Good day,
I have a very interesting error coming back with my attempts to use the
mediaproxy module.
This is what is appearing in the syslog file:
Mar 3 13:26:37 hostthe3rd /usr/local/sbin/ser[30021]: error:
mediaproxy/sendMediaproxyCommand(): can't connect to MediaProxy
Mar 3 13:26:37 hostthe3rd /usr/local/sbin/ser[30020]: error:
mediaproxy/sendMediaproxyCommand(): can't connect to MediaProxy
I can send a full copy of my cfg file if needed, but will attach small
snippits of it that have the sections on the mediaproxy parts.
Any help on this would be greatly appreciated.
Thanks
Terry
--- Snippets from ser.cfg file ---
loadmodule "/usr/local/lib/ser/modules/mediaproxy.so"
...
modparam("mediaproxy", "natping_interval", 60)
modparam("registrar", "nat_flag", 2)
...
route {
...
if (method=="REGISTER") {
# Nat Info - Hopefully
if (client_nat_test("3")) {
setflag(2);
force_rport();
fix_contact();
};
...
route[2] {
if (method=="INVITE") {
t_on_failure("1");
} else if (method=="BYE" || method=="CANCEL") {
end_media_session();
};
if (loose_route()) {
if (method=="INVITE" || method=="ACK") {
use_media_proxy();
};
t_relay();
break;
}
if (method=="INVITE") {
record_route();
};
if (client_nat_test("3") && !search("^Recored-Route:")) {
force_rport();
fix_contact();
};
if (method=="INVITE") {
t_on_reply("1");
};
if (method=="INVITE" || method=="ACK") {
use_media_proxy();
};
# outbound requests are allowed only for registered BigU users
if (!(src_ip==216.94.106.12) &
!(proxy_authorize("hostthe3rd.rivernet.net", "subscriber"))) {
# ACK and CANCEL have no security mechanisms so they are just
# noted
if (method=="ACK" | method=="BYE") {
log(1, "LOG: failed outbound authentication for ACK granted\n");
} else if (method=="CANCEL") {
log(1, "LOG: failed outbound authentication for CANCEL granted\n");
} else if (method=="INVITE") {
setflag(1);
} else {
proxy_challenge("hostthe3rd.rivernet.net", "0");
break;
};
setflag(1);
};
# to maintain credibility of our proxy, we check From in INVITEs
# if (!src_ip==216.94.106.12 & method=="INVITE" & !check_from()) {
# log(1, "LOG: Spoofed from attempt\n");
# sl_send_reply("403", "Use From=id next time");
# break;
# };
append_hf("P-hint: OUTBOUND ON INTERNET\r\n");
setflag(1);
if (!t_relay()) {
if (method=="INVITE" || method=="ACK") {
end_media_session();
};
sl_reply_error();
break;
};
}
...
failure_route[1] {
end_media_session();
}
onreply_route[1] {
if (status=~"(183)|(2[0-9][0-9])") {
if(client_nat_test("1")) {
fix_contact();
}
use_media_proxy();
};
}
Show replies by date