Im following "Getting Started with SER" and I'm stuck on the chapter
about nat traversal
Ive tried both methods, currently im working on rtpptoxy. the exact
errors I get when i try to make calls from behind NAT are:
0(1731) WARNING: rtpp_test: can't get version of the RTP proxy
0(1731) WARNING: rtpp_test: support for RTP proxy has been disabled
0(1731) ERROR: force_rtp_proxy2: support for RTP proxy is disabled
i have compiled and installed rtpproxy, and made sure the permissions were set.
bmy bin # ps ax|grep rtp
1714 ? Ss 0:00 ./rtpproxy
bmy bin # ls -la /var/run/rtpproxy.*
-rw-r--r-- 1 root root 5 Nov 1 19:27 /var/run/rtpproxy.pid
srwxr-xr-x 1 root root 0 Nov 1 19:27 /var/run/rtpproxy.sock
i have attached my ser.cfg but below are some of the parts of it
debug=3 # debug level (cmd line: -dddddddddd)
fork=no
log_stderror=yes # (cmd line: -E)
/* Uncomment these lines to enter debugging mode
fork=no
log_stderror=yes
*/
check_via=no # (cmd. line: -v)
dns=no # (cmd. line: -r)
rev_dns=no # (cmd. line: -R)
listen=10.0.0.10
alias=hostname.dyndns.org
port=6060
children=4
fifo="/tmp/ser_fifo"
fifo_db_url="mysql://user:pw@localhost/ser"
<skip>
modparam("nathelper", "rtpproxy_sock",
"unix:/var/run/rtpproxy.sock")
<skip>
route{
# initial sanity checks -- messages with
# max_forwards==0, or excessively long requests
if (!mf_process_maxfwd_header("10")) {
sl_send_reply("483","Too Many Hops");
break;
};
if (msg:len >= 2048 ) {
sl_send_reply("513", "Message too big");
break;
};
# we record-route all messages -- to make sure that
# subsequent messages will go through our proxy; that's
# particularly good if upstream and downstream entities
# use different transport protocol
if (method!="REGISTER") {
record_route();
};
if (method=="BYE" || method=="CANCEL") {
unforce_rtp_proxy();
}
# subsequent messages withing a dialog should take the
# path determined by record-routing
if (loose_route()) {
if ((method=="INVITE" || method=="REFER") && !has_totag())
{
sl_send_reply("403", "Forbidden");
break;
};
if (method=="INVITE") {
if (!proxy_authorize("","subscriber")) {
proxy_challenge("","0");
break;
}else if (!check_from()) {
sl_send_reply("403", "Use From=ID");
break;
};
consume_credentials();
if (nat_uac_test("19")) {
setflag(6);
force_rport();
fix_nated_contact();
};
force_rtp_proxy("l");
};
route(1);
break;
};
#======= call type processing section
if (!uri==myself) {
append_hf("P-hint: outbound\r\n");
route(4);
route(1);
break;
};
if (method=="ACK") {
route(1);
break;
} else if (method=="CANCEL") {
route(1);
break;
} else if (method=="INVITE") {
route(3);
break;
} else if (method=="REGISTER") {
route(2);
break;
};
lookup("aliases");
if (uri!=myself) {
route(4);
route(1);
break;
};
if (!lookup("location")) {
sl_send_reply("404", "User Not Found");
break;
};
route(1);
}
route[1]
{
t_on_reply("1");
# send it out now; use stateful forwarding as it works reliably
# even for UDP2TCP
if (!t_relay()) {
if (method=="INVITE" || isflagset(6)) {
unforce_rtp_proxy();
};
sl_reply_error();
};
}
route[2] {
#-------------------------
#REGISTER Message Handler
#-------------------------
if (!search("^Contact:[ ]*\*") && nat_uac_test("19")) {
setflag(6);
fix_nated_register();
force_rport();
};
sl_send_reply("100", "Trying");
if (!www_authorize("","subscriber")) {
www_challenge("","0");
break;
};
if (!check_to()) {
sl_send_reply("401", "Unauthorized");
break;
};
consume_credentials();
if (!save("location")) {
sl_reply_error();
};
}
route[3] {
#----------
#--INVITE Message Handler
#-----------
if (!proxy_authorize("","subscriber")) {
proxy_challenge("","0");
break;
} else if (!check_from()) {
sl_send_reply("403", "Use From=ID");
break;
};
consume_credentials();
if (nat_uac_test("19")) {
setflag(6);
}
lookup("aliases");
if (uri!=myself) {
route(4);
route(1);
break;
};
if (!lookup("location")) {
sl_send_reply("404", "User Not Found");
break;
};
route(4);
route(1);
}
route[4] {
#NAT Traversal
if (isflagset(6)) {
force_rport();
fix_nated_contact();
force_rtp_proxy();
}
}
onreply_route[1] {
if (isflagset(6) && status=~"(180)|(183)|2[0-9][0-9]") {
if (!search("^Contact-Length:[ ]*0")) {
force_rtp_proxy();
};
};
if (nat_uac_test("1")) {
fix_nated_contact();
};
}