Did you find out? I cannot really see anything that could cause this. g-)
tzieleniewski wrote:
HI All!
I have encountered the following error and don't know waht to do with it:) ERROR: authorize.c:359: Cannot obtain digest realm from parameter '$fd.digest_realm' the situation takes places when the following sip massage arives at ser: # U 2007/01/09 11:43:02.274949 127.0.0.1:7000 -> 127.0.0.1:5060 REGISTER sip:scscf.ims.touk.pl SIP/2.0. Via: SIP/2.0/UDP 127.0.0.1:7000;rport;branch=z9hG4bK2575034C94BE793615C5BEE814464E5B. From: tzl sip:tzl@scscf.ims.touk.pl;tag=1829574745. To: tzl sip:tzl@scscf.ims.touk.pl. Contact: "tzl" sip:tzl@127.0.0.1:7000. Call-ID: 3E67EAEFDC8BFC73844E4D0F849DF676@scscf.ims.touk.pl. CSeq: 38402 REGISTER. Expires: 1800. Max-Forwards: 70. User-Agent: X-Lite release 1105d. Content-Length: 0. .
My Register logic looks like this: route[REGISTER] { if (method=="REGISTER") { if (!$t.did) { sl_send_reply("403", "Register forwarding forbidden"); drop; } if (!www_authenticate("$fd.digest_realm", "credentials")) { if ($? == -2) { sl_send_reply("500", "Internal Server Error"); } else if ($? == -3) { sl_send_reply("400", "Bad Request"); } else { if ($digest_challenge) { append_to_reply("%$digest_challenge"); } sl_send_reply("401", "Unauthorized"); } drop; }; }
and here are my database contensts: mysql> select * from uri; +------------------------------+--------------------------+----------+-------+--------+ | uid | did | username | flags | scheme | +------------------------------+--------------------------+----------+-------+--------+ | tzl@sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | tzl | 61 | sip | +------------------------------+--------------------------+----------+-------+--------+
mysql> select * from domain; +--------------------------+--------------------------+-------+ | did | domain | flags | +--------------------------+--------------------------+-------+ | sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | 37 | +--------------------------+--------------------------+-------+
mysql> select * from domain_attrs; +--------------------------+--------------+------+--------------------------+-------+ | did | name | type | value | flags | +--------------------------+--------------+------+--------------------------+-------+ | sipproxy.hellboy.touk.pl | sw_admin | 2 | 0 | 32 | | sipproxy.hellboy.touk.pl | digest_realm | 2 | sipproxy.hellboy.touk.pl | 32 | +--------------------------+--------------+------+--------------------------+-------+
mysql> select * from credentials; +---------------+--------------------------+--------------------------+----------+-------+----------------------------------+----------------------------------+------------------------------+ | auth_username | did | realm | password | flags | ha1 | ha1b | uid | +---------------+--------------------------+--------------------------+----------+-------+----------------------------------+----------------------------------+------------------------------+ | tzl | sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | tzl | 33 | df4a49c51b082f68b792d7e2177c6ed8 | 8ba18e21048f2f587ad3386b54b99e5e | tzl@sipproxy.hellboy.touk.pl | | admin | sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | heslo | 32 | | | 0 | +---------------+--------------------------+--------------------------+----------+-------+----------------------------------+----------------------------------+------------------------------+
Thanku for any help Bests Tomasz
Serusers mailing list Serusers@lists.iptel.org http://lists.iptel.org/mailman/listinfo/serusers