Normally you would use an init.d script, I believe there should be an example in the source tree.
g-)

TZieleniewski wrote:
That's right!!
I didn't do it. Now after I restarted SER it works:)
BTW is there now any tool like previously serctl which can start/restart and stop ser.

Bests
Tomasz

Nils Ohlmeier napisaƂ(a):
After looking at this I'm almost sure it is the 32 vs. 33 flag thing. I guess 
you changed the flag by hand in the DB, right? In this case you would have to 
restart SER or use ser_ctl to reload the domains, because the domain 
attributes are cached in memory.

  Nils

On Wednesday 10 January 2007 13:46, tzieleniewski wrote:
  
Sorry my copy/paste mistake (wrong window)
the actually sent message is printed below:
[I used the latest cvs version from yesterday:)]
I also tried to change the flag in ofthe digest_realm atrribute
like the Samuel said but it didn't help.

SEND >> 127.0.0.1:5060

REGISTER sip:sipproxy.hellboy.touk.pl SIP/2.0

Via: SIP/2.0/UDP
192.168.1.10:7000;rport;branch=z9hG4bK0E4F7962011FAB0614802558EC3111BF

From: tzl <sip:tzl@sipproxy.hellboy.touk.pl>;tag=356809508

To: tzl <sip:tzl@sipproxy.hellboy.touk.pl>

Contact: "tzl" <sip:tzl@192.168.1.10:7000>

Call-ID: 7BD87155EB1AD7E9F60729227BA31D18@sipproxy.hellboy.touk.pl

CSeq: 43133 REGISTER

Expires: 1800

Max-Forwards: 70

User-Agent: X-Lite release 1105d

Content-Length: 0

below is the dump_attrs()output:
 4(3626) INFO: avp.c:540: class=GLOBAL
 4(3626) AVP["lang"]="en"
 4(3626) INFO: avp.c:550: track=FROM class=DOMAIN
 4(3626) AVP["did"]="sipproxy.hellboy.touk.pl"
 4(3626) INFO: avp.c:560: track=TO class=DOMAIN
 4(3626) AVP["did"]="sipproxy.hellboy.touk.pl"
 4(3626) INFO: avp.c:570: track=FROM class=USER
 4(3626) INFO: No AVP present
 4(3626) INFO: avp.c:580: track=TO class=USER
 4(3626) INFO: No AVP present
 4(3626) INFO: avp.c:590: track=FROM class=URI
 4(3626) INFO: No AVP present
 4(3626) INFO: avp.c:600: track=TO class=URI
 4(3626) INFO: No AVP present
 4(3626) ERROR: authorize.c:359: Cannot obtain digest realm from parameter
'$fd.digest_realm'

Tomasz

    
To me the problem is very obvious ;-) :

You have defined a domain called "sipproxy.hellboy.touk.pl". But in the
REGISTER requests the To header contains "scscf.ims.touk.pl". So SER is
not able to identify the target domain, and thus can not load the domain
attributes. So their is no domain AVP digest_realm when www_authenticate
is called.
What I dont get is why you do not receive the 403 from the check before.
Could you do me a favor and change your config like this:
    if (method=="REGISTER") {
       dump_attrs();
       if (!$t.did) {
And send me the log output after another try. That would be a big help.

Thanks
  Nils

On Tuesday 09 January 2007 12:03, tzieleniewski wrote:
      
HI All!

I have encountered the following error and don't know waht to do with
it:) ERROR: authorize.c:359: Cannot obtain digest realm from parameter
'$fd.digest_realm' the situation takes places when the following sip
massage arives at ser: #
U 2007/01/09 11:43:02.274949 127.0.0.1:7000 -> 127.0.0.1:5060
REGISTER sip:scscf.ims.touk.pl SIP/2.0.
Via: SIP/2.0/UDP
127.0.0.1:7000;rport;branch=z9hG4bK2575034C94BE793615C5BEE814464E5B.
From: tzl <sip:tzl@scscf.ims.touk.pl>;tag=1829574745.
To: tzl <sip:tzl@scscf.ims.touk.pl>.
Contact: "tzl" <sip:tzl@127.0.0.1:7000>.
Call-ID: 3E67EAEFDC8BFC73844E4D0F849DF676@scscf.ims.touk.pl.
CSeq: 38402 REGISTER.
Expires: 1800.
Max-Forwards: 70.
User-Agent: X-Lite release 1105d.
Content-Length: 0.
.

My Register logic looks like this:
route[REGISTER]
{
   if (method=="REGISTER") {
      if (!$t.did) {
         sl_send_reply("403", "Register forwarding forbidden");
         drop;
      }
      if (!www_authenticate("$fd.digest_realm", "credentials")) {
         if ($? == -2) {
            sl_send_reply("500", "Internal Server Error");
         } else if ($? == -3) {
            sl_send_reply("400", "Bad Request");
         } else {
            if ($digest_challenge) {
               append_to_reply("%$digest_challenge");
            }
            sl_send_reply("401", "Unauthorized");
         }
         drop;
      };
}

and here are my database contensts:
mysql> select * from uri;
+------------------------------+--------------------------+----------+-
---- --+--------+

| uid                          | did                      | username |
| flags | scheme |

+------------------------------+--------------------------+----------+-
---- --+--------+

| tzl@sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | tzl      |
| 61 | sip    |

+------------------------------+--------------------------+----------+-
---- --+--------+

mysql> select * from domain;
+--------------------------+--------------------------+-------+

| did                      | domain                   | flags |

+--------------------------+--------------------------+-------+

| sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl |    37 |

+--------------------------+--------------------------+-------+

mysql> select * from domain_attrs;
+--------------------------+--------------+------+---------------------
---- -+-------+

| did                      | name         | type | value
|
| | flags |

+--------------------------+--------------+------+---------------------
---- -+-------+

| sipproxy.hellboy.touk.pl | sw_admin     |    2 | 0
|
| |    32 | sipproxy.hellboy.touk.pl | digest_realm |    2 |
|
| sipproxy.hellboy.touk.pl |    32 |

+--------------------------+--------------+------+---------------------
---- -+-------+

mysql> select * from credentials;
+---------------+--------------------------+--------------------------+
----
------+-------+----------------------------------+---------------------
----- --------+------------------------------+

| auth_username | did                      | realm                    |
| password | flags | ha1                              | ha1b
|
|              | uid                          |

+---------------+--------------------------+--------------------------+
----
------+-------+----------------------------------+---------------------
----- --------+------------------------------+

| tzl           | sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl |
| tzl
|
|      |    33 | df4a49c51b082f68b792d7e2177c6ed8 |
|
| 8ba18e21048f2f587ad3386b54b99e5e | tzl@sipproxy.hellboy.touk.pl |
| admin
|
|       | sipproxy.hellboy.touk.pl | sipproxy.hellboy.touk.pl | heslo  
|       |  |
|
|   32 |                                  |
|
|  | 0                            |

+---------------+--------------------------+--------------------------+
----
------+-------+----------------------------------+---------------------
----- --------+------------------------------+
        


  


_______________________________________________ Serusers mailing list Serusers@lists.iptel.org http://lists.iptel.org/mailman/listinfo/serusers