Did you find out? I cannot really see anything that could cause this.
g-)
tzieleniewski wrote:
HI All!
I have encountered the following error and don't know waht to do with it:)
ERROR: authorize.c:359: Cannot obtain digest realm from parameter
'$fd.digest_realm' the situation takes places when the following sip massage
arives at ser:
#
U 2007/01/09 11:43:02.274949 127.0.0.1:7000 -> 127.0.0.1:5060
REGISTER sip:scscf.ims.touk.pl SIP/2.0.
Via: SIP/2.0/UDP 127.0.0.1:7000;rport;branch=z9hG4bK2575034C94BE793615C5BEE814464E5B.
From: tzl <sip:tzl@scscf.ims.touk.pl>;tag=1829574745.
To: tzl <sip:tzl@scscf.ims.touk.pl>.
Contact: "tzl" <sip:tzl@127.0.0.1:7000>.
Call-ID: 3E67EAEFDC8BFC73844E4D0F849DF676(a)scscf.ims.touk.pl.
CSeq: 38402 REGISTER.
Expires: 1800.
Max-Forwards: 70.
User-Agent: X-Lite release 1105d.
Content-Length: 0.
.
My Register logic looks like this:
route[REGISTER]
{
if (method=="REGISTER") {
if (!$t.did) {
sl_send_reply("403", "Register forwarding forbidden");
drop;
}
if (!www_authenticate("$fd.digest_realm", "credentials")) {
if ($? == -2) {
sl_send_reply("500", "Internal Server Error");
} else if ($? == -3) {
sl_send_reply("400", "Bad Request");
} else {
if ($digest_challenge) {
append_to_reply("%$digest_challenge");
}
sl_send_reply("401", "Unauthorized");
}
drop;
};
}
and here are my database contensts:
mysql> select * from uri;
+------------------------------+--------------------------+----------+-------+--------+
| uid | did | username | flags | scheme |
+------------------------------+--------------------------+----------+-------+--------+
| tzl(a)sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | tzl | 61 | sip |
+------------------------------+--------------------------+----------+-------+--------+
mysql> select * from domain;
+--------------------------+--------------------------+-------+
| did | domain | flags |
+--------------------------+--------------------------+-------+
| sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | 37 |
+--------------------------+--------------------------+-------+
mysql> select * from domain_attrs;
+--------------------------+--------------+------+--------------------------+-------+
| did | name | type | value | flags |
+--------------------------+--------------+------+--------------------------+-------+
| sipproxy.hellboy.touk.pl | sw_admin | 2 | 0 | 32 |
| sipproxy.hellboy.touk.pl | digest_realm | 2 | sipproxy.hellboy.touk.pl | 32 |
+--------------------------+--------------+------+--------------------------+-------+
mysql> select * from credentials;
+---------------+--------------------------+--------------------------+----------+-------+----------------------------------+----------------------------------+------------------------------+
| auth_username | did | realm | password | flags
| ha1 | ha1b | uid
|
+---------------+--------------------------+--------------------------+----------+-------+----------------------------------+----------------------------------+------------------------------+
| tzl | sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | tzl | 33
| df4a49c51b082f68b792d7e2177c6ed8 | 8ba18e21048f2f587ad3386b54b99e5e |
tzl(a)sipproxy.hellboy.touk.pl |
| admin | sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | heslo | 32
| | | 0
|
+---------------+--------------------------+--------------------------+----------+-------+----------------------------------+----------------------------------+------------------------------+
Thanku for any help
Bests
Tomasz
_______________________________________________
Serusers mailing list
Serusers(a)lists.iptel.org
http://lists.iptel.org/mailman/listinfo/serusers