate_ha1", yes)
modparam("auth_db", "load_credentials", "")
#!ifdef WITH_ASTERISK
modparam("auth_db", "user_column", "name")
modparam("auth_db", "password_column", "sippasswd")
modparam("auth_db", "db_url", DBASTURL)
modparam("auth_db", "version_table", 0)
#!else
modparam("auth_db", "db_url", DBURL)
modparam("auth_db", "password_column", "password")
modparam("auth_db", "use_domain", MULTIDOMAIN)
#!endif
####################
#!ifdef WITH_AUTH
#!ifdef WITH_ASTERISK
# do not auth traffic from Asterisk - trusted!
if(route(FROMASTERISK))
return;
#!endif
#!ifdef WITH_IPAUTH
if((!is_method("REGISTER")) && allow_source_address())
{
# source IP allowed
return;
}
#!endif
if (is_method("REGISTER") || from_uri==myself)
{
# authenticate requests
#!ifdef WITH_ASTERISK
if (!auth_check("$fd", "sipusers",
"1"))
{ #### Aquí autentifica sin problemas en caso de ser
un usuario asterisk
#!else
#### Pero hace caso
omiso al switch.
if (!auth_check("$fd", "subscriber",
"1"))
{ #### No autentifica subscriber de la base de datos de
kamailio
#!endif
auth_challenge("$fd",
"0");
exit;
}
# user authenticated - remove auth header
if(!is_method("REGISTER|PUBLISH"))
consume_credentials();
}
#!endif
return;
}
#########################
DEBUG KAMAILIO
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/msg_parser.c:623]: parse_msg(): SIP Request:
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/msg_parser.c:625]: parse_msg(): method: <REGISTER>
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/msg_parser.c:627]: parse_msg(): uri: <sip:192.168.65.132>
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/msg_parser.c:629]: parse_msg(): version: <SIP/2.0>
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/parse_addr_spec.c:898]: parse_addr_spec(): end of header reached,
state=10
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/msg_parser.c:190]: get_hdr_field(): DEBUG: get_hdr_field: <To>
[29]; uri=[sip:107@192.168.65.132]
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/msg_parser.c:192]: get_hdr_field(): DEBUG: to body [107<
sip:107@192.168.65.132>#015#012]
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/parse_via.c:1284]: parse_via_param(): Found param type 232,
<branch> = <z9hG4bK-d87543-733510592-1--d87543->; state=6
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/parse_via.c:1284]: parse_via_param(): Found param type 235, <rport>
= <n/a>; state=17
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/parse_via.c:2672]: parse_via(): end of header reached, state=5
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/msg_parser.c:513]: parse_headers(): parse_headers: Via found,
flags=2
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/msg_parser.c:515]: parse_headers(): parse_headers: this is the
first via
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[receive.c:154]: receive_msg(): After parse_msg...
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[receive.c:197]: receive_msg(): preparing to run routing scripts...
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/msg_parser.c:170]: get_hdr_field(): get_hdr_field: cseq <CSeq>: <1>
<REGISTER>
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: maxfwd
[mf_funcs.c:85]: is_maxfwd_present(): value = 70
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/msg_parser.c:204]: get_hdr_field(): DEBUG: get_hdr_body :
content_length=0
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/msg_parser.c:106]: get_hdr_field(): found end of header
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/parse_addr_spec.c:176]: parse_to_param(): DEBUG: add_param:
tag=306ac106
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[parser/parse_addr_spec.c:898]: parse_addr_spec(): end of header reached,
state=29
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: sanity
[mod_sanity.c:255]: w_sanity_check(): sanity checks result: 1
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: siputils
[checks.c:103]: has_totag(): no totag
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:1072]:
t_check_msg(): DEBUG: t_check_msg: msg id=2 global id=1 T
start=0xffffffffffffffff
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:527]:
t_lookup_request(): t_lookup_request: start searching: hash=16161, isACK=0
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:485]:
matching_3261(): DEBUG: RFC3261 transaction matching failed
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:709]:
t_lookup_request(): DEBUG: t_lookup_request: no transaction found
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: tm [t_lookup.c:1141]:
t_check_msg(): DEBUG: t_check_msg: msg id=2 global id=2 T end=(nil)
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[socket_info.c:583]: grep_sock_info(): grep_sock_info - checking if
host==us: 14==14 && [192.168.65.132] == [192.168.65.132]
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[socket_info.c:587]: grep_sock_info(): grep_sock_info - checking if port
5060 (advertise 0) matches port 5060
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [select.c:429]:
run_select(): Calling SELECT 0x7f213171d950
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [select.c:429]:
run_select(): Calling SELECT 0x7f21317216c0
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth_db
[authorize.c:498]: auth_check(): realm [192.168.65.132] table [sipusers]
flags [1]
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth [api.c:86]:
pre_auth(): auth:pre_auth: Credentials with realm '192.168.65.132' not found
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth_db
[authorize.c:264]: digest_authenticate_hdr(): no credentials
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth
[challenge.c:127]: get_challenge_hf(): build_challenge_hf:
realm='192.168.65.132'
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: auth
[challenge.c:269]: get_challenge_hf(): auth: 'WWW-Authenticate: Digest
realm="192.168.65.132",
nonce="VUDgjFVA32CFnv6lYnT/fxOzv3M7Mw7n"#015#012'
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: sl [sl.c:296]:
send_reply(): reply in stateless mode (sl)
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core> [xavp.c:448]:
xavp_destroy_list(): destroying xavp list (nil)
Apr 29 10:40:48 labkamailio kamailio[11304]: DEBUG: <core>
[receive.c:298]: receive_msg(): receive_msg: cleaning up
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/msg_parser.c:623]: parse_msg(): SIP Request:
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/msg_parser.c:625]: parse_msg(): method: <REGISTER>
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/msg_parser.c:627]: parse_msg(): uri: <sip:192.168.65.132>
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/msg_parser.c:629]: parse_msg(): version: <SIP/2.0>
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/parse_addr_spec.c:898]: parse_addr_spec(): end of header reached,
state=10
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/msg_parser.c:190]: get_hdr_field(): DEBUG: get_hdr_field: <To>
[29]; uri=[sip:107@192.168.65.132]
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/msg_parser.c:192]: get_hdr_field(): DEBUG: to body [107<
sip:107@192.168.65.132>#015#012]
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/parse_via.c:1284]: parse_via_param(): Found param type 232,
<branch> = <z9hG4bK-d87543-600273073-1--d87543->; state=6
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/parse_via.c:1284]: parse_via_param(): Found param type 235, <rport>
= <n/a>; state=17
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/parse_via.c:2672]: parse_via(): end of header reached, state=5
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/msg_parser.c:513]: parse_headers(): parse_headers: Via found,
flags=2
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/msg_parser.c:515]: parse_headers(): parse_headers: this is the
first via
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[receive.c:154]: receive_msg(): After parse_msg...
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[receive.c:197]: receive_msg(): preparing to run routing scripts...
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/msg_parser.c:170]: get_hdr_field(): get_hdr_field: cseq <CSeq>: <2>
<REGISTER>
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: maxfwd
[mf_funcs.c:85]: is_maxfwd_present(): value = 70
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/msg_parser.c:204]: get_hdr_field(): DEBUG: get_hdr_body :
content_length=0
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/msg_parser.c:106]: get_hdr_field(): found end of header
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/parse_addr_spec.c:176]: parse_to_param(): DEBUG: add_param:
tag=306ac106
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[parser/parse_addr_spec.c:898]: parse_addr_spec(): end of header reached,
state=29
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: sanity
[mod_sanity.c:255]: w_sanity_check(): sanity checks result: 1
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: siputils
[checks.c:103]: has_totag(): no totag
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:1072]:
t_check_msg(): DEBUG: t_check_msg: msg id=2 global id=1 T
start=0xffffffffffffffff
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:527]:
t_lookup_request(): t_lookup_request: start searching: hash=16158, isACK=0
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:485]:
matching_3261(): DEBUG: RFC3261 transaction matching failed
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:709]:
t_lookup_request(): DEBUG: t_lookup_request: no transaction found
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: tm [t_lookup.c:1141]:
t_check_msg(): DEBUG: t_check_msg: msg id=2 global id=2 T end=(nil)
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[socket_info.c:583]: grep_sock_info(): grep_sock_info - checking if
host==us: 14==14 && [192.168.65.132] == [192.168.65.132]
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[socket_info.c:587]: grep_sock_info(): grep_sock_info - checking if port
5060 (advertise 0) matches port 5060
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [select.c:429]:
run_select(): Calling SELECT 0x7f213171d950
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [select.c:429]:
run_select(): Calling SELECT 0x7f21317216c0
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth_db
[authorize.c:498]: auth_check(): realm [192.168.65.132] table [sipusers]
flags [1]
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth [api.c:96]:
pre_auth(): auth: digest-algo: MD5 parsed value: 1
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:118]:
db_new_result(): allocate 56 bytes for result set at 0x7f213171c1a0
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql
[km_res.c:68]: db_mysql_get_columns(): 1 columns returned from the query
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:156]:
db_allocate_columns(): allocate 8 bytes for result names at 0x7f21317236a8
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:167]:
db_allocate_columns(): allocate 4 bytes for result types at 0x7f2131739f10
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql
[km_res.c:86]: db_mysql_get_columns(): allocate 16 bytes for RES_NAMES[0]
at 0x7f21317605f8
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql
[km_res.c:93]: db_mysql_get_columns():
RES_NAMES(0x7f21317605f8)[0]=[sippasswd]
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql
[km_res.c:137]: db_mysql_get_columns(): use DB1_STRING result type
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: db_mysql
[km_res.c:170]: db_mysql_convert_rows(): no rows returned from the query
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth_db
[authorize.c:196]: get_ha1(): no result for user '107@'
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:81]:
db_free_columns(): freeing 1 columns
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:85]:
db_free_columns(): freeing RES_NAMES[0] at 0x7f21317605f8
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:94]:
db_free_columns(): freeing result names at 0x7f21317236a8
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:99]:
db_free_columns(): freeing result types at 0x7f2131739f10
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [db_res.c:136]:
db_free_result(): freeing result set at 0x7f213171c1a0
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth
[challenge.c:127]: get_challenge_hf(): build_challenge_hf:
realm='192.168.65.132'
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: auth
[challenge.c:269]: get_challenge_hf(): auth: 'WWW-Authenticate: Digest
realm="192.168.65.132",
nonce="VUDgjFVA32CFnv6lYnT/fxOzv3M7Mw7n"#015#012'
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: sl [sl.c:296]:
send_reply(): reply in stateless mode (sl)
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[usr_avp.c:643]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core> [xavp.c:448]:
xavp_destroy_list(): destroying xavp list (nil)
Apr 29 10:40:48 labkamailio kamailio[11302]: DEBUG: <core>
[receive.c:298]: receive_msg(): receive_msg: cleaning up
Ngrep sipusers asterisk
U 192.168.65.1:6018 -> 192.168.65.132:5060
REGISTER sip:192.168.65.132 SIP/2.0.
To: 101<sip:101@192.168.65.132>.
From: 101<sip:101@192.168.65.132>;tag=622d132b.
Via: SIP/2.0/UDP 192.168.65.1:6018
;branch=z9hG4bK-d87543-11473800-1--d87543-;rport.
Call-ID: 45522f4e99747d39.
CSeq: 1 REGISTER.
Contact: <sip:101@192.168.65.1:6018>.
Expires: 3600.
Max-Forwards: 70.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
SUBSCRIBE, INFO.
User-Agent: eyeBeam release 3004w stamp 16863.
Content-Length: 0.
.
#
U 192.168.65.132:5060 -> 192.168.65.1:6018
SIP/2.0 401 Unauthorized.
To: 101<sip:101@192.168.65.132>;tag=65b56d053bca97da69d7accef5da903f.bfcc.
From: 101<sip:101@192.168.65.132>;tag=622d132b.
Via: SIP/2.0/UDP 192.168.65.1:6018
;branch=z9hG4bK-d87543-11473800-1--d87543-;rport=6018;received=192.168.65.1.
Call-ID: 45522f4e99747d39.
CSeq: 1 REGISTER.
WWW-Authenticate: Digest realm="192.168.65.132",
nonce="VUDfOlVA3g5sSAKxFPg/zsB0qvueMh8Y".
Server: kamailio (4.2.4 (x86_64/linux)).
Content-Length: 0.
.
#
U 192.168.65.1:6018 -> 192.168.65.132:5060
REGISTER sip:192.168.65.132 SIP/2.0.
To: 101<sip:101@192.168.65.132>.
From: 101<sip:101@192.168.65.132>;tag=622d132b.
Via: SIP/2.0/UDP 192.168.65.1:6018
;branch=z9hG4bK-d87543-426128389-1--d87543-;rport.
Call-ID: 45522f4e99747d39.
CSeq: 2 REGISTER.
Contact: <sip:101@192.168.65.1:6018>.
Expires: 3600.
Max-Forwards: 70.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
SUBSCRIBE, INFO.
User-Agent: eyeBeam release 3004w stamp 16863.
Authorization: Digest
username="101",realm="192.168.65.132",nonce="VUDfOlVA3g5sSAKxFPg/zsB0qvueMh8Y",uri="sip:192.168.65.132",response="792b60f48b2da3bb93f5d808fd87c09c",algorithm=MD5.
Content-Length: 0.
.
#
U 192.168.65.132:5060 -> 192.168.65.1:6018
SIP/2.0 200 OK.
To: 101<sip:101@192.168.65.132>;tag=65b56d053bca97da69d7accef5da903f.92bc.
From: 101<sip:101@192.168.65.132>;tag=622d132b.
Via: SIP/2.0/UDP 192.168.65.1:6018
;branch=z9hG4bK-d87543-426128389-1--d87543-;rport=6018;received=192.168.65.1.
Call-ID: 45522f4e99747d39.
CSeq: 2 REGISTER.
Contact: <sip:101@192.168.65.1:6018>;expires=3600.
Server: kamailio (4.2.4 (x86_64/linux)).
Content-Length: 0.
Ngrep subscriber Kamailio
U 192.168.65.1:6018 -> 192.168.65.132:5060
REGISTER sip:192.168.65.132 SIP/2.0.
To: 107<sip:107@192.168.65.132>.
From: 107<sip:107@192.168.65.132>;tag=7b070e2d.
Via: SIP/2.0/UDP 192.168.65.1:6018
;branch=z9hG4bK-d87543-536609279-1--d87543-;rport.
Call-ID: 77019a2d9e70df3f.
CSeq: 1 REGISTER.
Contact: <sip:107@192.168.65.1:6018>.
Expires: 3600.
Max-Forwards: 70.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
SUBSCRIBE, INFO.
User-Agent: eyeBeam release 3004w stamp 16863.
Content-Length: 0.
.
#
U 192.168.65.132:5060 -> 192.168.65.1:6018
SIP/2.0 401 Unauthorized.
To: 107<sip:107@192.168.65.132>;tag=65b56d053bca97da69d7accef5da903f.1c0e.
From: 107<sip:107@192.168.65.132>;tag=7b070e2d.
Via: SIP/2.0/UDP 192.168.65.1:6018
;branch=z9hG4bK-d87543-536609279-1--d87543-;rport=6018;received=192.168.65.1.
Call-ID: 77019a2d9e70df3f.
CSeq: 1 REGISTER.
WWW-Authenticate: Digest realm="192.168.65.132",
nonce="VUDf21VA3q+Px29K8cRa5tWIadNTI5e6".
Server: kamailio (4.2.4 (x86_64/linux)).
Content-Length: 0.
.
#
U 192.168.65.1:6018 -> 192.168.65.132:5060
REGISTER sip:192.168.65.132 SIP/2.0.
To: 107<sip:107@192.168.65.132>.
From: 107<sip:107@192.168.65.132>;tag=7b070e2d.
Via: SIP/2.0/UDP 192.168.65.1:6018
;branch=z9hG4bK-d87543-1058472151-1--d87543-;rport.
Call-ID: 77019a2d9e70df3f.
CSeq: 2 REGISTER.
Contact: <sip:107@192.168.65.1:6018>.
Expires: 3600.
Max-Forwards: 70.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
SUBSCRIBE, INFO.
User-Agent: eyeBeam release 3004w stamp 16863.
Authorization: Digest
username="107",realm="192.168.65.132",nonce="VUDf21VA3q+Px29K8cRa5tWIadNTI5e6",uri="sip:192.168.65.132",response="c9ca6eff16e3b661337b6d99d74027de",algorithm=MD5.
Content-Length: 0.
.
#
U 192.168.65.132:5060 -> 192.168.65.1:6018
SIP/2.0 401 Unauthorized.
To: 107<sip:107@192.168.65.132>;tag=65b56d053bca97da69d7accef5da903f.8cc0.
From: 107<sip:107@192.168.65.132>;tag=7b070e2d.
Via: SIP/2.0/UDP 192.168.65.1:6018
;branch=z9hG4bK-d87543-1058472151-1--d87543-;rport=6018;received=192.168.65.1.
Call-ID: 77019a2d9e70df3f.
CSeq: 2 REGISTER.
WWW-Authenticate: Digest realm="192.168.65.132",
nonce="VUDf21VA3q+Px29K8cRa5tWIadNTI5e6".
Server: kamailio (4.2.4 (x86_64/linux)).
Content-Length: 0.
.
_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users(a)lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users