Hello,
I am trying to set up a Webrtc by using Kamailio, Asterisk and Rtpengine. So
far, everything is working fine , I'm able to register an extension and make a
call, but for some reason, when i'm trying to call a WebRTC extension from any
SIP Extension from Asterisk, Kamailio is sending INVITE, WebRTC extension is
sending back 200 OK, and then Kamailio is trying to send an ACK through UDP
protocol, and not through wss, as it's supposed to do.
In console, I see:
Sep 21 20:39:06 vsphone3-sbc /usr/sbin/kamailio[9756]: WARNING: {1 102 ACK
[email protected]:5060} <core> [core/forward.c:231]:
get_send_socket2(): protocol/port mismatch (forced tls:172.16.11.57:8443, to
udp:187.20.56.83:27730)
My scenario is:
Internet -> Firewall -> Kamailio -> Asterisk
Working:
Softphone -> Kamailio -> Asterisk (TCP/UDP/TLS(SRTP)
Asterisk -> Kamailio -> Softphone (TCP/UDP/TLS(SRTP))
Webrtc -> Kamailio -> Asterisk (WSS)
Not Working:
Asterisk -> Kamailio -> Webrtc
After a answer from Webrtc, I can listen sound, so, RTP in theory is fine.
Webrtc send 200 OK to Kamailio
Kamailio Send 200 OK to Asterisk.
Asterisk Send ACK to Kamailio
ACK not forwarded to Webrtc.
In attachment, my kamailio.cfg
Every Help is welcome.
Thanks
Neimar.
#!KAMAILIO
#!define WITH_PGSQL
#!define WITH_AUTH
#!define WITH_NAT
#!define WITH_USRLOCDB
#!define WITH_VSPHONE
#!define WITH_MULTIDOMAIN
#!define WITH_ANTIFLOOD
#!define WITH_TLS
#!define WITH_WEBSOCKETS
#!define KAMAILIO_LAN udp:172.16.11.57:5060
#!define KAMAILIO_LAN_TCP tcp:172.16.11.57:5060
#
# Kamailio (OpenSER) SIP Server v5.3 - default configuration script
# - web: https://www.kamailio.org
# - git: https://github.com/kamailio/kamailio
#
# Direct your questions about this file to: <[email protected]>
#
# Refer to the Core CookBook at https://www.kamailio.org/wiki/
# for an explanation of possible statements, functions and parameters.
#
# Note: the comments can be:
# - lines starting with #, but not the pre-processor directives,
# which start with #!, like #!define, #!ifdef, #!endif, #!else, #!trydef,
# #!subst, #!substdef, ...
# - lines starting with //
# - blocks enclosed in between /* */
#
# Several features can be enabled using '#!define WITH_FEATURE' directives:
#
# *** To run in debug mode:
# - define WITH_DEBUG
#
# *** To enable mysql:
# - define WITH_PGSQL
#
# *** To enable authentication execute:
# - enable mysql
# - define WITH_AUTH
# - add users using 'kamctl'
#
# *** To enable IP authentication execute:
# - enable mysql
# - enable authentication
# - define WITH_IPAUTH
# - add IP addresses with group id '1' to 'address' table
#
# *** To enable persistent user location execute:
# - enable mysql
# - define WITH_USRLOCDB
#
# *** To enable presence server execute:
# - enable mysql
# - define WITH_PRESENCE
#
# *** To enable nat traversal execute:
# - define WITH_NAT
# - install RTPProxy: http://www.rtpproxy.org
# - start RTPProxy:
# rtpproxy -l _your_public_ip_ -s udp:localhost:7722
# - option for NAT SIP OPTIONS keepalives: WITH_NATSIPPING
#
# *** To enable PSTN gateway routing execute:
# - define WITH_PSTN
# - set the value of pstn.gw_ip
# - check route[PSTN] for regexp routing condition
#
# *** To enable database aliases lookup execute:
# - enable mysql
# - define WITH_ALIASDB
#
# *** To enable speed dial lookup execute:
# - enable mysql
# - define WITH_SPEEDDIAL
#
# *** To enable multi-domain support execute:
# - enable mysql
# - define WITH_MULTIDOMAIN
#
# *** To enable TLS support execute:
# - adjust CFGDIR/tls.cfg as needed
# - define WITH_TLS
#
# *** To enable XMLRPC support execute:
# - define WITH_XMLRPC
# - adjust route[XMLRPC] for access policy
#
# *** To enable anti-flood detection execute:
# - adjust pike and htable=>ipban settings as needed (default is
# block if more than 16 requests in 2 seconds and ban for 300 seconds)
# - define WITH_ANTIFLOOD
#
# *** To block 3XX redirect replies execute:
# - define WITH_BLOCK3XX
#
# *** To block 401 and 407 authentication replies execute:
# - define WITH_BLOCK401407
#
# *** To enable VoiceMail routing execute:
# - define WITH_VOICEMAIL
# - set the value of voicemail.srv_ip
# - adjust the value of voicemail.srv_port
#
# *** To enhance accounting execute:
# - enable mysql
# - define WITH_ACCDB
# - add following columns to database
####### Include Local Config If Exists #########
import_file "kamailio-local.cfg"
####### Defined Values #########
# *** Value defines - IDs used later in config
#!ifdef WITH_PGSQL
# - database URL - used to connect to database server by modules such
# as: auth_db, acc, usrloc, a.s.o.
#!ifndef DBURL
#!define DBURL "postgres://postgres:password@localhost/kamailio"
#!endif
#!endif
#!ifdef WITH_MULTIDOMAIN
# - the value for 'use_domain' parameters
#!define MULTIDOMAIN 1
#!else
#!define MULTIDOMAIN 0
#!endif
#!ifndef VSPHONEDBURL
#!define VSPHONEDBURL "postgres://postgres:password@localhost/kamailio"
#!endif
# - flags
# FLT_ - per transaction (message) flags
# FLB_ - per branch flags
#!define FLT_ACC 1
#!define FLT_ACCMISSED 2
#!define FLT_ACCFAILED 3
#!define FLT_NATS 5
#!define FLB_NATB 6
#!define FLB_NATSIPPING 7
#!define FLB_RTPWS 8
####### Global Parameters #########
### LOG Levels: 3=DBG, 2=INFO, 1=NOTICE, 0=WARN, -1=ERR
#!ifdef WITH_DEBUG
debug=3
log_stderror=yes
#!else
debug=2
log_stderror=no
#!endif
memdbg=5
memlog=5
log_facility=LOG_LOCAL0
log_prefix="{$mt $hdr(CSeq) $ci} "
/* number of SIP routing processes for each UDP socket
* - value inherited by tcp_children and sctp_children when not set explicitely
*/
children=2
/* uncomment the next line to disable TCP (default on) */
# disable_tcp=yes
/* number of SIP routing processes for all TCP/TLS sockets */
tcp_children=2
/* uncomment the next line to disable the auto discovery of local aliases
* based on reverse DNS on IPs (default on) */
auto_aliases=no
server_id=0
server_signature=no
sip_warning=0
tcp_accept_no_cl=yes
/* add local domain aliases */
/* uncomment and configure the following line if you want Kamailio to
* bind on a specific interface/port/proto (default bind on all available) */
listen=tcp:172.16.11.57:5060 advertise 200.200.200.125:5060
listen=udp:172.16.11.57:5060 advertise 200.200.200.125:5060
listen=tls:172.16.11.57:5061 advertise 200.200.200.125:5061
listen=tls:172.16.11.57:8443 advertise 200.200.200.125:8443
listen=KAMAILIO_LAN_TCP
/* life time of TCP connection when there is no traffic
* - a bit higher than registration expires to cope with UA behind NAT */
tcp_connection_lifetime=3605
/* upper limit for TCP connections (it includes the TLS connections) */
tcp_max_connections=2048
#!ifdef WITH_TLS
enable_tls=yes
/* upper limit for TLS connections */
tls_max_connections=2048
#!endif
####### Custom Parameters #########
/* These parameters can be modified runtime via RPC interface
* - see the documentation of 'cfg_rpc' module.
*
* Format: group.id = value 'desc' description
* Access: $sel(cfg_get.group.id) or @cfg_get.group.id */
#user_agent_header=""
####### Modules Section ########
/* set paths to location of modules */
# mpath="/usr/lib64/kamailio/modules/"
#!ifdef WITH_PGSQL
loadmodule "db_postgres.so"
#!endif
loadmodule "jsonrpcs.so"
loadmodule "kex.so"
loadmodule "corex.so"
loadmodule "tm.so"
loadmodule "tmx.so"
loadmodule "sl.so"
loadmodule "rr.so"
loadmodule "pv.so"
loadmodule "maxfwd.so"
loadmodule "usrloc.so"
loadmodule "registrar.so"
loadmodule "textops.so"
loadmodule "siputils.so"
loadmodule "xlog.so"
loadmodule "sanity.so"
loadmodule "ctl.so"
loadmodule "cfg_rpc.so"
loadmodule "acc.so"
loadmodule "counters.so"
loadmodule "outbound.so"
loadmodule "stun.so"
#!ifdef WITH_AUTH
loadmodule "auth.so"
loadmodule "auth_db.so"
#!ifdef WITH_IPAUTH
loadmodule "permissions.so"
#!endif
#!endif
#!ifdef WITH_ALIASDB
loadmodule "alias_db.so"
#!endif
#!ifdef WITH_SPEEDDIAL
loadmodule "speeddial.so"
#!endif
#!ifdef WITH_MULTIDOMAIN
loadmodule "domain.so"
#!endif
#!ifdef WITH_PRESENCE
loadmodule "presence.so"
loadmodule "presence_xml.so"
#!endif
#!ifdef WITH_NAT
loadmodule "nathelper.so"
loadmodule "rtpengine.so"
#!endif
#!ifdef WITH_TLS
loadmodule "tls.so"
#!endif
#loadmodule "dmq.so"
#loadmodule "dmq_usrloc.so"
#!ifdef WITH_ANTIFLOOD
loadmodule "htable.so"
loadmodule "pike.so"
#!endif
#!ifdef WITH_XMLRPC
loadmodule "xmlrpc.so"
#!endif
#!ifdef WITH_DEBUG
loadmodule "debugger.so"
#!endif
#!ifdef WITH_VSPHONE
loadmodule "uac.so"
#!endif
loadmodule "topoh.so"
loadmodule "jansson.so"
loadmodule "sdpops.so"
loadmodule "xhttp.so"
#loadmodule "geoip2.so"
#loadmodule "rabbitmq.so"
#!ifdef WITH_WEBSOCKETS
loadmodule "websocket.so"
#!endif
#modparam("geoip2", "path", "/etc/kamailio/GeoLite2-City.mmdb")
modparam("topoh", "mask_key", "vsphone")
modparam("topoh", "mask_ip", "10.10.10.1")
#modparam("rabbitmq", "url", "amqp://kamailio:luandabh001@localhost:5672")
# ----- jsonrpcs params -----
modparam("jsonrpcs", "pretty_format", 1)
modparam("jsonrpcs", "transport", 0)
/* set the path to RPC fifo control file */
# modparam("jsonrpcs", "fifo_name", "/var/run/kamailio/kamailio_rpc.fifo")
modparam("jsonrpcs", "fifo_name", "/var/run/kamailio/kamailio_rpc.fifo")
/* set the path to RPC unix socket control file */
# modparam("jsonrpcs", "dgram_socket", "/var/run/kamailio/kamailio_rpc.sock")
modparam("jsonrpcs", "dgram_socket", "udp:127.0.0.1:8090")
# ----- ctl params -----
/* set the path to RPC unix socket control file */
# modparam("ctl", "binrpc", "unix:/var/run/kamailio/kamailio_ctl")
# ----- sanity params -----
modparam("sanity", "autodrop", 0)
# ----- tm params -----
# auto-discard branches from previous serial forking leg
modparam("tm", "failure_reply_mode", 3)
# default retransmission timeout: 30sec
modparam("tm", "fr_timer", 30000)
# default invite retransmission timeout after 1xx: 120sec
modparam("tm", "fr_inv_timer", 120000)
# ----- rr params -----
# set next param to 1 to add value to ;lr param (helps with some UAs)
modparam("rr", "enable_full_lr", 1)
# do not append from tag to the RR (no need for this script)
#!ifdef WITH_VSPHONE
modparam("rr", "append_fromtag", 1)
#!else
modparam("rr", "append_fromtag", 0)
#!endif
modparam("rr", "enable_double_rr", 2)
# ----- registrar params -----
modparam("registrar", "method_filtering", 1)
/* uncomment the next line to disable parallel forking via location */
# modparam("registrar", "append_branches", 0)
/* uncomment the next line not to allow more than 10 contacts per AOR */
# modparam("registrar", "max_contacts", 10)
/* max value for expires of registrations */
modparam("registrar", "max_expires", 3600)
/* set it to 1 to enable GRUU */
modparam("registrar", "gruu_enabled", 0)
# ----- acc params -----
/* what special events should be accounted ? */
modparam("acc", "early_media", 0)
modparam("acc", "report_ack", 0)
modparam("acc", "report_cancels", 0)
/* by default ww do not adjust the direct of the sequential requests.
* if you enable this parameter, be sure the enable "append_fromtag"
* in "rr" module */
modparam("acc", "detect_direction", 0)
/* account triggers (flags) */
modparam("acc", "log_flag", FLT_ACC)
modparam("acc", "log_missed_flag", FLT_ACCMISSED)
modparam("acc", "log_extra",
"src_user=$fU;src_domain=$fd;src_ip=$si;"
"dst_ouser=$tU;dst_user=$rU;dst_domain=$rd")
modparam("acc", "failed_transaction_flag", FLT_ACCFAILED)
/* enhanced DB accounting */
#!ifdef WITH_ACCDB
modparam("acc", "db_flag", FLT_ACC)
modparam("acc", "db_missed_flag", FLT_ACCMISSED)
modparam("acc", "db_url", DBURL)
modparam("acc", "db_extra",
"src_user=$fU;src_domain=$fd;src_ip=$si;"
"dst_ouser=$tU;dst_user=$rU;dst_domain=$rd")
#!endif
# ----- usrloc params -----
/* enable DB persistency for location entries */
#!ifdef WITH_USRLOCDB
modparam("usrloc", "db_url", DBURL)
modparam("usrloc", "db_mode", 2)
modparam("usrloc", "use_domain", MULTIDOMAIN)
modparam("usrloc", "db_insert_update", 1)
#!endif
# ----- auth_db params -----
#!ifdef WITH_AUTH
modparam("auth_db", "db_url", VSPHONEDBURL)
modparam("auth_db", "calculate_ha1", 1)
modparam("auth_db", "user_column", "login")
modparam("auth_db", "password_column", "senha")
modparam("auth_db", "domain_column", "dominio")
modparam("auth_db", "use_domain", MULTIDOMAIN)
modparam("auth_db", "version_table", 0)
# ----- permissions params -----
#!ifdef WITH_IPAUTH
modparam("permissions", "db_url", DBURL)
modparam("permissions", "db_mode", 1)
#!endif
#!endif
# ----- alias_db params -----
#!ifdef WITH_ALIASDB
modparam("alias_db", "db_url", DBURL)
modparam("alias_db", "use_domain", 1)
#!endif
# ----- speeddial params -----
#!ifdef WITH_SPEEDDIAL
modparam("speeddial", "db_url", DBURL)
modparam("speeddial", "use_domain", MULTIDOMAIN)
#!endif
# ----- domain params -----
#!ifdef WITH_MULTIDOMAIN
modparam("domain", "db_url", VSPHONEDBURL)
modparam("domain", "domain_table", "vw_kamailio_domain")
modparam("domain", "domain_col", "dominio")
/* register callback to match myself condition with domains list */
modparam("domain", "register_myself", 1)
#!endif
#!ifdef WITH_PRESENCE
# ----- presence params -----
modparam("presence", "db_url", DBURL)
# ----- presence_xml params -----
modparam("presence_xml", "db_url", DBURL)
modparam("presence_xml", "force_active", 1)
#!endif
#!ifdef WITH_NAT
# ----- rtpproxy params -----
modparam("rtpengine", "rtpengine_sock", "udp:127.0.0.1:2223")
# ----- nathelper params -----
modparam("nathelper", "natping_interval", 30)
modparam("nathelper", "ping_nated_only", 1)
modparam("nathelper", "sipping_bflag", FLB_NATSIPPING)
modparam("nathelper", "sipping_from", "sip:[email protected]")
# params needed for NAT traversal in other modules
modparam("nathelper|registrar", "received_avp", "$avp(RECEIVED)")
modparam("usrloc", "nat_bflag", FLB_NATB)
#!endif
#!ifdef WITH_TLS
# ----- tls params -----
modparam("tls", "config", "/etc/kamailio/tls.cfg")
#!endif
#!ifdef WITH_ANTIFLOOD
# ----- pike params -----
modparam("pike", "sampling_time_unit", 2)
modparam("pike", "reqs_density_per_unit", 16)
modparam("pike", "remove_latency", 4)
#modparam("dmq", "server_address", "sip:172.16.11.57:5060")
#modparam("dmq", "notification_address", "sip:192.168.50.176:5060")
#modparam("dmq", "multi_notify", 1)
#modparam("dmq", "num_workers", 4)
#modparam("dmq", "ping_interval", 15)
#modparam("dmq_usrloc", "enable", 1)
# ----- htable params -----
/* ip ban htable with autoexpire after 5 minutes */
#modparam("htable", "enable_dmq", 1)
#modparam("htable", "dmq_init_sync", 1)
modparam("htable", "db_url",
"postgres://postgres:kamailiorw@localhost/kamailio")
modparam("htable", "htable", "ipban=>size=8;autoexpire=300;dmqreplicate=1")
modparam("htable", "htable", "ramal=>size=8;dbtable=vw_kamailio_server")
#!endif
#!ifdef WITH_XMLRPC
# ----- xmlrpc params -----
modparam("xmlrpc", "route", "XMLRPC");
modparam("xmlrpc", "url_match", "^/RPC")
#!endif
#!ifdef WITH_DEBUG
# ----- debugger params -----
modparam("debugger", "cfgtrace", 1)
modparam("debugger", "log_level_name", "exec")
#!endif
####### Routing Logic ########
event_route[xhttp:request] {
set_reply_close();
set_reply_no_connect();
if ($Rp != 8443
#!ifdef WITH_TLS
&& $Rp != 8444
#!endif
) {
xlog("L_WARN", "HTTP request received on $Rp\n");
xhttp_reply("403", "Forbidden", "", "");
exit;
}
xlog("L_INFO", "HTTP Request Received\n");
if ($hdr(Upgrade) =~ "websocket"
&& $hdr(Connection) =~ "Upgrade"
&& $rm =~ "GET"
) {
# Validate Host - make sure the client is using the correct
# alias for WebSockets
if ($hdr(Host) == $null || !is_myself("sip:" + $hdr(Host))) {
xlog("L_WARN", "Bad host $hdr(Host)\n");
xhttp_reply("403", "Forbidden", "", "");
exit;
}
# Optional... validate Origin - make sure the client is from an
# authorised website. For example,
#
# if ($hdr(Origin) != "https://example.com"
# && $hdr(Origin) != "https://example.com") {
# xlog("L_WARN", "Unauthorised client $hdr(Origin)\n");
# xhttp_reply("403", "Forbidden", "", "");
# exit;
# }
# Optional... perform HTTP authentication
# ws_handle_handshake() exits (no further configuration file
# processing of the request) when complete.
if (ws_handle_handshake()) {
# Optional... cache some information about the
# successful connection
exit;
}
}
xhttp_reply("404", "Not Found", "", "");
}
event_route[websocket:closed] {
xlog("L_INFO", "WebSocket connection from $si:$sp has closed\n");
}
event_route[htable:expired:ipban] {
xlog("L_INFO","IP DESBLOQUEADO: $shtrecord(key) => $shtrecord(value)\n");
}
/* Main SIP request routing logic
* - processing of any incoming SIP request starts with this route
* - note: this is the same as route { ... } */
request_route {
# if ($rm == "KDMQ") {
# dmq_handle_message();
# exit;
# }
# per request initial checks
route(REQINIT);
# NAT detection
route(NATDETECT);
# handle requests within SIP dialogs
route(WITHINDLG);
### only initial requests (no To tag)
# CANCEL processing
if (is_method("CANCEL"))
{
if (t_check_trans())
t_relay();
exit;
}
t_check_trans();
# authentication
route(AUTH);
# record routing for dialog forming requests (in case they are routed)
# - remove preloaded route headers
remove_hf("Route");
if (is_method("INVITE|SUBSCRIBE"))
record_route();
# account only INVITEs
if (is_method("INVITE"))
{
setflag(FLT_ACC); # do accounting
}
# dispatch requests to foreign domains
route(SIPOUT);
### requests for my local domains
# handle presence related requests
route(PRESENCE);
# handle registrations
route(REGISTRAR);
if ($rU==$null)
{
# request with no Username in RURI
sl_send_reply("484","Address Incomplete");
exit;
}
# user location service
route(LOCATION);
route(RELAY);
}
route[RELAY] {
# enable additional event routes for forwarded requests
# - serial forking, RTP relaying handling, a.s.o.
if (is_method("INVITE|SUBSCRIBE")) {
t_on_branch("MANAGE_BRANCH");
t_on_reply("MANAGE_REPLY");
}
if (is_method("INVITE")) {
t_on_failure("MANAGE_FAILURE");
}
if (!t_relay()) {
sl_reply_error();
}
exit;
}
# Per SIP request initial checks
route[REQINIT] {
# if (dmq_is_from_node()) {
# return;
# }
if(route(FROMVSPHONE)){
return;
}
#!ifdef WITH_ANTIFLOOD
# flood dection from same IP and traffic ban for a while
# be sure you exclude checking trusted peers, such as pstn gateways
# - local host excluded (e.g., loop to self)
if(src_ip!=myself)
{
if($sht(ipban=>$si)!=$null)
{
# ip is already blocked
xdbg("request from blocked IP - $rm from $fu
(IP:$si:$sp)\n");
xlog("L_INFO","IP BLOQUEADO: $si - JA ESTA NA LSITA DE
BLOQUEIO: $rm from $fu \n");
exit;
}
if (!pike_check_req())
{
xlog("L_ALERT","ALERT: pike blocking $rm from $fu
(IP:$si:$sp)\n");
xlog("L_INFO","BLOQUEANDO IP: $si - BARRADO VIA PIKE:
$rm from $fu \n");
$sht(ipban=>$si) = 1;
exit;
}
}
#!endif
if (!is_domain_local("$fd")&&(!route(FROMVSPHONE))) {
xlog("L_INFO","BLOQUEIO: $si - NAO E DE DOMINIO
AUTORIZADO: $fd OU DE VSPHONE ($rm from $fu)\n");
;sl_send_reply("494", "IP BANNED");
;$sht(ipban=>$si) = 1;
exit;
}
if($ua =~
"friendly-scanner|sipcli|VaxSIPUserAgent|iWar|sipvicious|sipsak|sundayddr|pplsip")
{
xlog("L_INFO","BLOQUEIO: SCANNER SIP: $rm from $ua
(IP:$si:$sp)\n");
# silent drop for scanners - uncomment next line if
want to reply
# sl_send_reply("200", "OK");
exit;
}
#hostname in contact
if($sel(contact.uri.host) =~
"^(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})$") {
xlog("L_INFO","BLOQUEIO: TENTATIVA VINDA DE ACESSO POR IP E
NAO POR DNS: (IP:$si:$sp)\n");
exit;
}
if($au =~ "(\=)|(\-\-)|(')|(\#)|(\%27)|(\%24)" and $au !=
$null) {
xlog("L_INFO","BLOQUEIO: SQL INJECTION: (IP:$si:$sp)");
exit;
}
if($(hdr(Record-Route)[0]{nameaddr.uri}) != $si and
$(hdr(Record-Route)[0]{nameaddr.uri}) != $null) {
xlog("L_INFO","BLOQUEIO: ATAQUE SPOOFING: (IP:$si:$sp)");
exit;
}
if (!mf_process_maxfwd_header("10")) {
sl_send_reply("483","Too Many Hops");
exit;
}
if(!sanity_check("1511", "7"))
{
xlog("Malformed SIP message from $si:$sp\n");
exit;
}
}
# URI update for dialog requests
route[DLGURI] {
if (!isdsturiset()) {
handle_ruri_alias();
}
return;
}
# Handle requests within SIP dialogs
route[WITHINDLG] {
if (has_totag()) {
# sequential request withing a dialog should
# take the path determined by record-routing
if (loose_route()) {
#!ifdef WITH_WEBSOCKETS
if ($du == "") {
if (!handle_ruri_alias()) {
xlog("L_ERR", "Bad alias <$ru>\n");
sl_send_reply("400", "Bad Request");
exit;
}
}
#!endif
route(DLGURI);
if (is_method("ACK")) {
# ACK is forwarded statelessy
route(NATMANAGE);
} else if (is_method("NOTIFY")) {
# Add Record-Route for in-dialog NOTIFY as per
RFC 6665.
record_route();
}
route(RELAY);
} else {
if (is_method("SUBSCRIBE") && uri == myself) {
# in-dialog subscribe requests
route(PRESENCE);
exit;
}
if ( is_method("ACK") ) {
if ( t_check_trans() ) {
# no loose-route, but stateful ACK;
# must be an ACK after a 487
# or e.g. 404 from upstream server
t_relay();
exit;
} else {
# ACK without matching transaction ...
ignore and discard
exit;
}
}
sl_send_reply("404","Not here");
}
exit;
}
}
# Handle SIP registrations
route[REGISTRAR] {
if (is_method("REGISTER"))
{
if(isflagset(FLT_NATS))
{
setbflag(FLB_NATB);
# uncomment next line to do SIP NAT pinging
#setbflag(FLB_NATSIPPING);
}
if (!save("location"))
sl_reply_error();
#!ifdef WITH_VSPHONE
route(REGFWD);
#!endif
exit;
}
}
# USER location service
route[LOCATION] {
#!ifdef WITH_SPEEDIAL
# search for short dialing - 2-digit extension
if($rU=~"^[0-9][0-9]$")
if(sd_lookup("speed_dial"))
route(SIPOUT);
#!endif
#!ifdef WITH_ALIASDB
# search in DB-based aliases
if(alias_db_lookup("dbaliases"))
route(SIPOUT);
#!endif
#!ifdef WITH_VSPHONE
if(is_method("INVITE") && (!route(FROMVSPHONE))) {
if ($oP == "tls") {
if(!sdp_with_transport("RTP/SAVP")){
sl_send_reply("403","OPA. RTP NAO ESTA
CRIPTOGRAFADO.");
exit;
}
}
# if new call from out there - send to Asterisk
# - non-INVITE request are routed directly by Kamailio
# - traffic from Asterisk is routed also directy by Kamailio
route(TOVSPHONE);
exit;
}
#!endif
$avp(oexten) = $rU;
if (!lookup("location")) {
$var(rc) = $rc;
t_newtran();
switch ($var(rc)) {
case -1:
case -3:
send_reply("404", "Not Found");
exit;
case -2:
send_reply("405", "Method Not Allowed");
exit;
}
}
# when routing via usrloc, log the missed calls also
if (is_method("INVITE"))
{
setflag(FLT_ACCMISSED);
}
}
# Presence server route
route[PRESENCE] {
if(!is_method("PUBLISH|SUBSCRIBE"))
return;
#!ifdef WITH_VSPHONE
if(!route(FROMVSPHONE)) {
route(TOVSPHONE);
exit;
}
#!endif
#!ifdef WITH_PRESENCE
if (!t_newtran())
{
sl_reply_error();
exit;
};
if(is_method("PUBLISH"))
{
handle_publish();
t_release();
}
else
if( is_method("SUBSCRIBE"))
{
handle_subscribe();
t_release();
}
exit;
#!endif
# if presence enabled, this part will not be executed
if (is_method("PUBLISH") || $rU==$null)
{
sl_send_reply("404", "Not here");
exit;
}
return;
}
# Authentication route
route[AUTH] {
# if (dmq_is_from_node()) {
# return;
# }
# if caller is not local subscriber, then check if it calls
# a local destination, otherwise deny, not an open relay here
if (from_uri!=myself && uri!=myself)
{
sl_send_reply("403","Not relaying");
exit;
}
#!ifdef WITH_AUTH
#!ifdef WITH_VSPHONE
# do not auth traffic from Asterisk - trusted!
if(route(FROMVSPHONE))
return;
#!endif
#!ifdef WITH_IPAUTH
if((!is_method("REGISTER")) && allow_source_address())
{
# source IP allowed
return;
}
#!endif
if (is_method("REGISTER") || from_uri==myself)
{
# authenticate requests
#!ifdef WITH_VSPHONE
if (!auth_check("$fd", "vw_kamailio_users", "1")) {
#!else
if (!auth_check("$fd", "subscriber", "1")) {
#!endif
auth_challenge("$fd", "0");
exit;
}
# user authenticated - remove auth header
if(!is_method("REGISTER|PUBLISH"))
consume_credentials();
}
#!endif
return;
}
# Caller NAT detection route
route[NATDETECT] {
#!ifdef WITH_NAT
force_rport();
if (nat_uac_test("19")) {
if (is_method("REGISTER")) {
fix_nated_register();
} else if (is_first_hop()) {
fix_nated_contact();
}
setflag(FLT_NATS);
}
#!endif
return;
}
# RTPProxy control
route[NATMANAGE] {
#!ifdef WITH_NAT
if (is_request()) {
if(has_totag()) {
if(check_route_param("nat=yes")) {
setbflag(FLB_NATB);
}
if (check_route_param("rtp=ws")) {
setbflag(FLB_RTPWS);
}
}else{
if(!route(FROMVSPHONE)){
setbflag(FLB_NATB);
}
}
}
if(!route(FROMVSPHONE)){ //REDE PUBLICA
if (isbflagset(FLB_RTPWS)) {
if($proto =~ "ws"){
rtpengine_manage("rtcp-mux-demux DTLS=off
SDES-off ICE=remove RTP/AVP direction=pub direction=priv");
}
} else {
rtpengine_manage("replace-origin
replace-session-connection ICE=remove direction=pub direction=priv");
}
} else { //FROMVSPHONE
if (isbflagset(FLB_RTPWS)) {
rtpengine_manage("rtcp-mux-require generate-mid
DTLS=passive SDES-off ICE=force RTP/SAVPF direction=priv direction=pub");
} else{
if ($dP == "tls") {
rtpengine_manage("trust-address replace-origin
replace-session-connection RTP/SAVP direction=priv direction=pub");
} else {
rtpengine_manage("trust-address replace-origin
replace-session-connection direction=priv direction=pub");
}
}
}
if (is_request()) {
if (!has_totag()) {
add_rr_param(";nat=yes");
if (isbflagset(FLB_RTPWS)) {
add_rr_param(";rtp=ws");
}
}
}
if (is_reply()) {
if(isbflagset(FLB_NATB)) {
fix_nated_contact();
}
}
#!endif
return;
}
# Routing to foreign domains
route[SIPOUT] {
if (!uri==myself)
{
append_hf("P-hint: outbound\r\n");
route(RELAY);
}
}
# XMLRPC routing
#!ifdef WITH_XMLRPC
route[XMLRPC] {
# allow XMLRPC from localhost
if ((method=="POST" || method=="GET"){
# close connection only for xmlrpclib user agents (there is a
bug in
# xmlrpclib: it waits for EOF before interpreting the response).
if ($hdr(User-Agent) =~ "xmlrpclib")
set_reply_close();
set_reply_no_connect();
dispatch_rpc();
exit;
}
send_reply("403", "Forbidden");
exit;
}
#!endif
route[BRIDGING] {
if (!has_totag()) {
if ($proto =~ "ws" && !($ru =~ "transport=ws")) { # Coming from
WS, NOT to WS
xlog("L_INFO", "BRIDGING SETANDO FLAG FROMWS $proto $dP
$ru\n");
setbflag(FLB_RTPWS); # Need bridging
} else if (!($proto =~ "ws") && $ru =~ "transport=ws") { #
Coming from NOT WS, going to WS
xlog("L_INFO", "BRIDGING SETANDO FLAG TOWS $proto $dP
$ru\n");
setbflag(FLB_RTPWS); # Need bridging
} else{
xlog("L_INFO", "BRIDGING SEM FLAG $proto $dP $ru\n");
}
}
}
# manage outgoing branches
branch_route[MANAGE_BRANCH] {
xdbg("new branch [$T_branch_idx] to $ru\n");
route(BRIDGING);
route(NATMANAGE);
}
# manage incoming replies
onreply_route[MANAGE_REPLY] {
xdbg("incoming reply\n");
if(status=~"[12][0-9][0-9]")
route(NATMANAGE);
}
# manage failure routing cases
failure_route[MANAGE_FAILURE] {
route(NATMANAGE);
if (t_is_canceled()) {
exit;
}
#!ifdef WITH_BLOCK3XX
# block call redirect based on 3xx replies.
if (t_check_status("3[0-9][0-9]")) {
t_reply("404","Not found");
exit;
}
#!endif
}
#!ifdef WITH_VSPHONE
# Test if coming from Asteris
route[FROMVSPHONE] {
# if(sht_match_name("pabx", "eq", "$si")) {
if(sht_has_str_value("ramal", "eq", "$si")) {
return 1;
} else{
return -1;
}
}
# Send to Asterisk
route[TOVSPHONE] {
$var(autenticacao) = $fU + "@" + $fd;
$var(ip_asterisk) = $sht(ramal=>$var(autenticacao));
$du = "sip:" + $var(ip_asterisk) + ":5060";
route(RELAY);
exit;
}
# Forward REGISTER to Asterisk
route[REGFWD] {
if(!is_method("REGISTER"))
{
return;
}
$var(autenticacao) = $fU + "@" + $fd;
$var(ip_asterisk) = $sht(ramal=>$var(autenticacao));
$uac_req(method)="REGISTER";
$uac_req(ruri)="sip:" + $var(ip_asterisk) + ":5060";
$uac_req(furi)="sip:" + $au + "@" + $fd;
$uac_req(turi)="sip:" + $au + "@" + $var(ip_asterisk);
$uac_req(hdrs)="Contact: <sip:" + $au + "@"
+ $fd
+ ":" + 5060 + ">\r\n";
if($sel(contact.expires) != $null){
$uac_req(hdrs)= $uac_req(hdrs) + "Expires: " +
$sel(contact.expires) + "\r\n";
} else{
$uac_req(hdrs)= $uac_req(hdrs) + "Expires: " +
$hdr(Expires) + "\r\n";
}
$uac_req(hdrs)= $uac_req(hdrs) + "User-Agent: " + $ua + "\r\n";
$uac_req(sock)="udp:172.16.11.57:5060";
uac_req_send();
}
#!endif
_______________________________________________
Kamailio (SER) - Users Mailing List
[email protected]
https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users