hello friends,
iam having the rel_0_8_12 running
when i am registering with windows messenger from a
nat client
its ethereal report show that malformed sip packet
so whats the problem?
ser( 202.*.*.19)-->dhcp nat(202.*.*.252)-->private ip(192.168.1.18)msn messenger 4.7
please guide me
with reagards rama kanth
this is the log message iam getting when debug =8 *************************************************** 6(3777) SIP Request: 6(3777) method: <REGISTER> 6(3777) uri: sip:server.pol.net.in 6(3777) version: <SIP/2.0> 6(3777) parse_headers: flags=1 6(3777) end of header reached, state=5 6(3777) parse_headers: Via found, flags=1 6(3777) parse_headers: this is the first via 6(3777) After parse_msg... 6(3777) preparing to run routing scripts... 6(3777) DEBUG : is_maxfwd_present: searching for max_forwards header 6(3777) parse_headers: flags=128 6(3777) DEBUG: is_maxfwd_present: value = 70 6(3777) check_via_address(202.*.*.252, 192.168.1.18, 0) 6(3777) LOG: Someone trying to register from private IP, rewriting 6(3777) parse_headers: flags=64 6(3777) end of header reached, state=9 6(3777) DEBUG: get_hdr_field: <To> [29]; uri=[sip:102@server.pol.net.in] 6(3777) DEBUG: to body [sip:102@server.pol.net.in ] 6(3777) get_hdr_field: cseq <CSeq>: <2> <REGISTER> 6(3777) parse_headers: flags=256 6(3777) DEBUG: get_hdr_body : content_length=0 6(3777) found end of header 6(3777) find_first_route(): No Route headers found 6(3777) loose_route(): There is no Route HF 6(3777) check_self - checking if host==us: 17==9 && [server.pol.net.in] == [127.0.0.1] 6(3777) check_self - checking if port 5060 matches port 5060 6(3777) check_self - checking if host==us: 17==13 && [server.pol.net.in] == [202.*.*.19] 6(3777) check_self - checking if port 5060 matches port 5060 6(3777) check_self - checking if host==us: 17==9 && [server.pol.net.in] == [127.0.0.1] 6(3777) check_self - checking if port 5060 matches port 5060 6(3777) check_self - checking if host==us: 17==13 && [server.pol.net.in] == [202.*.*.19] 6(3777) check_self - checking if port 5060 matches port 5060 6(3777) parse_headers: flags=-1 6(3777) parse_headers: flags=-1 6(3777) check_via_address(202.*.*.252, 192.168.1.18, 0) 6(3777) receive_msg: cleaning up
************************************************* the ethereal report is *************************************************
Frame 1 (544 bytes on wire, 544 bytes captured) Arrival Time: May 29, 2004 18:00:28.644433000 Time delta from previous packet: 0.000000000 seconds Time relative to first packet: 0.000000000 seconds Frame Number: 1 Packet Length: 544 bytes Capture Length: 544 bytes Ethernet II, Src: 00:e0:2b:90:1f:00, Dst: 00:e0:18:ed:04:61 Destination: 00:e0:18:ed:04:61 (Asustek__ed:04:61) Source: 00:e0:2b:90:1f:00 (Extreme__90:1f:00) Type: IP (0x0800) Internet Protocol, Src Addr: 202.65.148.252 (202.65.148.252), Dst Addr: 202.65.128.19 (202.65.128.19) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00) 0000 00.. = Differentiated Services Codepoint: Default (0x00) .... ..0. = ECN-Capable Transport (ECT): 0 .... ...0 = ECN-CE: 0 Total Length: 530 Identification: 0xcc8e Flags: 0x00 .0.. = Don't fragment: Not set ..0. = More fragments: Not set Fragment offset: 0 Time to live: 125 Protocol: UDP (0x11) Header checksum: 0xc5b9 (correct) Source: 202.*.*.252 (202.*.*.252) Destination: 202.*.*.19 (202.*.*.19) User Datagram Protocol, Src Port: 61863 (61863), Dst Port: 5060 (5060) Source port: 61863 (61863) Destination port: 5060 (5060) Length: 510 Checksum: 0xde85 (correct) Session Initiation Protocol Request line: REGISTER sip:server.pol.net.in SIP/2.0 Message Header Via: SIP/2.0/UDP 192.168.1.18:15992 Max-Forwards: 70 From: sip:102@server.pol.net.in;tag=ddb4f954b19811d8aafe00e01846e257;epid=b28b013e73 To: sip:102@server.pol.net.in Call-ID: ddb4f955b19811d8aafe00e01846e257@192.168.1.18 CSeq: 1 REGISTER Contact: sip:192.168.1.18:15992;methods="INVITE, MESSAGE, INFO, SUBSCRIBE, OPTIONS, BYE, CANCEL, NOTIFY, ACK, REFER" User-Agent: RTC/1.2.4949 Event: registration Allow-Events: presence Content-Length: 0
Frame 2 (687 bytes on wire, 687 bytes captured) Arrival Time: May 29, 2004 18:00:28.645466000 Time delta from previous packet: 0.001033000 seconds Time relative to first packet: 0.001033000 seconds Frame Number: 2 Packet Length: 687 bytes Capture Length: 687 bytes Ethernet II, Src: 00:e0:18:ed:04:61, Dst: 00:e0:2b:90:1f:00 Destination: 00:e0:2b:90:1f:00 (Extreme__90:1f:00) Source: 00:e0:18:ed:04:61 (Asustek__ed:04:61) Type: IP (0x0800) Internet Protocol, Src Addr: 202.*.*.19 (202.*.*.19), Dst Addr: 202.*.*.252 (202.*.*.252) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00) 0001 00.. = Differentiated Services Codepoint: Unknown (0x04) .... ..0. = ECN-Capable Transport (ECT): 0 .... ...0 = ECN-CE: 0 Total Length: 673 Identification: 0x0000 Flags: 0x04 .1.. = Don't fragment: Set ..0. = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: UDP (0x11) Header checksum: 0x8ea9 (correct) Source: 202.*.*.19 (202.*.*.19) Destination: 202.*.*.252 (202.*.*.252) User Datagram Protocol, Src Port: 5060 (5060), Dst Port: 61863 (61863) Source port: 5060 (5060) Destination port: 61863 (61863) Length: 653 Checksum: 0x7bd2 (correct) Session Initiation Protocol Status line: SIP/2.0 200 OK Message Header Via: SIP/2.0/UDP 192.168.1.18:15992;rport=61863;received=202.65.148.252 From: sip:102@server.pol.net.in;tag=ddb4f954b19811d8aafe00e01846e257;epid=b28b013e73 To: sip:102@server.pol.net.in;tag=b27e1a1d33761e85846fc98f5f3a7e58.7f7e Call-ID: ddb4f955b19811d8aafe00e01846e257@192.168.1.18 CSeq: 1 REGISTER Contact: sip:202.*.*.252:61863;q=0.00;expires=3600 Server: Sip EXpress router (0.8.12-tcp_nonb (i386/linux)) Content-Length: 0 Warning: 392 202.*.*.19:5060 "Noisy feedback tells: pid=3779 req_src_ip=202.*.*.252 req_src_port=61863 in_uri=sip:server.pol.net.in out_uri=sip:server.pol.net.in via_cnt==1"
Frame 3 (46 bytes on wire, 46 bytes captured) Arrival Time: May 29, 2004 18:00:54.592260000 Time delta from previous packet: 25.946794000 seconds Time relative to first packet: 25.947827000 seconds Frame Number: 3 Packet Length: 46 bytes Capture Length: 46 bytes Ethernet II, Src: 00:e0:18:ed:04:61, Dst: 00:e0:2b:90:1f:00 Destination: 00:e0:2b:90:1f:00 (Extreme__90:1f:00) Source: 00:e0:18:ed:04:61 (Asustek__ed:04:61) Type: IP (0x0800) Internet Protocol, Src Addr: 202.*.*.19 (202.*.*.19), Dst Addr: 202.*.*.252 (202.*.*.252) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00) 0001 00.. = Differentiated Services Codepoint: Unknown (0x04) .... ..0. = ECN-Capable Transport (ECT): 0 .... ...0 = ECN-CE: 0 Total Length: 32 Identification: 0x0000 Flags: 0x04 .1.. = Don't fragment: Set ..0. = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: UDP (0x11) Header checksum: 0x912a (correct) Source: 202.*.*.19 (202.*.*.19) Destination: 202.*.*.252 (202.*.*.252) User Datagram Protocol, Src Port: 5060 (5060), Dst Port: 61863 (61863) Source port: 5060 (5060) Destination port: 61863 (61863) Length: 12 Checksum: 0x50d7 (correct) [Malformed Packet: SIP] **********************************************
__________________________________ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/
I guess the mailformed packets are the NAT-pings (keep alive messages). These messages are correct, but ethereal does not recognize it.
klaus
varala ramakanth wrote:
hello friends,
iam having the rel_0_8_12 running
when i am registering with windows messenger from a
nat client
its ethereal report show that malformed sip packet
so whats the problem?
ser( 202.*.*.19)-->dhcp nat(202.*.*.252)-->private ip(192.168.1.18)msn messenger 4.7
please guide me
with reagards rama kanth
this is the log message iam getting when debug =8
6(3777) SIP Request: 6(3777) method: <REGISTER> 6(3777) uri: sip:server.pol.net.in 6(3777) version: <SIP/2.0> 6(3777) parse_headers: flags=1 6(3777) end of header reached, state=5 6(3777) parse_headers: Via found, flags=1 6(3777) parse_headers: this is the first via 6(3777) After parse_msg... 6(3777) preparing to run routing scripts... 6(3777) DEBUG : is_maxfwd_present: searching for max_forwards header 6(3777) parse_headers: flags=128 6(3777) DEBUG: is_maxfwd_present: value = 70 6(3777) check_via_address(202.*.*.252, 192.168.1.18, 0) 6(3777) LOG: Someone trying to register from private IP, rewriting 6(3777) parse_headers: flags=64 6(3777) end of header reached, state=9 6(3777) DEBUG: get_hdr_field: <To> [29]; uri=[sip:102@server.pol.net.in] 6(3777) DEBUG: to body [sip:102@server.pol.net.in ] 6(3777) get_hdr_field: cseq <CSeq>: <2> <REGISTER> 6(3777) parse_headers: flags=256 6(3777) DEBUG: get_hdr_body : content_length=0 6(3777) found end of header 6(3777) find_first_route(): No Route headers found 6(3777) loose_route(): There is no Route HF 6(3777) check_self - checking if host==us: 17==9 && [server.pol.net.in] == [127.0.0.1] 6(3777) check_self - checking if port 5060 matches port 5060 6(3777) check_self - checking if host==us: 17==13 && [server.pol.net.in] == [202.*.*.19] 6(3777) check_self - checking if port 5060 matches port 5060 6(3777) check_self - checking if host==us: 17==9 && [server.pol.net.in] == [127.0.0.1] 6(3777) check_self - checking if port 5060 matches port 5060 6(3777) check_self - checking if host==us: 17==13 && [server.pol.net.in] == [202.*.*.19] 6(3777) check_self - checking if port 5060 matches port 5060 6(3777) parse_headers: flags=-1 6(3777) parse_headers: flags=-1 6(3777) check_via_address(202.*.*.252, 192.168.1.18, 0) 6(3777) receive_msg: cleaning up
the ethereal report is
Frame 1 (544 bytes on wire, 544 bytes captured) Arrival Time: May 29, 2004 18:00:28.644433000 Time delta from previous packet: 0.000000000 seconds Time relative to first packet: 0.000000000 seconds Frame Number: 1 Packet Length: 544 bytes Capture Length: 544 bytes Ethernet II, Src: 00:e0:2b:90:1f:00, Dst: 00:e0:18:ed:04:61 Destination: 00:e0:18:ed:04:61 (Asustek__ed:04:61) Source: 00:e0:2b:90:1f:00 (Extreme__90:1f:00) Type: IP (0x0800) Internet Protocol, Src Addr: 202.65.148.252 (202.65.148.252), Dst Addr: 202.65.128.19 (202.65.128.19) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00) 0000 00.. = Differentiated Services Codepoint: Default (0x00) .... ..0. = ECN-Capable Transport (ECT): 0 .... ...0 = ECN-CE: 0 Total Length: 530 Identification: 0xcc8e Flags: 0x00 .0.. = Don't fragment: Not set ..0. = More fragments: Not set Fragment offset: 0 Time to live: 125 Protocol: UDP (0x11) Header checksum: 0xc5b9 (correct) Source: 202.*.*.252 (202.*.*.252) Destination: 202.*.*.19 (202.*.*.19) User Datagram Protocol, Src Port: 61863 (61863), Dst Port: 5060 (5060) Source port: 61863 (61863) Destination port: 5060 (5060) Length: 510 Checksum: 0xde85 (correct) Session Initiation Protocol Request line: REGISTER sip:server.pol.net.in SIP/2.0 Message Header Via: SIP/2.0/UDP 192.168.1.18:15992 Max-Forwards: 70 From: sip:102@server.pol.net.in;tag=ddb4f954b19811d8aafe00e01846e257;epid=b28b013e73 To: sip:102@server.pol.net.in Call-ID: ddb4f955b19811d8aafe00e01846e257@192.168.1.18 CSeq: 1 REGISTER Contact: sip:192.168.1.18:15992;methods="INVITE, MESSAGE, INFO, SUBSCRIBE, OPTIONS, BYE, CANCEL, NOTIFY, ACK, REFER" User-Agent: RTC/1.2.4949 Event: registration Allow-Events: presence Content-Length: 0
Frame 2 (687 bytes on wire, 687 bytes captured) Arrival Time: May 29, 2004 18:00:28.645466000 Time delta from previous packet: 0.001033000 seconds Time relative to first packet: 0.001033000 seconds Frame Number: 2 Packet Length: 687 bytes Capture Length: 687 bytes Ethernet II, Src: 00:e0:18:ed:04:61, Dst: 00:e0:2b:90:1f:00 Destination: 00:e0:2b:90:1f:00 (Extreme__90:1f:00) Source: 00:e0:18:ed:04:61 (Asustek__ed:04:61) Type: IP (0x0800) Internet Protocol, Src Addr: 202.*.*.19 (202.*.*.19), Dst Addr: 202.*.*.252 (202.*.*.252) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00) 0001 00.. = Differentiated Services Codepoint: Unknown (0x04) .... ..0. = ECN-Capable Transport (ECT): 0 .... ...0 = ECN-CE: 0 Total Length: 673 Identification: 0x0000 Flags: 0x04 .1.. = Don't fragment: Set ..0. = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: UDP (0x11) Header checksum: 0x8ea9 (correct) Source: 202.*.*.19 (202.*.*.19) Destination: 202.*.*.252 (202.*.*.252) User Datagram Protocol, Src Port: 5060 (5060), Dst Port: 61863 (61863) Source port: 5060 (5060) Destination port: 61863 (61863) Length: 653 Checksum: 0x7bd2 (correct) Session Initiation Protocol Status line: SIP/2.0 200 OK Message Header Via: SIP/2.0/UDP 192.168.1.18:15992;rport=61863;received=202.65.148.252 From: sip:102@server.pol.net.in;tag=ddb4f954b19811d8aafe00e01846e257;epid=b28b013e73 To: sip:102@server.pol.net.in;tag=b27e1a1d33761e85846fc98f5f3a7e58.7f7e Call-ID: ddb4f955b19811d8aafe00e01846e257@192.168.1.18 CSeq: 1 REGISTER Contact: sip:202.*.*.252:61863;q=0.00;expires=3600 Server: Sip EXpress router (0.8.12-tcp_nonb (i386/linux)) Content-Length: 0 Warning: 392 202.*.*.19:5060 "Noisy feedback tells: pid=3779 req_src_ip=202.*.*.252 req_src_port=61863 in_uri=sip:server.pol.net.in out_uri=sip:server.pol.net.in via_cnt==1"
Frame 3 (46 bytes on wire, 46 bytes captured) Arrival Time: May 29, 2004 18:00:54.592260000 Time delta from previous packet: 25.946794000 seconds Time relative to first packet: 25.947827000 seconds Frame Number: 3 Packet Length: 46 bytes Capture Length: 46 bytes Ethernet II, Src: 00:e0:18:ed:04:61, Dst: 00:e0:2b:90:1f:00 Destination: 00:e0:2b:90:1f:00 (Extreme__90:1f:00) Source: 00:e0:18:ed:04:61 (Asustek__ed:04:61) Type: IP (0x0800) Internet Protocol, Src Addr: 202.*.*.19 (202.*.*.19), Dst Addr: 202.*.*.252 (202.*.*.252) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00) 0001 00.. = Differentiated Services Codepoint: Unknown (0x04) .... ..0. = ECN-Capable Transport (ECT): 0 .... ...0 = ECN-CE: 0 Total Length: 32 Identification: 0x0000 Flags: 0x04 .1.. = Don't fragment: Set ..0. = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: UDP (0x11) Header checksum: 0x912a (correct) Source: 202.*.*.19 (202.*.*.19) Destination: 202.*.*.252 (202.*.*.252) User Datagram Protocol, Src Port: 5060 (5060), Dst Port: 61863 (61863) Source port: 5060 (5060) Destination port: 61863 (61863) Length: 12 Checksum: 0x50d7 (correct) [Malformed Packet: SIP]
__________________________________ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/
Serusers mailing list serusers@lists.iptel.org http://lists.iptel.org/mailman/listinfo/serusers