Hey Ovidiu, do you have a working config, I'm pretty new to openSER?
The one I'm using at the moment is attached,
Thanks in advance,
-Axel
Ovidiu Sas wrote:
Hi Axel,
For each INVITE (not reINVITE) you will need to set the flag specified via the params. Like this, you will have a dialog per call. Then you can use your logic to restrict the number of concurrent calls.
Regards, Ovidiu Sas
On 6/6/07, Axel Dahl junk@alf2.com wrote:
Has anyone managed to restrict the number of concurrent calls on an openser box?
I'm using openser 1.1.1 and found on the web that this was needed.
I've included the dialog.so and avpops.so modules.
if ( avp_check("$DLG_count", "gt/i:10") ) { sl_send_reply("403","no more calls accepted"); exit; } I'm not sure if I've configured the dialog.so module correctly, the documentation tells you what each function does, but not what the parameters mean (for example the documentation says dlg_flg default value is "none" and they give an example of it set to 4 - but what do these values mean?)
Has anyone got this working or does anyone know how I should be configuring the dialog.so module?
Thanks,
-Axel _______________________________________________ Users mailing list Users@openser.org http://openser.org/cgi-bin/mailman/listinfo/users
# # $Id: openser.cfg,v 1.6 2006/02/15 18:23:46 bogdan_iancu Exp $ # # simple quick-start config script #
alias="xxxsrv2.xxx.somedomain.int:5060"
# ----------- global configuration parameters ------------------------
debug=0 fork=yes log_stderror=no # (cmd line: -E)
# Uncomment these lines to enter debugging mode #fork=no log_stderror=yes
check_via=no # (cmd. line: -v) dns=no # (cmd. line: -r) rev_dns=no # (cmd. line: -R) port=5060 children=4 fifo="/tmp/openser_fifo"
# # uncomment the following lines for TLS support #disable_tls = 0 #listen = tls:your_IP:5061 #tls_verify = 1 #tls_require_certificate = 0 #tls_method = TLSv1 #tls_certificate = "/tmp/openser-1.1.0-tls/debian/openser/etc/openser/tls/user/user-cert.pem" #tls_private_key = "/tmp/openser-1.1.0-tls/debian/openser/etc/openser/tls/user/user-privkey.pem" #tls_ca_list = "/tmp/openser-1.1.0-tls/debian/openser/etc/openser/tls/user/user-calist.pem"
# ------------------ module loading ----------------------------------
# Uncomment this if you want to use SQL database #loadmodule "/usr/lib/openser/modules/mysql.so"
loadmodule "/usr/lib/openser/modules/sl.so" loadmodule "/usr/lib/openser/modules/tm.so" loadmodule "/usr/lib/openser/modules/rr.so" loadmodule "/usr/lib/openser/modules/maxfwd.so" loadmodule "/usr/lib/openser/modules/usrloc.so" loadmodule "/usr/lib/openser/modules/registrar.so" loadmodule "/usr/lib/openser/modules/textops.so" loadmodule "/usr/lib/openser/modules/avpops.so" loadmodule "/usr/lib/openser/modules/dialog.so"
# Uncomment this if you want digest authentication # mysql.so must be loaded ! #loadmodule "/usr/lib/openser/modules/auth.so" #loadmodule "/usr/lib/openser/modules/auth_db.so"
# ----------------- setting module-specific parameters ---------------
# -- usrloc params --
#modparam("usrloc", "db_mode", 0)
# Uncomment this if you want to use SQL database # for persistent storage and comment the previous line #modparam("usrloc", "db_mode", 2)
# -- auth params -- # Uncomment if you are using auth module # #modparam("auth_db", "calculate_ha1", yes) # # If you set "calculate_ha1" parameter to yes (which true in this config), # uncomment also the following parameter) # #modparam("auth_db", "password_column", "password")
# -- rr params -- # add value to ;lr param to make some broken UAs happy modparam("rr", "enable_full_lr", 1)
# -- dialog params -- modparam("dialog", "enable_stats", 1) modparam("dialog", "dlg_flag", 4)
# ------------------------- request routing logic -------------------
# main routing logic
route{
# initial sanity checks -- messages with # max_forwards==0, or excessively long requests if (!mf_process_maxfwd_header("10")) { sl_send_reply("483","Too Many Hops"); exit; };
if (msg:len >= 5000 ) { sl_send_reply("513", "Message too big"); exit; };
# limit number of active concurrent dialogs if ( avp_check("$dlg_count", "gt/i:0") ) { sl_send_reply("403","No more calls accepted!"); exit; }
# we record-route all messages -- to make sure that # subsequent messages will go through our proxy; that's # particularly good if upstream and downstream entities # use different transport protocol if (!method=="REGISTER") record_route();
# subsequent messages withing a dialog should take the # path determined by record-routing if (loose_route()) { # mark routing logic in request append_hf("P-hint: rr-enforced\r\n"); route(1); };
if (!uri==myself) { # mark routing logic in request append_hf("P-hint: outbound\r\n"); # if you have some interdomain connections via TLS #if(uri=~"@tls_domain1.net") { # t_relay("tls:domain1.net"); # exit; #} else if(uri=~"@tls_domain2.net") { # t_relay("tls:domain2.net"); # exit; #}
route(1); };
# if the request is for other domain use UsrLoc # (in case, it does not work, use the following command # with proper names and addresses in it) if (uri==myself) {
if (method=="REGISTER") {
# Uncomment this if you want to use digest authentication #if (!www_authorize("openser.org", "subscriber")) { # www_challenge("openser.org", "0"); # exit; #};
save("location"); exit; };
lookup("aliases"); if (!uri==myself) { append_hf("P-hint: outbound alias\r\n"); route(1); };
# native SIP destinations are handled using our USRLOC DB if (!lookup("location")) { sl_send_reply("404", "Not Found"); exit; }; append_hf("P-hint: usrloc applied\r\n"); };
route(1); }
route[1] { # send it out now; use stateful forwarding as it works reliably # even for UDP2TCP if (!t_relay()) { sl_reply_error(); }; exit; }