I guess the mailformed packets are the NAT-pings (keep alive messages).
These messages are correct, but ethereal does not recognize it.
klaus
varala ramakanth wrote:
hello friends,
iam having the rel_0_8_12 running
when i am registering with windows messenger from a
nat client
its ethereal report show that malformed sip packet
so whats the problem?
ser( 202.*.*.19)-->dhcp nat(202.*.*.252)-->private
ip(192.168.1.18)msn messenger 4.7
please guide me
with reagards
rama kanth
this is the log message iam getting when debug =8
***************************************************
6(3777) SIP Request:
6(3777) method: <REGISTER>
6(3777) uri: <sip:server.pol.net.in>
6(3777) version: <SIP/2.0>
6(3777) parse_headers: flags=1
6(3777) end of header reached, state=5
6(3777) parse_headers: Via found, flags=1
6(3777) parse_headers: this is the first via
6(3777) After parse_msg...
6(3777) preparing to run routing scripts...
6(3777) DEBUG : is_maxfwd_present: searching for
max_forwards header
6(3777) parse_headers: flags=128
6(3777) DEBUG: is_maxfwd_present: value = 70
6(3777) check_via_address(202.*.*.252, 192.168.1.18,
0)
6(3777) LOG: Someone trying to register from private
IP, rewriting
6(3777) parse_headers: flags=64
6(3777) end of header reached, state=9
6(3777) DEBUG: get_hdr_field: <To> [29];
uri=[sip:102@server.pol.net.in]
6(3777) DEBUG: to body [<sip:102@server.pol.net.in>
]
6(3777) get_hdr_field: cseq <CSeq>: <2> <REGISTER>
6(3777) parse_headers: flags=256
6(3777) DEBUG: get_hdr_body : content_length=0
6(3777) found end of header
6(3777) find_first_route(): No Route headers found
6(3777) loose_route(): There is no Route HF
6(3777) check_self - checking if host==us: 17==9 &&
[server.pol.net.in] == [127.0.0.1]
6(3777) check_self - checking if port 5060 matches
port 5060
6(3777) check_self - checking if host==us: 17==13 &&
[server.pol.net.in] == [202.*.*.19]
6(3777) check_self - checking if port 5060 matches
port 5060
6(3777) check_self - checking if host==us: 17==9 &&
[server.pol.net.in] == [127.0.0.1]
6(3777) check_self - checking if port 5060 matches
port 5060
6(3777) check_self - checking if host==us: 17==13 &&
[server.pol.net.in] == [202.*.*.19]
6(3777) check_self - checking if port 5060 matches
port 5060
6(3777) parse_headers: flags=-1
6(3777) parse_headers: flags=-1
6(3777) check_via_address(202.*.*.252, 192.168.1.18,
0)
6(3777) receive_msg: cleaning up
*************************************************
the ethereal report is
*************************************************
Frame 1 (544 bytes on wire, 544 bytes captured)
Arrival Time: May 29, 2004 18:00:28.644433000
Time delta from previous packet: 0.000000000
seconds
Time relative to first packet: 0.000000000 seconds
Frame Number: 1
Packet Length: 544 bytes
Capture Length: 544 bytes
Ethernet II, Src: 00:e0:2b:90:1f:00, Dst:
00:e0:18:ed:04:61
Destination: 00:e0:18:ed:04:61 (Asustek__ed:04:61)
Source: 00:e0:2b:90:1f:00 (Extreme__90:1f:00)
Type: IP (0x0800)
Internet Protocol, Src Addr: 202.65.148.252
(202.65.148.252), Dst Addr: 202.65.128.19
(202.65.128.19)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00:
Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint:
Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 530
Identification: 0xcc8e
Flags: 0x00
.0.. = Don't fragment: Not set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 125
Protocol: UDP (0x11)
Header checksum: 0xc5b9 (correct)
Source: 202.*.*.252 (202.*.*.252)
Destination: 202.*.*.19 (202.*.*.19)
User Datagram Protocol, Src Port: 61863 (61863), Dst
Port: 5060 (5060)
Source port: 61863 (61863)
Destination port: 5060 (5060)
Length: 510
Checksum: 0xde85 (correct)
Session Initiation Protocol
Request line: REGISTER sip:server.pol.net.in
SIP/2.0
Message Header
Via: SIP/2.0/UDP 192.168.1.18:15992
Max-Forwards: 70
From:
<sip:102@server.pol.net.in>;tag=ddb4f954b19811d8aafe00e01846e257;epid=b28b013e73
To: <sip:102@server.pol.net.in>
Call-ID:
ddb4f955b19811d8aafe00e01846e257(a)192.168.1.18
CSeq: 1 REGISTER
Contact:
<sip:192.168.1.18:15992>;methods="INVITE, MESSAGE,
INFO, SUBSCRIBE, OPTIONS, BYE, CANCEL, NOTIFY, ACK,
REFER"
User-Agent: RTC/1.2.4949
Event: registration
Allow-Events: presence
Content-Length: 0
Frame 2 (687 bytes on wire, 687 bytes captured)
Arrival Time: May 29, 2004 18:00:28.645466000
Time delta from previous packet: 0.001033000
seconds
Time relative to first packet: 0.001033000 seconds
Frame Number: 2
Packet Length: 687 bytes
Capture Length: 687 bytes
Ethernet II, Src: 00:e0:18:ed:04:61, Dst:
00:e0:2b:90:1f:00
Destination: 00:e0:2b:90:1f:00 (Extreme__90:1f:00)
Source: 00:e0:18:ed:04:61 (Asustek__ed:04:61)
Type: IP (0x0800)
Internet Protocol, Src Addr: 202.*.*.19 (202.*.*.19),
Dst Addr: 202.*.*.252 (202.*.*.252)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x10 (DSCP 0x04:
Unknown DSCP; ECN: 0x00)
0001 00.. = Differentiated Services Codepoint:
Unknown (0x04)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 673
Identification: 0x0000
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x8ea9 (correct)
Source: 202.*.*.19 (202.*.*.19)
Destination: 202.*.*.252 (202.*.*.252)
User Datagram Protocol, Src Port: 5060 (5060), Dst
Port: 61863 (61863)
Source port: 5060 (5060)
Destination port: 61863 (61863)
Length: 653
Checksum: 0x7bd2 (correct)
Session Initiation Protocol
Status line: SIP/2.0 200 OK
Message Header
Via: SIP/2.0/UDP
192.168.1.18:15992;rport=61863;received=202.65.148.252
From:
<sip:102@server.pol.net.in>;tag=ddb4f954b19811d8aafe00e01846e257;epid=b28b013e73
To:
<sip:102@server.pol.net.in>;tag=b27e1a1d33761e85846fc98f5f3a7e58.7f7e
Call-ID:
ddb4f955b19811d8aafe00e01846e257(a)192.168.1.18
CSeq: 1 REGISTER
Contact:
<sip:202.*.*.252:61863>;q=0.00;expires=3600
Server: Sip EXpress router (0.8.12-tcp_nonb
(i386/linux))
Content-Length: 0
Warning: 392 202.*.*.19:5060 "Noisy feedback
tells: pid=3779 req_src_ip=202.*.*.252
req_src_port=61863 in_uri=sip:server.pol.net.in
out_uri=sip:server.pol.net.in via_cnt==1"
Frame 3 (46 bytes on wire, 46 bytes captured)
Arrival Time: May 29, 2004 18:00:54.592260000
Time delta from previous packet: 25.946794000
seconds
Time relative to first packet: 25.947827000
seconds
Frame Number: 3
Packet Length: 46 bytes
Capture Length: 46 bytes
Ethernet II, Src: 00:e0:18:ed:04:61, Dst:
00:e0:2b:90:1f:00
Destination: 00:e0:2b:90:1f:00 (Extreme__90:1f:00)
Source: 00:e0:18:ed:04:61 (Asustek__ed:04:61)
Type: IP (0x0800)
Internet Protocol, Src Addr: 202.*.*.19 (202.*.*.19),
Dst Addr: 202.*.*.252 (202.*.*.252)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x10 (DSCP 0x04:
Unknown DSCP; ECN: 0x00)
0001 00.. = Differentiated Services Codepoint:
Unknown (0x04)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 32
Identification: 0x0000
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x912a (correct)
Source: 202.*.*.19 (202.*.*.19)
Destination: 202.*.*.252 (202.*.*.252)
User Datagram Protocol, Src Port: 5060 (5060), Dst
Port: 61863 (61863)
Source port: 5060 (5060)
Destination port: 61863 (61863)
Length: 12
Checksum: 0x50d7 (correct)
[Malformed Packet: SIP]
**********************************************
__________________________________
Do you Yahoo!?
Friends. Fun. Try the all-new Yahoo! Messenger.
http://messenger.yahoo.com/
_______________________________________________
Serusers mailing list
serusers(a)lists.iptel.org
http://lists.iptel.org/mailman/listinfo/serusers