Interesting .. but 1.4.0 does not break with the same "semantically illegality" .. what's changed in 1.4.1 ..?
Does a work around exist ..? Ehi Rancard Solutions Ltd. web: www.rancardsolutions.com email: [EMAIL PROTECTED] mobile: +233.27.622.1212 office: +233.21.782.949 -----Original Message----- From: Stipe Tolj [mailto:[EMAIL PROTECTED] Sent: Friday, November 10, 2006 12:07 PM Cc: 'Kannel Development list' Subject: Re: Destination address problem with 1.4.1 Ehizogie Binitie wrote: > Hi , > I have two versions of Kannel . 1.4.0 and 1.4.1 on two different servers > with exactly the same conf file. > When I run the server with 1.4.0 and text a keyword to a shortcode I dont > get an error. > > When I run the server with 1.4.1 and send the exact same message, I get > feedback from the SMSC saying that > Your message could not be completed > > Kannel logs indicate that the problem could be with the ton settings > 2006-11-10 06:43:01 [9216] [9] ERROR: SMPP[mySMSC]: Mallformed addr `XXX', > expected at least 7 digits. > > I have tried explicitly setting source-addr-autodetect to yes but to no > avail. > Does anyone have an idea why this could be happening..? > > > The logs are shown below > > 2006-11-10 06:42:58 [9216] [18] DEBUG: Dumping 0 messages to store > 2006-11-10 06:42:58 [9216] [1] DEBUG: HTTP: Destroying HTTPClient area > 0x8ed1a40. > 2006-11-10 06:42:58 [9216] [1] DEBUG: HTTP: Destroying HTTPClient for > `127.0.0.1'. > 2006-11-10 06:42:59 [9216] [23] DEBUG: boxc_receiver: heartbeat with load > value 0 received > 2006-11-10 06:43:01 [9216] [9] DEBUG: SMPP[myBuzz]: Got PDU: > 2006-11-10 06:43:01 [9216] [9] DEBUG: SMPP PDU 0x8ecd2a0 dump: > 2006-11-10 06:43:01 [9216] [9] DEBUG: type_name: deliver_sm > 2006-11-10 06:43:01 [9216] [9] DEBUG: command_id: 5 = 0x00000005 > 2006-11-10 06:43:01 [9216] [9] DEBUG: command_status: 0 = 0x00000000 > 2006-11-10 06:43:01 [9216] [9] DEBUG: sequence_number: 30202211 = > 0x01ccd963 > 2006-11-10 06:43:01 [9216] [9] DEBUG: service_type: "1001" > 2006-11-10 06:43:01 [9216] [9] DEBUG: source_addr_ton: 1 = 0x00000001 > > 2006-11-10 06:43:01 [9216] [9] DEBUG: source_addr_npi: 1 = 0x00000001 > 2006-11-10 06:43:01 [9216] [9] DEBUG: source_addr: "XXXXXXXXXXXX" > 2006-11-10 06:43:01 [9216] [9] DEBUG: dest_addr_ton: 1 = 0x00000001 > 2006-11-10 06:43:01 [9216] [9] DEBUG: dest_addr_npi: 1 = 0x00000001 > 2006-11-10 06:43:01 [9216] [9] DEBUG: destination_addr: "XXX" > 2006-11-10 06:43:01 [9216] [9] DEBUG: esm_class: 0 = 0x00000000 > 2006-11-10 06:43:01 [9216] [9] DEBUG: protocol_id: 0 = 0x00000000 > 2006-11-10 06:43:01 [9216] [9] DEBUG: priority_flag: 0 = 0x00000000 > 2006-11-10 06:43:01 [9216] [9] DEBUG: schedule_delivery_time: NULL > 2006-11-10 06:43:01 [9216] [9] DEBUG: validity_period: NULL > 2006-11-10 06:43:01 [9216] [9] DEBUG: registered_delivery: 0 = 0x00000000 > 2006-11-10 06:43:01 [9216] [9] DEBUG: replace_if_present_flag: 0 = > 0x00000000 > 2006-11-10 06:43:01 [9216] [9] DEBUG: data_coding: 242 = 0x000000f2 > 2006-11-10 06:43:01 [9216] [9] DEBUG: sm_default_msg_id: 0 = 0x00000000 > 2006-11-10 06:43:01 [9216] [9] DEBUG: sm_length: 2 = 0x00000002 > 2006-11-10 06:43:01 [9216] [9] DEBUG: short_message: "in" > 2006-11-10 06:43:01 [9216] [9] DEBUG: SMPP PDU dump ends. > 2006-11-10 06:43:01 [9216] [9] ERROR: SMPP[mySMSC]: Mallformed addr `801', > expected at least 7 digits. this is correct... since it's "semantically illegal" to use a combination on TON=1 and addr value <7 digits. This would "mean", that there exist an international destination number with less then 7 digits, there is no such in real life. This is obviously a internal network addr, so it should be using TON=0 for destination addr. Stipe ------------------------------------------------------------------- Kölner Landstrasse 419 40589 Düsseldorf, NRW, Germany tolj.org system architecture Kannel Software Foundation (KSF) http://www.tolj.org/ http://www.kannel.org/ mailto:st_{at}_tolj.org mailto:stolj_{at}_kannel.org ------------------------------------------------------------------- -- No virus found in this incoming message. Checked by AVG Free Edition. Version: 7.1.409 / Virus Database: 268.14.1/527 - Release Date: 11/9/2006 -- No virus found in this outgoing message. Checked by AVG Free Edition. Version: 7.1.409 / Virus Database: 268.14.1/527 - Release Date: 11/9/2006
