After editing your radiusclient.conf file have u restarted your opensips server. I was facing the same kind of issue. after restarting the opensips server it started to work properly
On Fri, Jun 12, 2009 at 12:21 PM, Uwe Kastens <[email protected]> wrote: > Hi, > > This is strange. Could you post your opensips.cfg or send it to me > directly? > > BR > > Uwe > > > > Leon Li schrieb: > > The port is 1812, and specify them in radiusclient.conf with > > Authserver 127.0.0.1:1812 > > > > Run radius -X returns nothing when SIP client trying to register. :( > > > > Regards, > > Leon > > > > > > -----Original Message----- > > From: Uwe Kastens [mailto:[email protected]] > > Sent: Thursday, 11 June 2009 5:02 PM > > To: Leon Li > > Cc: [email protected] > > Subject: Re: [OpenSIPS-Users] No RADIUS traffic > > > > That is strange. Could you make sure that your radiusports are correct? > > And could you start your radius-server with -X to have debug output on > > stdout? > > > > BR > > > > Uwe > > > > Leon Li schrieb: > >> I started the testing with RADIUS server on the same box as OpenSIPs. > >> There is nothing hit RADIUS logs. > >> > >> Regards, > >> Leon > >> > >> > >> -----Original Message----- > >> From: Uwe Kastens [mailto:[email protected]] > >> Sent: Wednesday, 10 June 2009 4:29 PM > >> To: Leon Li > >> Cc: [email protected] > >> Subject: Re: [OpenSIPS-Users] No RADIUS traffic > >> > >> Hi, > >> > >> Looks like that. > >> Jun 10 00:47:29 [24576] ERROR:auth_radius:radius_authorize_sterman: > >> rc_auth failed > >> > >> Your radius server is a remote server? Could you try to start sniffing > >> at the opensips server? > >> > >> BR > >> > >> Uwe > >> > >> > >> Jun 10 00:47:29 [24576] ERROR:auth_radius:radius_authorize_sterman: > >> rc_auth failed > >> > >> Leon Li schrieb: > >>> My radiusclient.conf is almost the same as this, except the different > >>> directory. I turned on debug as below and run OpenSIPs as root (-u > >> root) > >>> but still nothing shows it try to send authentication to radius? > >>> > >>> Jun 10 00:47:29 [24576] DBG:core:parse_msg: SIP Request: > >>> Jun 10 00:47:29 [24576] DBG:core:parse_msg: method: <REGISTER> > >>> Jun 10 00:47:29 [24576] DBG:core:parse_msg: uri: > >>> <sip:202.158.197.134> > >>> Jun 10 00:47:29 [24576] DBG:core:parse_msg: version: <SIP/2.0> > >>> Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=2 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_to: end of header reached, > >>> state=10 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_to: display={"test"}, > >>> ruri={sip:[email protected] <sip%[email protected]>} > >>> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: <To> [35]; > >>> uri=[sip:[email protected] <sip%[email protected]>] > >>> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: to body ["test" > >>> <sip:[email protected] <sip%[email protected]>> > >>> ] > >>> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: cseq <CSeq>: <1> > >>> <REGISTER> > >>> Jun 10 00:47:29 [24576] DBG:core:parse_via_param: found param type > >> 232, > >>> <branch> = <z9hG4bK-3ab88355ef-DL>; state=16 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_via: end of header reached, > >>> state=5 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_headers: via found, flags=2 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_headers: this is the first via > >>> Jun 10 00:47:29 [24576] DBG:core:receive_msg: After parse_msg... > >>> Jun 10 00:47:29 [24576] DBG:core:receive_msg: preparing to run > > routing > >>> scripts... > >>> Jun 10 00:47:29 [24576] DBG:maxfwd:is_maxfwd_present: value = 70 > >>> Jun 10 00:47:29 [24576] DBG:uri:has_totag: no totag > >>> Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=78 > >>> Jun 10 00:47:29 [24576] DBG:tm:t_lookup_request: start searching: > >>> hash=44313, isACK=0 > >>> Jun 10 00:47:29 [24576] DBG:tm:matching_3261: RFC3261 transaction > >>> matching failed > >>> Jun 10 00:47:29 [24576] DBG:tm:t_lookup_request: no transaction found > >>> Jun 10 00:47:29 [24576] DBG:core:grep_sock_info: checking if > > host==us: > >>> 15==15 && [202.158.197.134] == [202.158.197.134] > >>> Jun 10 00:47:29 [24576] DBG:core:grep_sock_info: checking if port > > 5060 > >>> matches port 5060 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_to_param: tag=DLdda82ca71a > >>> Jun 10 00:47:29 [24576] DBG:core:parse_to_param: epid=09C9A6A0 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_to: end of header reached, > >>> state=29 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_to: display={"test"}, > >>> ruri={sip:[email protected] <sip%[email protected]>} > >>> REGISTER for (test) sip:202.158.197.134 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=4000 > >>> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: content_length=0 > >>> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: found end of header > >>> Jun 10 00:47:29 [24576] DBG:auth:pre_auth: credentials with given > >> realm > >>> not found > >>> Proxy Authentication Required (Digest) > >>> Jun 10 00:47:29 [24576] DBG:auth:build_auth_hf: 'WWW-Authenticate: > >>> Digest realm="202.158.197.134", > >>> nonce="4a2f03cd2aecc81d4dd620f4ff564bed1d4d6963" > >>> ' > >>> Jun 10 00:47:29 [24576] DBG:core:parse_headers: > > flags=ffffffffffffffff > >>> Jun 10 00:47:29 [24576] DBG:core:check_via_address: params > >>> 202.158.213.91, 202.158.213.91, 0 > >>> Jun 10 00:47:29 [24576] DBG:core:destroy_avp_list: destroying list > >> (nil) > >>> Jun 10 00:47:29 [24576] DBG:core:receive_msg: cleaning up > >>> Jun 10 00:47:29 [24576] DBG:core:parse_msg: SIP Request: > >>> Jun 10 00:47:29 [24576] DBG:core:parse_msg: method: <REGISTER> > >>> Jun 10 00:47:29 [24576] DBG:core:parse_msg: uri: > >>> <sip:202.158.197.134> > >>> Jun 10 00:47:29 [24576] DBG:core:parse_msg: version: <SIP/2.0> > >>> Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=2 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_to: end of header reached, > >>> state=10 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_to: display={"test"}, > >>> ruri={sip:[email protected] <sip%[email protected]>} > >>> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: <To> [35]; > >>> uri=[sip:[email protected] <sip%[email protected]>] > >>> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: to body ["test" > >>> <sip:[email protected] <sip%[email protected]>> > >>> ] > >>> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: cseq <CSeq>: <2> > >>> <REGISTER> > >>> Jun 10 00:47:29 [24576] DBG:core:parse_via_param: found param type > >> 232, > >>> <branch> = <z9hG4bK-4e1197fe1e-DL>; state=16 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_via: end of header reached, > >>> state=5 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_headers: via found, flags=2 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_headers: this is the first via > >>> Jun 10 00:47:29 [24576] DBG:core:receive_msg: After parse_msg... > >>> Jun 10 00:47:29 [24576] DBG:core:receive_msg: preparing to run > > routing > >>> scripts... > >>> Jun 10 00:47:29 [24576] DBG:maxfwd:is_maxfwd_present: value = 70 > >>> Jun 10 00:47:29 [24576] DBG:uri:has_totag: no totag > >>> Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=78 > >>> Jun 10 00:47:29 [24576] DBG:tm:t_lookup_request: start searching: > >>> hash=44310, isACK=0 > >>> Jun 10 00:47:29 [24576] DBG:tm:matching_3261: RFC3261 transaction > >>> matching failed > >>> Jun 10 00:47:29 [24576] DBG:tm:t_lookup_request: no transaction found > >>> Jun 10 00:47:29 [24576] DBG:core:grep_sock_info: checking if > > host==us: > >>> 15==15 && [202.158.197.134] == [202.158.197.134] > >>> Jun 10 00:47:29 [24576] DBG:core:grep_sock_info: checking if port > > 5060 > >>> matches port 5060 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_to_param: tag=DLdda82ca71a > >>> Jun 10 00:47:29 [24576] DBG:core:parse_to_param: epid=09C9A6A0 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_to: end of header reached, > >>> state=29 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_to: display={"test"}, > >>> ruri={sip:[email protected] <sip%[email protected]>} > >>> REGISTER for (test) sip:202.158.197.134 > >>> Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=4000 > >>> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: content_length=0 > >>> Jun 10 00:47:29 [24576] DBG:auth:check_nonce: comparing > >>> [4a2f03cd2aecc81d4dd620f4ff564bed1d4d6963] and > >>> [4a2f03cd2aecc81d4dd620f4ff564bed1d4d6963] > >>> Jun 10 00:47:29 [24576] ERROR:auth_radius:radius_authorize_sterman: > >>> rc_auth failed > >>> Proxy Authentication Required (Digest) > >>> Jun 10 00:47:29 [24576] DBG:auth:build_auth_hf: 'WWW-Authenticate: > >>> Digest realm="202.158.197.134", > >>> nonce="4a2f03cd2aecc81d4dd620f4ff564bed1d4d6963" > >>> ' > >>> Jun 10 00:47:29 [24576] DBG:core:parse_headers: > > flags=ffffffffffffffff > >>> Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: found end of header > >>> Jun 10 00:47:29 [24576] DBG:core:check_via_address: params > >>> 202.158.213.91, 202.158.213.91, 0 > >>> Jun 10 00:47:29 [24576] DBG:core:destroy_avp_list: destroying list > >> (nil) > >>> Jun 10 00:47:29 [24576] DBG:core:receive_msg: cleaning up > >>> > >>> Regards, > >>> Leon > >>> > >>> -----Original Message----- > >>> From: Uwe Kastens [mailto:[email protected]] > >>> Sent: Tuesday, 9 June 2009 5:27 PM > >>> To: Leon Li > >>> Cc: [email protected] > >>> Subject: Re: [OpenSIPS-Users] No RADIUS traffic > >>> > >>> Hi, > >>> > >>> cat radiusclient.conf |grep -v ^#|grep -v ^$ > >>> auth_order radius,local > >>> login_tries 4 > >>> login_timeout 60 > >>> nologin /etc/nologin > >>> issue /etc/radiusclient-ng/issue > >>> authserver localhost > >>> acctserver localhost > >>> servers /etc/radiusclient-ng/servers > >>> dictionary /etc/radiusclient-ng/dictionary > >>> login_radius /usr/sbin/login.radius > >>> seqfile /var/run/opensips/radius.seq > >>> mapfile /etc/radiusclient-ng/port-id-map > >>> default_realm > >>> radius_timeout 10 > >>> radius_retries 3 > >>> bindaddr localhost > >>> login_local /bin/login > >>> > >>> BR > >>> > >>> Uwe > >>> > >>> > >> > > > > > > > -- > > kiste lat: 54.322684, lon: 10.13586 > > _______________________________________________ > Users mailing list > [email protected] > http://lists.opensips.org/cgi-bin/mailman/listinfo/users > -- Thanking You, Ashwini BR Naidu
_______________________________________________ Users mailing list [email protected] http://lists.opensips.org/cgi-bin/mailman/listinfo/users
