Any one is successful with this configuration: ser 8.1.14 + radiusclient 0.4.4.
Just wanted to See if any one is getting the same symptoms as i get.
It looks like my ser+ radisuclient 0.4.4 is not talking at all to the radius server but in the ser log i am getting following: "Some message with credentials for given realm not found " I have submitted a message with all the logs but it is waiting for approval .. I am submitting another shorter one.
) 3(3923) DEBUG: add_to_tail_of uri: <sip:209.250 3(3923) DEBUG: a version: <SIP/2.0> 4(3927) parse_headers: flags=1 3(3923) DEBUG:destroy_avp_list: destroing list (nil) 3(3923) receive_msg: cleaning up 4(3927) Found param type 232, <branch> = <z9hG4bK4d5b.c80b2f83.0>; state=16 4(3927) end of header reached, state=5 4(3927) parse_headers: Via found, flags=1 4(3927) parse_headers: this is the first via 4(3927) After parse_msg... 4(3927) preparing to run routing scripts... 4(3927) DEBUG : is_maxfwd_present: max_forward header already found! 4(3927) DEBUG: is_maxfwd_present: value = 10 4(3927) parse_headers: flags=8 4(3927) Found param type 232, <branch> = <z9hG4bK7210a8d8>; state=16 4(3927) end of header reached, state=5 4(3927) parse_headers: Via found, flags=8 4(3927) parse_headers: this is the second via 4(3927) DEBUG: add_param: tag=as0854885b 4(3927) end of header reached, state=29 4(3927) query="select domain from domain where domain='209.250.135.8'" 4(3927) is_local(): Realm '209.250.135.8' is local 4(3927) XLOG: xl_print_log: final buffer length 31 4(3927) <REGISTER> == is from local == 4(3927) parse_headers: flags=64 4(3927) end of header reached, state=9 4(3927) DEBUG: get_hdr_field: <To> [32]; uri=[sip:4169878025@209.250.135.8] 4(3927) DEBUG: to body [sip:4169878025@209.250.135.8 ] 4(3927) get_hdr_field: cseq <CSeq>: <102> <REGISTER> 4(3927) check_via_address(209.250.135.8, 209.250.135.8, 2) 4(3927) parse_headers: flags=4096 4(3927) DEBUG: get_hdr_body : content_length=0 4(3927) found end of header 4(3927) pre_auth(): Credentials with given realm not found 4(3927) build_auth_hf(): 'WWW-Authenticate: Digest realm="209.250.135.8", nonce="4172b0334c46e8aaf44360a02eef199553852c7e" ' 4(3927) parse_headers: flags=-1 4(3927) check_via_address(209.250.135.8, 209.250.135.8, 2) 4(3927) DEBUG: get_out_socket: socket determined: 1 3(3923) SIP Reply (status): 3(3923) version: <SIP/2.0> 3(3923) status: <401> 3(3923) reason: <Unauthorized> 3(3923) parse_headers: flags=1 3(3923) Found param type 232, <branch> = <z9hG4bK4d5b.c80b2f83.0>; state=16 3(3923) end of header reached, state=5 3(3923) parse_headers: Via found, flags=1 3(3923) parse_headers: this is the first via 3(3923) After parse_msg... 3(3923) check_self - checking if host==us: 13==9 && [209.250.135.8] == [127.0.0.1] 3(3923) check_self - checking if port 5060 matches port 5060 3(3923) check_self - checking if host==us: 13==13 && [209.250.135.8] == [209.250.135.8] 3(3923) check_self - checking if port 5060 matches port 5060 3(3923) forward_reply: found module tm, passing reply to it 3(3923) DEBUG: t_check: msg id=2 global id=1 T start=0xffffffff 3(3923) parse_headers: flags=17 3(3923) Found param type 232, <branch> = <z9hG4bK7210a8d8>; state=16 3(3923) end of header reached, state=5 3(3923) parse_headers: Via found, flags=17 3(3923) parse_headers: this is the second via 3(3923) DEBUG: add_param: tag=b27e1a1d33761e85846fc98f5f3a7e58.8dd9 3(3923) end of header reached, state=29 3(3923) DEBUG: get_hdr_field: <To> [74]; uri=[sip:4169878025@209.250.135.8] 3(3923) DEBUG: to body [sip:4169878025@209.250.135.8] 3(3923) get_hdr_field: cseq <CSeq>: <102> <REGISTER> 3(3923) DEBUG: t_reply_matching: hash 46548 label 955429004 branch 0 3(3923) DEBUG: t_reply_matching: reply matched (T=0xf51e20b0)! 3(3923) DEBUG: t_check: msg id=2 global id=2 T end=0xf51e20b0 4(3927) radius_does_uri_exist(): Failure 3(3923) 4(3927) DEBUG: t_addifnew: msg id=1 , globDEBUG: relay_reply: branch=0, save=0, relay=0 3(3923) old size: 696, new size: 634 3(3923) build_res_from_sip_res: copied size: orig:88, new: 26, rest: 608 msg= SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 69.196.87.34:5060;branch=z9hG4bK7210a8d8 From: sip:4169878025@209.250.135.8;tag=as0854885b To: sip:4169878025@209.250.135.8;tag=b27e1a1d33761e85846fc98f5f3a7e58.8dd9 Call-ID: 02d1489e1d18e2f93d240ea127012cd8@192.168.1.1 CSeq: 102 REGISTER WWW-Authenticate: Digest realm="209.250.135.8", nonce="4172b0334c46e8aaf44360a02eef199553852c7e" Server: Sip EXpress router (0.8.14-2 (i386/linux)) Content-Length: 0 Warning: 392 209.250.135.8:5060 "Noisy feedback tells: pid=3927 req_src_ip=209.250.135.8 req_src_port=5060 in_uri=sip:209.250.135.8 out_uri=sip:209.250.135.8 via_cnt==2"
3(3923) WARNING:vqm_resize: resize(0) called 4(3927) DEBUG: RFC3261 transaction matching failed 3(3923) DEBUG: reDEBUG: get_out_socket: socket determined: 1 mem=0xf51e35c0: SIP/2.0 4 3(3923) 4(3927) DEBUG: mk_proxy: doing DNS lookup... 923) DEBUG: add_to_tail_of_timer[2]: 0xf51e20f8 3(3923) DEBUG:destroy_avp_list: destroing list (nil) 4(3927) DEBUG: get_out_socket: socket determined: 1 4(3927) check_via_address(209.250.135.8, 209.250.135.8, 2) 3(3923) SIP Request: 3(3923) method: <REGISTER> 3(3923) uri: sip:209.250.135.8 3(3923) version: <SIP/2.0> 3(3923) parse_headers: flags=1 3(3923) Found param type 232, <branch> = <z9hG4bK4d5b.d80b2f83.0>; state=16 3(3923) end of header reached, state=5 3(3923) parse_headers: Via found, flags=1 3(3923) parse_headers: this is the first via 3(3923) After parse_msg... 3(3923) preparing to run routing scripts... 3(3923) DEBUG : is_maxfwd_present: max_forward header already found! 3(3923) DEBUG: is_maxfwd_present: value = 9 3(3923) parse_headers: flags=8 3(3923) Found param type 232, <branch> = <z9hG4bK4d5b.c80b2f83.0>; state=16 3(3923) end of header reached, state=5 3(3923) parse_headers: Via found, flags=8 3(3923) parse_headers: this is the second via 3(3923) Found param type 232, <branch> = <z9hG4bK7210a8d8>; state=16 3(3923) end of header reached, state=5 3(3923) parse_headers: Via found, flags=8 3(3923) DEBUG: add_param: tag=as0854885b 3(3923) end of header reached, state=29 3(3923) query="select domain from domain where domain='209.250.135.8'" 3(3923) is_local(): Realm '209.250.135.8' is local 3(3923) XLOG: xl_print_log: final buffer length 31 3(3923) <REGISTER> == is from local == 3(3923) parse_headers: flags=64 3(3923) end of header reached, state=9 3(3923) DEBUG: get_hdr_field: <To> [32]; uri=[sip:4169878025@209.250.135.8] 3(3923) DEBUG: to body [sip:4169878025@209.250.135.8 ] 3(3923) get_hdr_field: cseq <CSeq>: <102> <REGISTER> 3(3923) check_via_address(209.250.135.8, 209.250.135.8, 2) 3(3923) parse_headers: flags=4096 3(3923) DEBUG: get_hdr_body : content_length=0 3(3923) found end of header 3(3923) pre_auth(): Credentials with given realm not found 3(3923) build_auth_hf(): 'WWW-Authenticate: Digest realm="209.250.135.8", nonce="4172b0334c46e8aaf44360a02eef199553852c7e" ' 3(3923) parse_headers: flags=-1 3(3923) check_via_address(209.250.135.8, 209.250.135.8, 2) 3(3923) DEBUG: get_out_socket: socket determined: 1 4(3927) SIP Reply (status): 4(3927) version: <SIP/2.0> 4(3927) status: <401> 4(3927) reason: <Unauthorized> 4(3927) parse_headers: flags=1 4(3927) Found param type 232, <br 3(3923) find_first_route(): No Route headers found 3(3923) loose_route(): There is no Routparse 3(3923) parse_headers: flags=64 3(3923) check_via_address(209.250.135.8, 209.250.1After parse_msg... 4(3927) check_self - checking if host==us: 13==9 && [209.250.135.8] == [127.0.0.1] 4(3927) check_self - checking if port 5060 matches port 5060 4(3927) check_self - checking if host==us: 13==13 && [209.250.135.8] == [209.250.135.8] 4(3927) check_self - checking if port 5060 matches port 5060 4(3927) forward_reply: found module tm, passing reply to it 4(3927) DEBUG: t_check: msg id=2 global id=1 T start=0xffffffff 4(3927) parse_headers: flags=17 4(3927) Found param type 232, <branch> = <z9hG4bK4d5b.c80b2f83.0>; state=16 4(3927) end of header reached, state=5 4(3927) parse_headers: Via found, flags=17 4(3927) parse_headers: this is the second via 4(3927) Found param type 232, <branch> = <z9hG4bK7210a8d8>; state=16 4(3927) end of header reached, state=5 4(3927) parse_headers: Via found, flags=17 4(3927) DEBUG: add_param: tag=b27e1a1d33761e85846fc98f5f3a7e58.d295 4(3927) end of heradius_does_uri_exist() 4(3927) DEBUG: geDEBUG: t_addifnew: msg id=3 , global msg id=2 , T on entranc 4(3927) DEBUG: to bodparse_headers: flags=-1 3(3923) parse_headers: flags=60 3(3923) t_lookup_request: start searching: hash=46548, isACK=0 : hash 46548 label 955429005 branch 0 4(3927) DEBUG: t_DEBUG: RFC3261 transaction matching failed 3(3923) DEBUG: t_lookup_request: no transaction found 0xf51e3848 4(3927) DEBUG: t_on_reply: org. status uas=0, uac[0]=0 local=0 is_invite=0) 4(3927) ->>>>>>>>> T_code=0, new_code=401 4(3927) 3(3923) DEBUG: get_out_socket: socket determined: 1 3(3923) DEBUG: mkbuild_res_from_sip_res: copied size: orig:88, new: 26, rest: 670 msg= SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 209.250.135.8;branch=z9hG4bK4d5b.c80b2f83.0 Via: SIP/2.0/UDP 69.196.87.34:5060;branch=z9hG4bK7210a8d8 From: sip:4169878025@209.250.135.8;tag=as0854885b To: sip:4169878025@209.250.135.8;tag=b27e1a1d33761e85846fc98f5f3a7e58.d295 Call-ID: 02d1489e1d18e2f93d240ea127012cd8@192.168.1.1 CSeq: 102 REGISTER WWW-Authenticate: Digest realm="209.250.135.8", nonce="4172b0334c46e8aaf44360a02eef199553852c7e" Server: Sip EXpress router (0.8.14-2 (i386/linux)) Content-Length: 0 Warning: 392 209.250.135.8:5060 "Noisy feedback tells: pid=3923 req_src_ip=209.250.135.8 req_src_port=5060 in_uri=sip:209.250.135.8 out_uri=sip:209.250.135.8 via_cnt==3"
4(3927) 3(3923) DEBUG: get_out_socket: socket determined: 1 3(3923) check_via_address(209.250.135.8, 209.250.135.8, 2) shmem=0xf51e6360: SIP/2.0 4 4(3927) DEBUG: cleanup_uacs: RETR/FR timers reset 4(3927) DEBUG: add_to_tail_of_timer[2]: 0xf51e3890 4(3927) DEBUG:destroy_avp_list: destroing list (nil 3 4(3927DEreceive_msg: cleaning up [0]: 0xf51e4fa4 3(3923) 4(3927) SIP Reply (status): 4(3927) version: <SIP/2.0> 4(3927) status: <401> 3(3923) SIP Request: 3(3923) method: <REGISTER> 4(3927) Found par uri: sip:209.250.135.8 3(3923) version: <SIP/2.0> 3(3923) parse_headers: flags=1 3(3923) Found param type 232, <branch> = <z9hG4bK4d5b.e80b2f83.0>; state=16 3(3923) end of header reached, state=5 3(3923) parse_headers: Via found, flags=1 3(3923) parse_headers: this is the first via 3(3923) After parse_msg... 3(3923) preparing to run routing scripts... 3(3923) DEBUG : is_maxfwd_present: max_forward header already found! 3(3923) DEBUG: is_maxfwd_present: value = 8 3(3923) parse_headers: flags=8 4(3927) Found parFound param type 232, <branch> = <z9hG4bK4d5b.d80b2f 4(3927) end of header reend of header r 4(3927) parse_headers: Vparse_headers: Via 4(3927) parse_ 3(3923) parse_headers: this is the seconDEBUG: 3(3923) Found param type 232, <branch> = <z9hG4bK4d5b.c80b2f83end of header 3(3923) end of header reacDEBUG: get_hd 3(3923) parse_headers: Via found, flags=8 3(3923) Found param type 232, <branch> = <z9hG4bK7210a8d8>; state=16 3(3923) end of header reached, state=5 3(3923) parse_headers: Via found, flags=8 3(3923) DEBUG: add_param: tag=as0854885b 3(3923) end of header reached, state=29 tched (T=0xf51e20b0)! 4(3927) DEBUG: t_check: msg id=3 global id=3 T end=0xf51e20b0 4(3927) DEBUG: t_on_reply: org. status uas=401, uac[0]=401 local=0 is_invite=0) 4(3927) ->>>>>>>>> T_code=401, new_code=401 4(3927) DEBUG: relay_reply: branch=0, save=0, relay=-1 4(3927) DEBUG:destroy_avp_list: destroing list (nil) 4(3927) receive_msg: cleaning up 3(3923) is_local(): Realm '209.250.135.8' is local 3(3923) XLOG: xl_print_log: final buffer length 31 3(3923) <REGISTER> == is from local == 3(3923) parse_headers: flags=64 3(3923) end of header reached, state=9 3(3923) DEBUG: get_hdr_field: <To> [32]; uri=[sip:4169878025@209.250.135.8] 3(3923) DEBUG: to body [sip:4169878025@209.250.135.8 ] 3(3923) get_hdr_field: cseq <CSeq>: <102> <REGISTER> 3(3923) check_via_address(209.250.135.8, 209.250.135.8, 2) 3(3923) parse_headers: flags=4096 3(3923) DEBUG: get_hdr_body : content_length=0 3(3923) found end of header 3(3923) pre_auth(): Credentials with given realm not found 3(3923) build_auth_hf(): 'WWW-Authenticate: Digest realm="209.250.135.8", nonce="4172b0334c46e8aaf44360a02eef199553852c7e" ' 3(3923) parse_headers: flags=-1 3(3923) check_via_address(209.250.135.8, 209.250.135.8, 2) 3(3923) DEBUG: get_out_socket: socket determined: 1 3(3923) parse_headers: flags=256 3(3923) find_first_route(): No Route headers found 3(3923) loose_route(): There is no Route HF 3(3923) parse_headers: flags=64 3(3923) check_via_address(209.250.135.8, 209.250.135.8, 2) 4(3927) SIP Reply (status): 4(3927) version: <SIP/2.0>