")
I
have been stuck with this for days already and I truely hope someone
can tell me what could be wrong with my setup. I am pretty much in a
stage of desperation right now. Thanks in advance for all your help.
Here are the relevant lines in openser.cfg:
#if (!radius_proxy_authorize("
192.168.1.104")) {
if (!proxy_authorize("
192.168.1.104","subscriber")) {
www_challenge("
192.168.1.104","1");
exit;
}
Here is the openser debug log, I have highlighted the part that proxy_authorize throws error:
Jun 1 05:37:16 [29028] DBG:core:parse_msg: SIP Request:
Jun 1 05:37:16 [29028] DBG:core:parse_msg: method: <INVITE>
Jun 1 05:37:16 [29028] DBG:core:parse_msg: uri: <
sip:1006@192.168.1.104>
Jun 1 05:37:16 [29028] DBG:core:parse_msg: version: <SIP/2.0>
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=2
Jun 1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232, <branch> = <z9hG4bK-f072f593>; state=16
Jun 1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5
Jun 1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2
Jun 1 05:37:16 [29028] DBG:core:parse_headers: this is the first via
Jun 1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg...
Jun 1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing scripts...
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=8
Jun 1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=10
Jun 1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={
sip:1006@192.168.1.104}
Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [33]; uri=[
sip:1006@192.168.1.104]
Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" <
sip:1006@192.168.1.104>
]
Jun 1 05:37:16 [29028] DBG:core:pv_get_to_attr: no To tag
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff
Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: cseq <CSeq>: <101> <INVITE>
Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: content_length=393
Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: found end of header
Jun 1 05:37:16 [29028] DBG:core:parse_to_param: tag=39a9124ca59076d9o0
Jun 1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29
Jun 1 05:37:16 [29028] DBG:core:parse_to: display={"1005"}, ruri={
sip:1005@192.168.1.104}
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=14000
Jun 1 05:37:16 [29028] DBG:core:pv_get_authattr: no [Proxy-]Authorization header
Sun Jun 1 05:37:16 2008-192.168.1.101::method <INVITE> r-uri <
sip:1006@192.168.1.104> to-tag <<null>> 2nd via <<null>> to-header <
sip:1006@192.168.1.104> from-header <
sip:1005@192.168.1.104> auth-user <<null>>
Jun 1 05:37:16 [29028] DBG:maxfwd:is_maxfwd_present: value = 70
Jun 1 05:37:16 [29028] DBG:core:check_via_address: params
192.168.1.101,
192.168.1.101, 0
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=80
before fix nated contact
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=80
Jun 1 05:37:16 [29028] DBG:uri:has_totag: no totag
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=78
Jun 1 05:37:16 [29028] DBG:tm:t_lookup_request: start searching: hash=59293, isACK=0
Jun 1 05:37:16 [29028] DBG:tm:matching_3261: RFC3261 transaction matching failed
Jun 1 05:37:16 [29028] DBG:tm:t_lookup_request: no transaction found
Jun 1 05:37:16 [29028] DBG:domain:is_domain_local: Realm '
192.168.1.104' is local
Jun 1 05:37:16 [29028] DBG:core:db_free_rows: freeing 1 rows
Jun 1 05:37:16 [29028] DBG:core:db_free_rows: row[0]=0x81a1c28
Jun 1 05:37:16 [29028] DBG:core:db_free_rows: 0x81a1c28=pkg_free() RES_ROWS
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=10000
Jun 1 05:37:16 [29028] DBG:auth:pre_auth: credentials with given realm not foundJun 1 05:37:16 [29028] DBG:auth:build_auth_hf: 'WWW-Authenticate: Digest realm="
192.168.1.104", nonce="4841c6380fa8573a4e9794b1a0a2df9f3e53cb49", qop="auth"
'
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff
Jun 1 05:37:16 [29028] DBG:core:check_via_address: params
192.168.1.101,
192.168.1.101, 0
Jun 1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list 0xb5bf9be0
Jun 1 05:37:16 [29028] DBG:core:receive_msg: cleaning up
Jun 1 05:37:16 [29028] DBG:core:parse_msg: SIP Request:
Jun 1 05:37:16 [29028] DBG:core:parse_msg: method: <ACK>
Jun 1 05:37:16 [29028] DBG:core:parse_msg: uri: <
sip:1006@192.168.1.104>
Jun 1 05:37:16 [29028] DBG:core:parse_msg: version: <SIP/2.0>
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=2
Jun 1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232, <branch> = <z9hG4bK-f072f593>; state=16
Jun 1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5
Jun 1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2
Jun 1 05:37:16 [29028] DBG:core:parse_headers: this is the first via
Jun 1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg...
Jun 1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing scripts...
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=8
Jun 1 05:37:16 [29028] DBG:core:parse_to_param: tag=026ab2c49274b4e0186dd72188f7d50a.939a
Jun 1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29
Jun 1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={
sip:1006@192.168.1.104}
Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [75]; uri=[
sip:1006@192.168.1.104]
Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" <
sip:1006@192.168.1.104>]
Jun 1 05:37:16 [29028] DBG:sl:sl_filter_ACK: local ACK found -> dropping it!
Jun 1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list (nil)
Jun 1 05:37:16 [29028] DBG:core:receive_msg: cleaning up
Jun 1 05:37:16 [29028] DBG:core:parse_msg: SIP Request:
Jun 1 05:37:16 [29028] DBG:core:parse_msg: method: <INVITE>
Jun 1 05:37:16 [29028] DBG:core:parse_msg: uri: <
sip:1006@192.168.1.104>
Jun 1 05:37:16 [29028] DBG:core:parse_msg: version: <SIP/2.0>
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=2
Jun 1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232, <branch> = <z9hG4bK-dc12d56c>; state=16
Jun 1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5
Jun 1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2
Jun 1 05:37:16 [29028] DBG:core:parse_headers: this is the first via
Jun 1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg...
Jun 1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing scripts...
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=8
Jun 1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=10
Jun 1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={
sip:1006@192.168.1.104}
Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [33]; uri=[
sip:1006@192.168.1.104]
Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" <
sip:1006@192.168.1.104>
]
Jun 1 05:37:16 [29028] DBG:core:pv_get_to_attr: no To tag
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff
Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: cseq <CSeq>: <102> <INVITE>
Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: content_length=393
Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: found end of header
Jun 1 05:37:16 [29028] DBG:core:parse_to_param: tag=39a9124ca59076d9o0
Jun 1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29
Jun 1 05:37:16 [29028] DBG:core:parse_to: display={"1005"}, ruri={
sip:1005@192.168.1.104}
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=14000
Sun Jun 1 05:37:16 2008-192.168.1.101::method <INVITE> r-uri <
sip:1006@192.168.1.104> to-tag <<null>> 2nd via <<null>> to-header <
sip:1006@192.168.1.104> from-header <
sip:1005@192.168.1.104> auth-user <1005>
Jun 1 05:37:16 [29028] DBG:maxfwd:is_maxfwd_present: value = 70
Jun 1 05:37:16 [29028] DBG:core:check_via_address: params
192.168.1.101,
192.168.1.101, 0
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=80
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=80
Jun 1 05:37:16 [29028] DBG:uri:has_totag: no totag
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=78
Jun 1 05:37:16 [29028] DBG:tm:t_lookup_request: start searching: hash=59290, isACK=0
Jun 1 05:37:16 [29028] DBG:tm:matching_3261: RFC3261 transaction matching failed
Jun 1 05:37:16 [29028] DBG:tm:t_lookup_request: no transaction found
Jun 1 05:37:16 [29028] DBG:domain:is_domain_local: Realm '
192.168.1.104' is local
Jun 1 05:37:16 [29028] DBG:core:db_free_rows: freeing 1 rows
Jun 1 05:37:16 [29028] DBG:core:db_free_rows: row[0]=0x81a1c28
Jun 1 05:37:16 [29028] DBG:core:db_free_rows: 0x81a1c28=pkg_free() RES_ROWS
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=10000
Jun 1 05:37:16 [29028] DBG:auth:pre_auth: credentials with given realm not foundJun 1 05:37:16 [29028] DBG:auth:build_auth_hf: 'WWW-Authenticate: Digest realm="
192.168.1.104", nonce="4841c6380fa8573a4e9794b1a0a2df9f3e53cb49", qop="auth"
'
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=ffffffffffffffff
Jun 1 05:37:16 [29028] DBG:core:check_via_address: params
192.168.1.101,
192.168.1.101, 0
Jun 1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list 0xb5bf9be0
Jun 1 05:37:16 [29028] DBG:core:receive_msg: cleaning up
Jun 1 05:37:16 [29028] DBG:core:parse_msg: SIP Request:
Jun 1 05:37:16 [29028] DBG:core:parse_msg: method: <ACK>
Jun 1 05:37:16 [29028] DBG:core:parse_msg: uri: <
sip:1006@192.168.1.104>
Jun 1 05:37:16 [29028] DBG:core:parse_msg: version: <SIP/2.0>
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=2
Jun 1 05:37:16 [29028] DBG:core:parse_via_param: found param type 232, <branch> = <z9hG4bK-dc12d56c>; state=16
Jun 1 05:37:16 [29028] DBG:core:parse_via: end of header reached, state=5
Jun 1 05:37:16 [29028] DBG:core:parse_headers: via found, flags=2
Jun 1 05:37:16 [29028] DBG:core:parse_headers: this is the first via
Jun 1 05:37:16 [29028] DBG:core:receive_msg: After parse_msg...
Jun 1 05:37:16 [29028] DBG:core:receive_msg: preparing to run routing scripts...
Jun 1 05:37:16 [29028] DBG:core:parse_headers: flags=8
Jun 1 05:37:16 [29028] DBG:core:parse_to_param: tag=026ab2c49274b4e0186dd72188f7d50a.6388
Jun 1 05:37:16 [29028] DBG:core:parse_to: end of header reached, state=29
Jun 1 05:37:16 [29028] DBG:core:parse_to: display={"1006"}, ruri={
sip:1006@192.168.1.104}
Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: <To> [75]; uri=[
sip:1006@192.168.1.104]
Jun 1 05:37:16 [29028] DBG:core:get_hdr_field: to body ["1006" <
sip:1006@192.168.1.104>]
Jun 1 05:37:16 [29028] DBG:sl:sl_filter_ACK: local ACK found -> dropping it!
Jun 1 05:37:16 [29028] DBG:core:destroy_avp_list: destroying list (nil)
Jun 1 05:37:16 [29028] DBG:core:receive_msg: cleaning up
Here is the SIP trace:
U
192.168.1.101:5062 ->
192.168.1.104:5060
INVITE
sip:1005@192.168.1.104 SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-d392c9a5.
From: "1005" <
sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <
sip:1005@192.168.1.104>.
Call-ID:
a3888884-92d13124@192.168.1.101.
CSeq: 101 INVITE.
Max-Forwards: 70.
Contact: "1005" <
sip:1005@192.168.1.101:5062>.
Expires: 240.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 395.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Content-Type: application/sdp.
.
v=0.
o=- 36185 36185 IN IP4
192.168.1.101.
s=-.
c=IN IP4
192.168.1.101.
t=0 0.
m=audio 16424 RTP/AVP 0 2 4 8 18 96 97 98 101.
a=rtpmap:0 PCMU/8000.
a=rtpmap:2 G726-32/8000.
a=rtpmap:4 G723/8000.
a=rtpmap:8 PCMA/8000.
a=rtpmap:18 G729a/8000.
a=rtpmap:96 G726-40/8000.
a=rtpmap:97 G726-24/8000.
a=rtpmap:98 G726-16/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.
U
192.168.1.104:5060 ->
192.168.1.101:5062
SIP/2.0 401 Unauthorized.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-d392c9a5;rport=5062.
From: "1005" <
sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <
sip:1005@192.168.1.104>;tag=026ab2c49274b4e0186dd72188f7d50a.f608.
Call-ID:
a3888884-92d13124@192.168.1.101.
CSeq: 101 INVITE.
WWW-Authenticate: Digest realm="
192.168.1.104", nonce="4841caae665a98cec71734a5cf84c70d10ac8f63", qop="auth".
Server: OpenSER (1.3.2-notls (i386/linux)).
Content-Length: 0.
.
U
192.168.1.101:5062 ->
192.168.1.104:5060ACK
sip:1005@192.168.1.104 SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-d392c9a5.
From: "1005" <
sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <
sip:1005@192.168.1.104>;tag=026ab2c49274b4e0186dd72188f7d50a.f608.
Call-ID:
a3888884-92d13124@192.168.1.101.
CSeq: 101 ACK.
Max-Forwards: 70.
Contact: "1005" <
sip:1005@192.168.1.101:5062>.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 0.
.
U
192.168.1.101:5062 ->
192.168.1.104:5060
INVITE
sip:1005@192.168.1.104 SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-4cf05fb6.
From: "1005" <
sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <
sip:1005@192.168.1.104>.
Call-ID:
a3888884-92d13124@192.168.1.101.
CSeq: 102 INVITE.
Max-Forwards: 70.
Authorization: Digest username="1005",realm="
192.168.1.104",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri="
sip:1005@192.168.1.104",algorithm=MD5,response="e39bd9dc46a72ea191fca87e98cf9136",qop=auth,nc=00000001,cnonce="9d027a79".
Contact: "1005" <
sip:1005@192.168.1.101:5062>.
Expires: 240.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 395.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Content-Type: application/sdp.
.
v=0.
o=- 36185 36185 IN IP4
192.168.1.101.
s=-.
c=IN IP4
192.168.1.101.
t=0 0.
m=audio 16424 RTP/AVP 0 2 4 8 18 96 97 98 101.
a=rtpmap:0 PCMU/8000.
a=rtpmap:2 G726-32/8000.
a=rtpmap:4 G723/8000.
a=rtpmap:8 PCMA/8000.
a=rtpmap:18 G729a/8000.
a=rtpmap:96 G726-40/8000.
a=rtpmap:97 G726-24/8000.
a=rtpmap:98 G726-16/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.
U
192.168.1.104:5060 ->
192.168.1.101:5062
SIP/2.0 401 Unauthorized.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-4cf05fb6;rport=5062.
From: "1005" <
sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <
sip:1005@192.168.1.104>;tag=026ab2c49274b4e0186dd72188f7d50a.218e.
Call-ID:
a3888884-92d13124@192.168.1.101.
CSeq: 102 INVITE.
WWW-Authenticate: Digest realm="
192.168.1.104", nonce="4841caae665a98cec71734a5cf84c70d10ac8f63", qop="auth".
Server: OpenSER (1.3.2-notls (i386/linux)).
Content-Length: 0.
.
U
192.168.1.101:5062 ->
192.168.1.104:5060
ACK
sip:1005@192.168.1.104 SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-4cf05fb6.
From: "1005" <
sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <
sip:1005@192.168.1.104>;tag=026ab2c49274b4e0186dd72188f7d50a.218e.
Call-ID:
a3888884-92d13124@192.168.1.101.
CSeq: 102 ACK.
Max-Forwards: 70.
Authorization: Digest username="1005",realm="
192.168.1.104",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri="
sip:1005@192.168.1.104",algorithm=MD5,response="dc66b568ed8ec48f0f405aa063156eaa",qop=auth,nc=00000001,cnonce="9d027a79".
Contact: "1005" <
sip:1005@192.168.1.101:5062>.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 0.
.
U
192.168.1.101:5062 ->
192.168.1.104:5060
INVITE
sip:1005@192.168.1.104 SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-e2c260be.
From: "1005" <
sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <
sip:1005@192.168.1.104>.
Call-ID:
a3888884-92d13124@192.168.1.101.
CSeq: 103 INVITE.
Max-Forwards: 70.
Authorization: Digest username="1005",realm="
192.168.1.104",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri="
sip:1005@192.168.1.104",algorithm=MD5,response="8d2b52278a72326a57361ec1ca2601c3",qop=auth,nc=00000001,cnonce="f4b6f3a0".
Contact: "1005" <
sip:1005@192.168.1.101:5062>.
Expires: 240.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 395.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Content-Type: application/sdp.
.
v=0.
o=- 36185 36185 IN IP4
192.168.1.101.
s=-.
c=IN IP4
192.168.1.101.
t=0 0.
m=audio 16424 RTP/AVP 0 2 4 8 18 96 97 98 101.
a=rtpmap:0 PCMU/8000.
a=rtpmap:2 G726-32/8000.
a=rtpmap:4 G723/8000.
a=rtpmap:8 PCMA/8000.
a=rtpmap:18 G729a/8000.
a=rtpmap:96 G726-40/8000.
a=rtpmap:97 G726-24/8000.
a=rtpmap:98 G726-16/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.
U
192.168.1.104:5060 ->
192.168.1.101:5062
SIP/2.0 401 Unauthorized.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-e2c260be;rport=5062.
From: "1005" <
sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <
sip:1005@192.168.1.104>;tag=026ab2c49274b4e0186dd72188f7d50a.8d8a.
Call-ID:
a3888884-92d13124@192.168.1.101.
CSeq: 103 INVITE.
WWW-Authenticate: Digest realm="
192.168.1.104", nonce="4841caae665a98cec71734a5cf84c70d10ac8f63", qop="auth".
Server: OpenSER (1.3.2-notls (i386/linux)).
Content-Length: 0.
.
U
192.168.1.101:5062 ->
192.168.1.104:5060
ACK
sip:1005@192.168.1.104 SIP/2.0.
Via: SIP/2.0/UDP 192.168.1.101:5062;branch=z9hG4bK-e2c260be.
From: "1005" <
sip:1005@192.168.1.104>;tag=131fa1047c30f2a4o0.
To: <
sip:1005@192.168.1.104>;tag=026ab2c49274b4e0186dd72188f7d50a.8d8a.
Call-ID:
a3888884-92d13124@192.168.1.101.
CSeq: 103 ACK.
Max-Forwards: 70.
Authorization: Digest username="1005",realm="
192.168.1.104",nonce="4841caae665a98cec71734a5cf84c70d10ac8f63",uri="
sip:1005@192.168.1.104",algorithm=MD5,response="8ebde837f7c7c49f721d9f2c44b3797d",qop=auth,nc=00000001,cnonce="f4b6f3a0".
Contact: "1005" <
sip:1005@192.168.1.101:5062>.
User-Agent: Sipura/SPA921-4.1.10(b).
Content-Length: 0.