Hello!
hmm, i believe i'm handling the re-INVITEs correctly, i've attached the
relevant part of the config.
thx
christian
On Sat, 14 Oct 2006 21:09:38 +0300
Daniel-Constantin Mierla <[EMAIL PROTECTED]> wrote:
> Since the on-hold is signaled with 0.0.0.0, it must not be changed by
> nathelper. Maybe the polycom didn't toggle the on-hold. Make sure
> that you handle properly the re-INVITEs, since they follow loose_route
> (). Just check the following config, it may help abit:
>
> http://voip-info.org/wiki/view/OpenSER+And+RTPProxy
>
> Cheers,
> Daniel
>
>
> On 10/13/06 20:47, Benko wrote:
> > Hello!
> >
> > I'm having a issue with NAT and rtpproxy. Usually my setup works
> > fine with natted clients, the Connection Information is overwritten
> > with the IP of the rtpproxy and audio passes through in both
> > directions. However, today i came across a problem where the
> > Polycom 501 sets a outgoing ip of 0.0.0.0 instead of the private ip
> > after resuming a call that was on hold(actually, the other party is
> > invited again) - and the force_rtp_proxy ()-command on openser left
> > the ip untouched instead of overwriting it with the rtpproxy-ip. As
> > a result the person that was on hold had audio but the polycom user
> > (with the "wrong" ip) hadn't.
> >
> > The false ip left aside, is it expected behaviour of
> > force_rtp_proxy to not touch 0.0.0.0?
> >
> > Just out of curiosity - does someone know the "on hold"-problem with
> > polycoms?
> >
> > thx
> > christian
> >
> > _______________________________________________
> > Users mailing list
> > [email protected]
> > http://openser.org/cgi-bin/mailman/listinfo/users
> >
> >
if ( loose_route()) {
if (( method=="INVITE" || method=="REFER") && !has_totag()) {
sl_send_reply("403", "Forbidden");
return;
};
if ( method == "INVITE" ) {
if (nat_uac_test("19")) {
setflag(6);
force_rport(); #adds the rport we have received the
packet from to be added to the first via-header
fix_nated_contact(); #Rewrites Contact HF to contain
request's source address:port
if ( ! search( "^Content-Length:\ 0" ) ) {
fix_nated_sdp( "1" );
};
};
if ( ! proxy_authorize( "proxy.mydomain.org",
"subscriber" ) ) {
proxy_challenge( "proxy.mydomain.org", "0" );
return;
} else if ( ! check_from() ) { #check_from checks the
username against the db
sl_send_reply( "403", "Username must be same as
login name" );
return;
};
consume_credentials();
force_rtp_proxy("l"); #Rewrites SDP body to ensure that
media is passed through an RTP proxy.
#(l-flag means lookup mode,
only use this if a corresponding
#session already exists in the
rtpproxy
}
xlog("L_ERR", "XXXXXXXXXXXXXLOG1 route1 time [$Tf] method <$rm>
r-uri <$ru> 2nd via <$hdr(via[1])>\n");
route(1);
return;
};
_______________________________________________
Users mailing list
[email protected]
http://openser.org/cgi-bin/mailman/listinfo/users