I have been using ctd.sh with no success. SER ver 0.8.14
./ctd.sh sip:support@192.168.2.253 test3@192.168.2.253
488 Not Acceptable Here invitation failed
my config is : # ----------- global configuration parameters ------------------------
debug=7 listen=192.168.2.253 log_stderror=yes check_via=no dns=no rev_dns=no fifo="/tmp/ser_fifo"
# ------------------ module loading ----------------------------------
loadmodule "/usr/lib/ser/modules/mysql.so" loadmodule "/usr/lib/ser/modules/exec.so" loadmodule "/usr/lib/ser/modules/sl.so" loadmodule "/usr/lib/ser/modules/tm.so" loadmodule "/usr/lib/ser/modules/rr.so" loadmodule "/usr/lib/ser/modules/maxfwd.so" loadmodule "/usr/lib/ser/modules/usrloc.so" loadmodule "/usr/lib/ser/modules/registrar.so" loadmodule "/usr/lib/ser/modules/textops.so" loadmodule "/usr/lib/ser/modules/auth.so" loadmodule "/usr/lib/ser/modules/auth_db.so"
# ----------------- setting module-specific parameters ---------------
modparam("usrloc", "db_mode", 0) modparam("auth_db", "calculate_ha1", yes) modparam("auth_db", "db_url", "sql://xxxx:xxxxx@127.0.0.1/hsver3") modparam("auth_db", "user_column", "uname") modparam("auth_db", "domain_column", "domain") modparam("auth_db", "password_column", "pass") modparam("rr", "enable_full_lr", 1)
# ------------------------- request routing logic -------------------
# main routing logic
route{
# initial sanity checks -- messages with # max_forwards==0, or excessively long requests if (!mf_process_maxfwd_header("10")) { sl_send_reply("483","Too Many Hops"); break; }; if (msg:len > 8092) { sl_send_reply("513", "Message too big"); break; };
if (loose_route()) { t_relay(); break; };
if (uri==myself) {
if (method=="REGISTER") {
# Uncomment this if you want to use digest authentication if (!proxy_authorize("", "users")) { proxy_challenge("", "0"); break; }; save("location"); break; }
# native SIP destinations are handled using our USRLOC DB if (!lookup("location")) { sl_send_reply("404", "Not Found"); break; }; }; if (!t_relay()) { sl_reply_error(); };
}
Looks like your SIP UA does not support REFER. Check the technical details of the SIP UA or ask the vendor about.
Daniel
On 8/4/2004 7:29 AM, Andrew Mee wrote:
I have been using ctd.sh with no success. SER ver 0.8.14
./ctd.sh sip:support@192.168.2.253 test3@192.168.2.253
488 Not Acceptable Here invitation failed
my config is : # ----------- global configuration parameters ------------------------
debug=7 listen=192.168.2.253 log_stderror=yes check_via=no dns=no rev_dns=no fifo="/tmp/ser_fifo"
# ------------------ module loading ----------------------------------
loadmodule "/usr/lib/ser/modules/mysql.so" loadmodule "/usr/lib/ser/modules/exec.so" loadmodule "/usr/lib/ser/modules/sl.so" loadmodule "/usr/lib/ser/modules/tm.so" loadmodule "/usr/lib/ser/modules/rr.so" loadmodule "/usr/lib/ser/modules/maxfwd.so" loadmodule "/usr/lib/ser/modules/usrloc.so" loadmodule "/usr/lib/ser/modules/registrar.so" loadmodule "/usr/lib/ser/modules/textops.so" loadmodule "/usr/lib/ser/modules/auth.so" loadmodule "/usr/lib/ser/modules/auth_db.so"
# ----------------- setting module-specific parameters ---------------
modparam("usrloc", "db_mode", 0) modparam("auth_db", "calculate_ha1", yes) modparam("auth_db", "db_url", "sql://xxxx:xxxxx@127.0.0.1/hsver3") modparam("auth_db", "user_column", "uname") modparam("auth_db", "domain_column", "domain") modparam("auth_db", "password_column", "pass") modparam("rr", "enable_full_lr", 1)
# ------------------------- request routing logic -------------------
# main routing logic
route{
# initial sanity checks -- messages with # max_forwards==0, or excessively long requests if (!mf_process_maxfwd_header("10")) { sl_send_reply("483","Too Many Hops"); break; }; if (msg:len > 8092) { sl_send_reply("513", "Message too big"); break; };
if (loose_route()) { t_relay(); break; };
if (uri==myself) { if (method=="REGISTER") { # Uncomment this if you want to use digest authentication if (!proxy_authorize("", "users")) { proxy_challenge("", "0"); break; }; save("location"); break; } # native SIP destinations are handled using our USRLOC DB if (!lookup("location")) { sl_send_reply("404", "Not Found"); break; };
}; if (!t_relay()) { sl_reply_error(); };
}
Serusers mailing list serusers@lists.iptel.org http://lists.iptel.org/mailman/listinfo/serusers
Actually the invite doesn't even get to the UA. So it doesn't even get to the REFER in the script, the 488 seems to be returned by SER. Any clues to this would be greatly appreciated..
Thanks Andrew
Daniel-Constantin Mierla wrote:
Looks like your SIP UA does not support REFER. Check the technical details of the SIP UA or ask the vendor about.
Daniel
On 8/4/2004 7:29 AM, Andrew Mee wrote:
I have been using ctd.sh with no success. SER ver 0.8.14
./ctd.sh sip:support@192.168.2.253 test3@192.168.2.253
488 Not Acceptable Here invitation failed
my config is : # ----------- global configuration parameters ------------------------
debug=7 listen=192.168.2.253 log_stderror=yes check_via=no dns=no rev_dns=no fifo="/tmp/ser_fifo"
# ------------------ module loading ----------------------------------
loadmodule "/usr/lib/ser/modules/mysql.so" loadmodule "/usr/lib/ser/modules/exec.so" loadmodule "/usr/lib/ser/modules/sl.so" loadmodule "/usr/lib/ser/modules/tm.so" loadmodule "/usr/lib/ser/modules/rr.so" loadmodule "/usr/lib/ser/modules/maxfwd.so" loadmodule "/usr/lib/ser/modules/usrloc.so" loadmodule "/usr/lib/ser/modules/registrar.so" loadmodule "/usr/lib/ser/modules/textops.so" loadmodule "/usr/lib/ser/modules/auth.so" loadmodule "/usr/lib/ser/modules/auth_db.so"
# ----------------- setting module-specific parameters ---------------
modparam("usrloc", "db_mode", 0) modparam("auth_db", "calculate_ha1", yes) modparam("auth_db", "db_url", "sql://xxxx:xxxxx@127.0.0.1/hsver3") modparam("auth_db", "user_column", "uname") modparam("auth_db", "domain_column", "domain") modparam("auth_db", "password_column", "pass") modparam("rr", "enable_full_lr", 1)
# ------------------------- request routing logic -------------------
# main routing logic
route{
# initial sanity checks -- messages with # max_forwards==0, or excessively long requests if (!mf_process_maxfwd_header("10")) { sl_send_reply("483","Too Many Hops"); break; }; if (msg:len > 8092) { sl_send_reply("513", "Message too big"); break; };
if (loose_route()) { t_relay(); break; };
if (uri==myself) { if (method=="REGISTER") { # Uncomment this if you want to use digest authentication if (!proxy_authorize("", "users")) { proxy_challenge("", "0"); break; }; save("location"); break; } # native SIP destinations are handled using our USRLOC DB if (!lookup("location")) { sl_send_reply("404", "Not Found"); break; };
}; if (!t_relay()) { sl_reply_error(); };
}
Serusers mailing list serusers@lists.iptel.org http://lists.iptel.org/mailman/listinfo/serusers