Hello,
can you paste the BYE here (you can catch it with ngrep if it is not
coming via tls, e.g., from asterisk)? Also, the invite going to asterisk
will be good.
Cheers,
Daniel
On 08/20/07 07:50, David Loh wrote:
Hi All,
Good day, I'm new to this mailing list :-)
I've setup an OpenSER server with TLS implementation, so far I tested
everything works fine,
but there's strange problem for "BYE" request, from the openser's log
it always complaint:
"Aug 19 22:58:40 ser /sbin/openser[16171]: WARNING:get_send_socket:
protocol/port mismatch"
Here's my implementation:
UA -> OpenSER -> Asterisk (as RTP) -> OpenSER -> UA
On OpenSER I've two port opened which is Udp 5060 and TCP 5061 (TLS).
My UA is Eyebeam v1.5 and the CA certificate (self-signed) already
installed into IE "Trusted RootCA Certificates".
So far I've tested p2p and pstn calls (and call to playback
balance/asterisk), but the problem is unless UA disconnect the call
(initiate BYE),
otherwise if remote party (p2p/pstn/asterisk) initiate BYE request, my
UA will forever stay connected until I disconnect the call manually.
So far I've identified the BYE request from remote party will go into
Loose Route, and I've place a xlog to display the R-Uri..
here's the log from openser: (notes: if UA dial '001' will playback
his/her balance from asterisk)
-------------------------------------------------------------------------------------------------------------
Aug 19 22:58:31 ser /sbin/openser[16189]: DBG: INVITE from client
sip:%user%@%domain% (%UA_IP%) - p2p call
Aug 19 22:58:31 ser /sbin/openser[16189]: DBG: INVITE
F-[sip:%user%@%domain%] T-[sip:001@%domain%] IP-[%UA_IP%] SUCCESSFUL
Aug 19 22:58:32 ser /sbin/openser[16189]: DBG: INVITE from client
sip:%user%@%domain% (%UA_IP%)
Aug 19 22:58:32 ser /sbin/openser[16189]: DBG: INVITE from client
sip:%user%@%domain% (%UA_IP%) - p2p call
Aug 19 22:58:32 ser /sbin/openser[16189]: DBG: INVITE
F-[sip:%user%@%domain%] T-[sip:001@%domain%] IP-[%UA_IP%] SUCCESSFUL
Aug 19 22:58:32 ser /sbin/openser[16189]: DBG:
[sip:%user%@%domain%](%UA_IP%) ACK [sip:001@%domain%] relayed LOOSE ROUTE
Aug 19 22:58:32 ser /sbin/openser[16189]: DBG: ruri
[sip:001@%Asterisk_IP%] relayed LOOSE ROUTE
Aug 19 22:58:40 ser /sbin/openser[16171]: DBG:
[sip:001@%domain%](%Asterisk_IP%) BYE [sip:%user%@%domain%] relayed
LOOSE ROUTE
Aug 19 22:58:40 ser /sbin/openser[16171]: DBG: ruri
[sip:%user%@%domain%:%UA_Port%] relayed LOOSE ROUTE
Aug 19 22:58:40 ser /sbin/openser[16171]: WARNING:get_send_socket:
protocol/port mismatch <<<=============
Aug 19 22:58:41 ser /sbin/openser[16177]: DBG:
[sip:001@%domain%](%Asterisk_IP%) BYE [sip:%user%@%domain%] relayed
LOOSE ROUTE
Aug 19 22:58:41 ser /sbin/openser[16177]: DBG: ruri
[sip:%user%@%UA_IP%:%UA_Port%] relayed LOOSE ROUTE
Aug 19 22:58:42 ser /sbin/openser[16181]: DBG:
[sip:001@%domain%](%Asterisk_IP%) BYE [sip:%user%@%domain%] relayed
LOOSE ROUTE
Aug 19 22:58:42 ser /sbin/openser[16181]: DBG: ruri
[sip:%user%@%UA_IP%:%UA_Port%] relayed LOOSE ROUTE
....... (repeat the last 4 lines N times )
-------------------------------------------------------------------------------------------------------------
Below is my openser.cfg, loose route section
-------------------------------------------------------------------------------------------------------------
###############
# Loose route #
###############
if(loose_route()) {
if(has_totag() && (is_method("INVITE") ||
is_method("ACK"))) {
if(nat_uac_test("19") || search("^Route:.*;nat=yes")) {
fix_nated_contact();
}
}
xlog("L_INFO", "DBG: [$fu]($si) $rm [$tu] relayed LOOSE
ROUTE");
xlog("L_INFO", "DBG: ruri [$ru] relayed LOOSE ROUTE");
t_relay();
exit;
}
-------------------------------------------------------------------------------------------------------------
Had anyone encountered the same problems before ? Do you mind to share
your experience with me ?
Your help are greatly appreciated, thanks in advance.
Regards,
David Loh
_______________________________________________
Users mailing list
Users(a)openser.org
http://openser.org/cgi-bin/mailman/listinfo/users