Hello!
Acc to 3261, 16.4:
the proxy MUST replace the Request-URI in the request with the last
value from the Route header field, and remove that value from the
Route header field. The proxy MUST then proceed as if it received
this modified request.
The loose_route() function does only the half on my
if (looose_route()) {
..
t_relay()
..
}
script. It replaces the RURI with the value of the last Route header,
but then doesn't remove it, causing problems on the last hop.
The strict.txt contains a ACK with comes in strict and leaves loose -
with the Route header.
Aliases are configured with ip.ip.ip.ip and ip.ip.ip.ip:5060.
Why is the Route header not stripped?
Walter
No. Time Source Destination Protocol Info
7550 0.030716 111.222.333.100 111.222.333.132 SIP
Request: ACK sip:111.222.333.132
Frame 7550 (703 bytes on wire, 703 bytes captured)
Linux cooked capture
Internet Protocol, Src: 111.222.333.100 (111.222.333.100), Dst: 111.222.333.132
(111.222.333.132)
User Datagram Protocol, Src Port: 5060 (5060), Dst Port: 5060 (5060)
Session Initiation Protocol
Request-Line: ACK sip:111.222.333.132 SIP/2.0
Message Header
From: "012345678" <sip:[EMAIL
PROTECTED]:5060;user=phone>;tag=ds-c6d-4135d6bb59c3b
To: <sip:[EMAIL PROTECTED]:5060;user=phone>;tag=0277900c
Call-ID: [EMAIL PROTECTED]
CSeq: 21932 ACK
Content-Length: 0
Route: <sip:111.222.333.130:5084;lr>
Route: <sip:111.222.333.129;lr;ftag=ds-c6d-4135d6bb59c3b>
Route: <sip:[EMAIL
PROTECTED]:5060;x-orig=192.168.0.65:8864;x-orig-nat=192.168.0.65:8864;rinstance=5b57cca07d0b573c>
Max-Forwards: 70
Via: SIP/2.0/UDP
111.222.333.100:5060;branch=z9hG4bK489a5d0e-1dd2-11b2-bbdc-cf24c8f139cb
Contact: <sip:[EMAIL PROTECTED];transport=udp>
No. Time Source Destination Protocol Info
7551 0.000305 111.222.333.132 111.222.333.130 SIP
Request: ACK sip:[EMAIL
PROTECTED]:5060;x-orig=192.168.0.65:8864;x-orig-nat=192.168.0.65:8864;rinstance=5b57cca07d0b573c
Frame 7551 (892 bytes on wire, 892 bytes captured)
Linux cooked capture
Internet Protocol, Src: 111.222.333.132 (111.222.333.132), Dst: 111.222.333.130
(111.222.333.130)
User Datagram Protocol, Src Port: 5060 (5060), Dst Port: 5084 (5084)
Session Initiation Protocol
Request-Line: ACK sip:[EMAIL
PROTECTED]:5060;x-orig=192.168.0.65:8864;x-orig-nat=192.168.0.65:8864;rinstance=5b57cca07d0b573c
SIP/2.0
Message Header
Record-Route: <sip:111.222.333.132;ftag=ds-c6d-4135d6bb59c3b;lr>
From: "012345678" <sip:[EMAIL
PROTECTED]:5060;user=phone>;tag=ds-c6d-4135d6bb59c3b
To: <sip:[EMAIL PROTECTED]:5060;user=phone>;tag=0277900c
Call-ID: [EMAIL PROTECTED]
CSeq: 21932 ACK
Content-Length: 0
Route: <sip:111.222.333.129;lr;ftag=ds-c6d-4135d6bb59c3b>
Route: <sip:[EMAIL
PROTECTED]:5060;x-orig=192.168.0.65:8864;x-orig-nat=192.168.0.65:8864;rinstance=5b57cca07d0b573c>
Max-Forwards: 69
Via: SIP/2.0/UDP 111.222.333.132;branch=0
Via: SIP/2.0/UDP
111.222.333.100:5060;branch=z9hG4bK489a5d0e-1dd2-11b2-bbdc-cf24c8f139cb
Contact: <sip:[EMAIL PROTECTED];transport=udp>
P-hint: rr-enforced
_______________________________________________
Users mailing list
[email protected]
http://openser.org/cgi-bin/mailman/listinfo/users