To me the problem is very obvious ;-) :
You have defined a domain called "sipproxy.hellboy.touk.pl". But in the
REGISTER requests the To header contains "scscf.ims.touk.pl". So SER is
not able to identify the target domain, and thus can not load the domain
attributes. So their is no domain AVP digest_realm when www_authenticate
is called.
What I dont get is why you do not receive the 403 from the check before.
Could you do me a favor and change your config like this:
if (method=="REGISTER") {
dump_attrs();
if (!$t.did) {
And send me the log output after another try. That would be a big help.
Thanks
Nils
On Tuesday 09 January 2007 12:03, tzieleniewski wrote:
HI All!
I have encountered the following error and don't know waht to do with
it:) ERROR: authorize.c:359: Cannot obtain digest realm from parameter
'$fd.digest_realm' the situation takes places when the following sip
massage arives at ser: #
U 2007/01/09 11:43:02.274949 127.0.0.1:7000 -> 127.0.0.1:5060
REGISTER sip:scscf.ims.touk.pl SIP/2.0.
Via: SIP/2.0/UDP
127.0.0.1:7000;rport;branch=z9hG4bK2575034C94BE793615C5BEE814464E5B.
From: tzl <sip:tzl@scscf.ims.touk.pl>;tag=1829574745.
To: tzl <sip:tzl@scscf.ims.touk.pl>.
Contact: "tzl" <sip:tzl@127.0.0.1:7000>.
Call-ID: 3E67EAEFDC8BFC73844E4D0F849DF676@scscf.ims.touk.pl.
CSeq: 38402 REGISTER.
Expires: 1800.
Max-Forwards: 70.
User-Agent: X-Lite release 1105d.
Content-Length: 0.
.
My Register logic looks like this:
route[REGISTER]
{
if (method=="REGISTER") {
if (!$t.did) {
sl_send_reply("403", "Register forwarding forbidden");
drop;
}
if (!www_authenticate("$fd.digest_realm", "credentials")) {
if ($? == -2) {
sl_send_reply("500", "Internal Server Error");
} else if ($? == -3) {
sl_send_reply("400", "Bad Request");
} else {
if ($digest_challenge) {
append_to_reply("%$digest_challenge");
}
sl_send_reply("401", "Unauthorized");
}
drop;
};
}
and here are my database contensts:
mysql> select * from uri;
+------------------------------+--------------------------+----------+-
---- --+--------+
| uid | did | username |
| flags | scheme |
+------------------------------+--------------------------+----------+-
---- --+--------+
| tzl@sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | tzl |
| 61 | sip |
+------------------------------+--------------------------+----------+-
---- --+--------+
mysql> select * from domain;
+--------------------------+--------------------------+-------+
| did | domain | flags |
+--------------------------+--------------------------+-------+
| sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | 37 |
+--------------------------+--------------------------+-------+
mysql> select * from domain_attrs;
+--------------------------+--------------+------+---------------------
---- -+-------+
| did | name | type | value
|
| | flags |
+--------------------------+--------------+------+---------------------
---- -+-------+
| sipproxy.hellboy.touk.pl | sw_admin | 2 | 0
|
| | 32 | sipproxy.hellboy.touk.pl | digest_realm | 2 |
|
| sipproxy.hellboy.touk.pl | 32 |
+--------------------------+--------------+------+---------------------
---- -+-------+
mysql> select * from credentials;
+---------------+--------------------------+--------------------------+
----
------+-------+----------------------------------+---------------------
----- --------+------------------------------+
| auth_username | did | realm |
| password | flags | ha1 | ha1b
|
| | uid |
+---------------+--------------------------+--------------------------+
----
------+-------+----------------------------------+---------------------
----- --------+------------------------------+
| tzl | sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl |
| tzl
|
| | 33 | df4a49c51b082f68b792d7e2177c6ed8 |
|
| 8ba18e21048f2f587ad3386b54b99e5e | tzl@sipproxy.hellboy.touk.pl |
| admin
|
| | sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | heslo
| | |
|
| 32 | |
|
| | 0 |
+---------------+--------------------------+--------------------------+
----
------+-------+----------------------------------+---------------------
----- --------+------------------------------+