Looks like your SIP UA does not support REFER. Check the technical
details of the SIP UA or ask the vendor about.
Daniel
On 8/4/2004 7:29 AM, Andrew Mee wrote:
I have been using ctd.sh with no success.
SER ver 0.8.14
./ctd.sh sip:support@192.168.2.253
test3(a)192.168.2.253
488 Not Acceptable Here
invitation failed
my config is :
# ----------- global configuration parameters ------------------------
debug=7
listen=192.168.2.253
log_stderror=yes
check_via=no dns=no rev_dns=no fifo="/tmp/ser_fifo"
# ------------------ module loading ----------------------------------
loadmodule "/usr/lib/ser/modules/mysql.so"
loadmodule "/usr/lib/ser/modules/exec.so"
loadmodule "/usr/lib/ser/modules/sl.so"
loadmodule "/usr/lib/ser/modules/tm.so"
loadmodule "/usr/lib/ser/modules/rr.so"
loadmodule "/usr/lib/ser/modules/maxfwd.so"
loadmodule "/usr/lib/ser/modules/usrloc.so"
loadmodule "/usr/lib/ser/modules/registrar.so"
loadmodule "/usr/lib/ser/modules/textops.so"
loadmodule "/usr/lib/ser/modules/auth.so"
loadmodule "/usr/lib/ser/modules/auth_db.so"
# ----------------- setting module-specific parameters ---------------
modparam("usrloc", "db_mode", 0)
modparam("auth_db", "calculate_ha1", yes)
modparam("auth_db", "db_url",
"sql://xxxx:xxxxx@127.0.0.1/hsver3")
modparam("auth_db", "user_column", "uname")
modparam("auth_db", "domain_column", "domain")
modparam("auth_db", "password_column", "pass")
modparam("rr", "enable_full_lr", 1)
# ------------------------- request routing logic -------------------
# main routing logic
route{
# initial sanity checks -- messages with
# max_forwards==0, or excessively long requests
if (!mf_process_maxfwd_header("10")) {
sl_send_reply("483","Too Many Hops");
break;
};
if (msg:len > 8092) {
sl_send_reply("513", "Message too big");
break;
};
if (loose_route()) {
t_relay();
break;
};
if (uri==myself) {
if (method=="REGISTER") {
# Uncomment this if you want to use digest authentication
if (!proxy_authorize("", "users")) {
proxy_challenge("", "0");
break;
};
save("location");
break;
}
# native SIP destinations are handled using our USRLOC DB
if (!lookup("location")) {
sl_send_reply("404", "Not Found");
break;
};
};
if (!t_relay()) {
sl_reply_error();
};
}
_______________________________________________
Serusers mailing list
serusers(a)lists.iptel.org
http://lists.iptel.org/mailman/listinfo/serusers