Any one is successful with this configuration: ser 8.1.14 + radiusclient 0.4.4.
Just wanted to See if any one is getting the same symptoms as i get.
It looks like my ser+ radisuclient 0.4.4 is not talking at all to the
radius server
but in the ser log i am getting following:
"Some message with credentials for given realm not found "
I have submitted a message with all the logs but it is waiting for approval ..
I am submitting another shorter one.
) 3(3923) DEBUG: add_to_tail_of uri: <sip:209.250 3(3923) DEBUG:
a version: <SIP/2.0>
4(3927) parse_headers: flags=1
3(3923) DEBUG:destroy_avp_list: destroing list (nil)
3(3923) receive_msg: cleaning up
4(3927) Found param type 232, <branch> = <z9hG4bK4d5b.c80b2f83.0>; state=16
4(3927) end of header reached, state=5
4(3927) parse_headers: Via found, flags=1
4(3927) parse_headers: this is the first via
4(3927) After parse_msg...
4(3927) preparing to run routing scripts...
4(3927) DEBUG : is_maxfwd_present: max_forward header already found!
4(3927) DEBUG: is_maxfwd_present: value = 10
4(3927) parse_headers: flags=8
4(3927) Found param type 232, <branch> = <z9hG4bK7210a8d8>; state=16
4(3927) end of header reached, state=5
4(3927) parse_headers: Via found, flags=8
4(3927) parse_headers: this is the second via
4(3927) DEBUG: add_param: tag=as0854885b
4(3927) end of header reached, state=29
4(3927) query="select domain from domain where domain='209.250.135.8'"
4(3927) is_local(): Realm '209.250.135.8' is local
4(3927) XLOG: xl_print_log: final buffer length 31
4(3927) <REGISTER> == is from local ==
4(3927) parse_headers: flags=64
4(3927) end of header reached, state=9
4(3927) DEBUG: get_hdr_field: <To> [32]; uri=[sip:4169878025@209.250.135.8]
4(3927) DEBUG: to body [<sip:4169878025@209.250.135.8>
]
4(3927) get_hdr_field: cseq <CSeq>: <102> <REGISTER>
4(3927) check_via_address(209.250.135.8, 209.250.135.8, 2)
4(3927) parse_headers: flags=4096
4(3927) DEBUG: get_hdr_body : content_length=0
4(3927) found end of header
4(3927) pre_auth(): Credentials with given realm not found
4(3927) build_auth_hf(): 'WWW-Authenticate: Digest
realm="209.250.135.8",
nonce="4172b0334c46e8aaf44360a02eef199553852c7e"
'
4(3927) parse_headers: flags=-1
4(3927) check_via_address(209.250.135.8, 209.250.135.8, 2)
4(3927) DEBUG: get_out_socket: socket determined: 1
3(3923) SIP Reply (status):
3(3923) version: <SIP/2.0>
3(3923) status: <401>
3(3923) reason: <Unauthorized>
3(3923) parse_headers: flags=1
3(3923) Found param type 232, <branch> = <z9hG4bK4d5b.c80b2f83.0>; state=16
3(3923) end of header reached, state=5
3(3923) parse_headers: Via found, flags=1
3(3923) parse_headers: this is the first via
3(3923) After parse_msg...
3(3923) check_self - checking if host==us: 13==9 && [209.250.135.8]
== [127.0.0.1]
3(3923) check_self - checking if port 5060 matches port 5060
3(3923) check_self - checking if host==us: 13==13 && [209.250.135.8]
== [209.250.135.8]
3(3923) check_self - checking if port 5060 matches port 5060
3(3923) forward_reply: found module tm, passing reply to it
3(3923) DEBUG: t_check: msg id=2 global id=1 T start=0xffffffff
3(3923) parse_headers: flags=17
3(3923) Found param type 232, <branch> = <z9hG4bK7210a8d8>; state=16
3(3923) end of header reached, state=5
3(3923) parse_headers: Via found, flags=17
3(3923) parse_headers: this is the second via
3(3923) DEBUG: add_param: tag=b27e1a1d33761e85846fc98f5f3a7e58.8dd9
3(3923) end of header reached, state=29
3(3923) DEBUG: get_hdr_field: <To> [74]; uri=[sip:4169878025@209.250.135.8]
3(3923) DEBUG: to body [<sip:4169878025@209.250.135.8>]
3(3923) get_hdr_field: cseq <CSeq>: <102> <REGISTER>
3(3923) DEBUG: t_reply_matching: hash 46548 label 955429004 branch 0
3(3923) DEBUG: t_reply_matching: reply matched (T=0xf51e20b0)!
3(3923) DEBUG: t_check: msg id=2 global id=2 T end=0xf51e20b0
4(3927) radius_does_uri_exist(): Failure
3(3923) 4(3927) DEBUG: t_addifnew: msg id=1 , globDEBUG: relay_reply:
branch=0, save=0, relay=0
3(3923) old size: 696, new size: 634
3(3923) build_res_from_sip_res: copied size: orig:88, new: 26, rest: 608 msg=
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP 69.196.87.34:5060;branch=z9hG4bK7210a8d8
From: <sip:4169878025@209.250.135.8>;tag=as0854885b
To: <sip:4169878025@209.250.135.8>;tag=b27e1a1d33761e85846fc98f5f3a7e58.8dd9
Call-ID: 02d1489e1d18e2f93d240ea127012cd8(a)192.168.1.1
CSeq: 102 REGISTER
WWW-Authenticate: Digest realm="209.250.135.8",
nonce="4172b0334c46e8aaf44360a02eef199553852c7e"
Server: Sip EXpress router (0.8.14-2 (i386/linux))
Content-Length: 0
Warning: 392 209.250.135.8:5060 "Noisy feedback tells: pid=3927
req_src_ip=209.250.135.8 req_src_port=5060 in_uri=sip:209.250.135.8
out_uri=sip:209.250.135.8 via_cnt==2"
3(3923) WARNING:vqm_resize: resize(0) called
4(3927) DEBUG: RFC3261 transaction matching failed
3(3923) DEBUG: reDEBUG: get_out_socket: socket determined: 1
mem=0xf51e35c0: SIP/2.0 4
3(3923) 4(3927) DEBUG: mk_proxy: doing DNS lookup...
923) DEBUG: add_to_tail_of_timer[2]: 0xf51e20f8
3(3923) DEBUG:destroy_avp_list: destroing list (nil)
4(3927) DEBUG: get_out_socket: socket determined: 1
4(3927) check_via_address(209.250.135.8, 209.250.135.8, 2)
3(3923) SIP Request:
3(3923) method: <REGISTER>
3(3923) uri: <sip:209.250.135.8>
3(3923) version: <SIP/2.0>
3(3923) parse_headers: flags=1
3(3923) Found param type 232, <branch> = <z9hG4bK4d5b.d80b2f83.0>; state=16
3(3923) end of header reached, state=5
3(3923) parse_headers: Via found, flags=1
3(3923) parse_headers: this is the first via
3(3923) After parse_msg...
3(3923) preparing to run routing scripts...
3(3923) DEBUG : is_maxfwd_present: max_forward header already found!
3(3923) DEBUG: is_maxfwd_present: value = 9
3(3923) parse_headers: flags=8
3(3923) Found param type 232, <branch> = <z9hG4bK4d5b.c80b2f83.0>; state=16
3(3923) end of header reached, state=5
3(3923) parse_headers: Via found, flags=8
3(3923) parse_headers: this is the second via
3(3923) Found param type 232, <branch> = <z9hG4bK7210a8d8>; state=16
3(3923) end of header reached, state=5
3(3923) parse_headers: Via found, flags=8
3(3923) DEBUG: add_param: tag=as0854885b
3(3923) end of header reached, state=29
3(3923) query="select domain from domain where domain='209.250.135.8'"
3(3923) is_local(): Realm '209.250.135.8' is local
3(3923) XLOG: xl_print_log: final buffer length 31
3(3923) <REGISTER> == is from local ==
3(3923) parse_headers: flags=64
3(3923) end of header reached, state=9
3(3923) DEBUG: get_hdr_field: <To> [32]; uri=[sip:4169878025@209.250.135.8]
3(3923) DEBUG: to body [<sip:4169878025@209.250.135.8>
]
3(3923) get_hdr_field: cseq <CSeq>: <102> <REGISTER>
3(3923) check_via_address(209.250.135.8, 209.250.135.8, 2)
3(3923) parse_headers: flags=4096
3(3923) DEBUG: get_hdr_body : content_length=0
3(3923) found end of header
3(3923) pre_auth(): Credentials with given realm not found
3(3923) build_auth_hf(): 'WWW-Authenticate: Digest
realm="209.250.135.8",
nonce="4172b0334c46e8aaf44360a02eef199553852c7e"
'
3(3923) parse_headers: flags=-1
3(3923) check_via_address(209.250.135.8, 209.250.135.8, 2)
3(3923) DEBUG: get_out_socket: socket determined: 1
4(3927) SIP Reply (status):
4(3927) version: <SIP/2.0>
4(3927) status: <401>
4(3927) reason: <Unauthorized>
4(3927) parse_headers: flags=1
4(3927) Found param type 232, <br 3(3923) find_first_route(): No Route
headers found
3(3923) loose_route(): There is no Routparse 3(3923) parse_headers: flags=64
3(3923) check_via_address(209.250.135.8, 209.250.1After parse_msg...
4(3927) check_self - checking if host==us: 13==9 && [209.250.135.8]
== [127.0.0.1]
4(3927) check_self - checking if port 5060 matches port 5060
4(3927) check_self - checking if host==us: 13==13 && [209.250.135.8]
== [209.250.135.8]
4(3927) check_self - checking if port 5060 matches port 5060
4(3927) forward_reply: found module tm, passing reply to it
4(3927) DEBUG: t_check: msg id=2 global id=1 T start=0xffffffff
4(3927) parse_headers: flags=17
4(3927) Found param type 232, <branch> = <z9hG4bK4d5b.c80b2f83.0>; state=16
4(3927) end of header reached, state=5
4(3927) parse_headers: Via found, flags=17
4(3927) parse_headers: this is the second via
4(3927) Found param type 232, <branch> = <z9hG4bK7210a8d8>; state=16
4(3927) end of header reached, state=5
4(3927) parse_headers: Via found, flags=17
4(3927) DEBUG: add_param: tag=b27e1a1d33761e85846fc98f5f3a7e58.d295
4(3927) end of heradius_does_uri_exist() 4(3927) DEBUG: geDEBUG:
t_addifnew: msg id=3 , global msg id=2 , T on entranc 4(3927) DEBUG:
to bodparse_headers: flags=-1
3(3923) parse_headers: flags=60
3(3923) t_lookup_request: start searching: hash=46548, isACK=0
: hash 46548 label 955429005 branch 0
4(3927) DEBUG: t_DEBUG: RFC3261 transaction matching failed
3(3923) DEBUG: t_lookup_request: no transaction found
0xf51e3848
4(3927) DEBUG: t_on_reply: org. status uas=0, uac[0]=0 local=0 is_invite=0)
4(3927) ->>>>>>>>> T_code=0, new_code=401
4(3927) 3(3923) DEBUG: get_out_socket: socket determined: 1
3(3923) DEBUG: mkbuild_res_from_sip_res: copied size: orig:88, new:
26, rest: 670 msg=
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP 209.250.135.8;branch=z9hG4bK4d5b.c80b2f83.0
Via: SIP/2.0/UDP 69.196.87.34:5060;branch=z9hG4bK7210a8d8
From: <sip:4169878025@209.250.135.8>;tag=as0854885b
To: <sip:4169878025@209.250.135.8>;tag=b27e1a1d33761e85846fc98f5f3a7e58.d295
Call-ID: 02d1489e1d18e2f93d240ea127012cd8(a)192.168.1.1
CSeq: 102 REGISTER
WWW-Authenticate: Digest realm="209.250.135.8",
nonce="4172b0334c46e8aaf44360a02eef199553852c7e"
Server: Sip EXpress router (0.8.14-2 (i386/linux))
Content-Length: 0
Warning: 392 209.250.135.8:5060 "Noisy feedback tells: pid=3923
req_src_ip=209.250.135.8 req_src_port=5060 in_uri=sip:209.250.135.8
out_uri=sip:209.250.135.8 via_cnt==3"
4(3927) 3(3923) DEBUG: get_out_socket: socket determined: 1
3(3923) check_via_address(209.250.135.8, 209.250.135.8, 2)
shmem=0xf51e6360: SIP/2.0 4
4(3927) DEBUG: cleanup_uacs: RETR/FR timers reset
4(3927) DEBUG: add_to_tail_of_timer[2]: 0xf51e3890
4(3927) DEBUG:destroy_avp_list: destroing list (nil 3
4(3927DEreceive_msg: cleaning up
[0]: 0xf51e4fa4
3(3923) 4(3927) SIP Reply (status):
4(3927) version: <SIP/2.0>
4(3927) status: <401>
3(3923) SIP Request:
3(3923) method: <REGISTER>
4(3927) Found par uri: <sip:209.250.135.8>
3(3923) version: <SIP/2.0>
3(3923) parse_headers: flags=1
3(3923) Found param type 232, <branch> = <z9hG4bK4d5b.e80b2f83.0>; state=16
3(3923) end of header reached, state=5
3(3923) parse_headers: Via found, flags=1
3(3923) parse_headers: this is the first via
3(3923) After parse_msg...
3(3923) preparing to run routing scripts...
3(3923) DEBUG : is_maxfwd_present: max_forward header already found!
3(3923) DEBUG: is_maxfwd_present: value = 8
3(3923) parse_headers: flags=8
4(3927) Found parFound param type 232, <branch> = <z9hG4bK4d5b.d80b2f
4(3927) end of header reend of header r 4(3927) parse_headers:
Vparse_headers: Via 4(3927) parse_ 3(3923) parse_headers: this is the
seconDEBUG: 3(3923) Found param type 232, <branch> =
<z9hG4bK4d5b.c80b2f83end of header 3(3923) end of header reacDEBUG:
get_hd 3(3923) parse_headers: Via found, flags=8
3(3923) Found param type 232, <branch> = <z9hG4bK7210a8d8>; state=16
3(3923) end of header reached, state=5
3(3923) parse_headers: Via found, flags=8
3(3923) DEBUG: add_param: tag=as0854885b
3(3923) end of header reached, state=29
tched (T=0xf51e20b0)!
4(3927) DEBUG: t_check: msg id=3 global id=3 T end=0xf51e20b0
4(3927) DEBUG: t_on_reply: org. status uas=401, uac[0]=401 local=0 is_invite=0)
4(3927) ->>>>>>>>> T_code=401, new_code=401
4(3927) DEBUG: relay_reply: branch=0, save=0, relay=-1
4(3927) DEBUG:destroy_avp_list: destroing list (nil)
4(3927) receive_msg: cleaning up
3(3923) is_local(): Realm '209.250.135.8' is local
3(3923) XLOG: xl_print_log: final buffer length 31
3(3923) <REGISTER> == is from local ==
3(3923) parse_headers: flags=64
3(3923) end of header reached, state=9
3(3923) DEBUG: get_hdr_field: <To> [32]; uri=[sip:4169878025@209.250.135.8]
3(3923) DEBUG: to body [<sip:4169878025@209.250.135.8>
]
3(3923) get_hdr_field: cseq <CSeq>: <102> <REGISTER>
3(3923) check_via_address(209.250.135.8, 209.250.135.8, 2)
3(3923) parse_headers: flags=4096
3(3923) DEBUG: get_hdr_body : content_length=0
3(3923) found end of header
3(3923) pre_auth(): Credentials with given realm not found
3(3923) build_auth_hf(): 'WWW-Authenticate: Digest
realm="209.250.135.8",
nonce="4172b0334c46e8aaf44360a02eef199553852c7e"
'
3(3923) parse_headers: flags=-1
3(3923) check_via_address(209.250.135.8, 209.250.135.8, 2)
3(3923) DEBUG: get_out_socket: socket determined: 1
3(3923) parse_headers: flags=256
3(3923) find_first_route(): No Route headers found
3(3923) loose_route(): There is no Route HF
3(3923) parse_headers: flags=64
3(3923) check_via_address(209.250.135.8, 209.250.135.8, 2)
4(3927) SIP Reply (status):
4(3927) version: <SIP/2.0>