Ram, can u Check the entity of the RadCheck table in Radius Databases, The entity should be like this :-)
username = > [EMAIL PROTECTED] Attribute => Password operaiton = > := value => value of the Password Thanks & Regrads Sunkara Ravi Prakash VoIP System Anaylst India On 8/8/07, Dan-Cristian Bogos <[EMAIL PROTECTED]> wrote: > > Ram, > > from your radiusd logs: "User [EMAIL PROTECTED] not found in radcheck ". > You should make sure that this user is present into your radcheck > table. > > > DanB > > On 8/7/07, ram <[EMAIL PROTECTED]> wrote: > > > > > > > > On 8/8/07, ram <[EMAIL PROTECTED]> wrote: > > > > > > > > > > > > On 8/7/07, Dan-Cristian Bogos < [EMAIL PROTECTED]> wrote: > > > > > > > > > > > > Hi Ram, > > > > > > > > it looks like u have a problem using a configuration designed for > > > > version 1.1 into version 1.2. For more information, checkout the > > > > following link and do all the necessary changes: > > > > > > http://openser.org/dokuwiki/doku.php/install:1.1.x-to-1.2.x > > - your > > > > attention "avp_aliases was moved to core". > > > > > > > Hi > > > > iam forgot to post my openser logs > > > > here is my error log when my sipura try to authenticate > > > > any suggestions > > > > ram > > > > > > 2(13027) get_hdr_field: cseq <CSeq>: <50> <REGISTER> > > 2(13027) DEBUG:maxfwd:is_maxfwd_present: value = 70 > > 2(13027) parse_headers: flags=200 > > 2(13027) DEBUG: get_hdr_body : content_length=0 > > 2(13027) found end of header > > 2(13027) find_first_route: No Route headers found > > 2(13027) loose_route: There is no Route HF > > 2(13027) grep_sock_info - checking if host==us: 12==12 && [X.X.X.X] == > > [X.X.X.X ] > > 2(13027) grep_sock_info - checking if port 5060 matches port 5060 > > 2(13027) grep_sock_info - checking if host==us: 12==12 && [X.X.X.X] == > > [X.X.X.X] > > 2(13027) grep_sock_info - checking if port 5060 matches port 5060 > > 2(13027) check_nonce(): comparing > > [46b8b9c77d84f6750219631d164c78a5b34d2682] and > > [46b8b9c74cd29426652511110717e60c270b4144] > > 2(13027) pre_auth(): Invalid nonce value received > > 2(13027) build_auth_hf(): 'WWW-Authenticate: Digest realm=" X.X.X.X", > > nonce="46b8c3843dc677a5fc9e5aae6101a1c6f30b5ed6" > > ' > > 2(13027) parse_headers: flags=ffffffffffffffff > > 2(13027) check_via_address(X.X.X.X.99, X.X.X.X.99, 0) > > 2(13027) DEBUG:destroy_avp_list: destroying list (nil) > > 2(13027) receive_msg: cleaning up > > 1(13023) SIP Request: > > 1(13023) method: <REGISTER> > > 1(13023) uri: <sip:X.X.X.X> > > 1(13023) version: <SIP/2.0> > > 1(13023) parse_headers: flags=2 > > 1(13023) Found param type 232, <branch> = <z9hG4bK-c4a0e25d>; state=16 > > 1(13023) end of header reached, state=5 > > 1(13023) parse_headers: Via found, flags=2 > > 1(13023) parse_headers: this is the first via > > 1(13023) After parse_msg... > > 1(13023) preparing to run routing scripts... > > 1(13023) parse_headers: flags=100 > > 1(13023) DEBUG:parse_to:end of header reached, state=10 > > 1(13023) DBUG:parse_to: display={12345}, ruri={ sip:[EMAIL PROTECTED] > > 1(13023) DEBUG: get_hdr_field: <To> [32]; uri=[sip:[EMAIL PROTECTED] > > 1(13023) DEBUG: to body [12345 < sip:[EMAIL PROTECTED]> > > ] > > 1(13023) get_hdr_field: cseq <CSeq>: <51> <REGISTER> > > 1(13023) DEBUG:maxfwd:is_maxfwd_present: value = 70 > > 1(13023) parse_headers: flags=200 > > 1(13023) DEBUG: get_hdr_body : content_length=0 > > 1(13023) found end of header > > 1(13023) find_first_route: No Route headers found > > 1(13023) loose_route: There is no Route HF > > 1(13023) grep_sock_info - checking if host==us: 12==12 && [X.X.X.X] == > > [X.X.X.X ] > > 1(13023) grep_sock_info - checking if port 5060 matches port 5060 > > 1(13023) grep_sock_info - checking if host==us: 12==12 && [X.X.X.X] == > > [X.X.X.X] > > 1(13023) grep_sock_info - checking if port 5060 matches port 5060 > > 1(13023) check_nonce(): comparing > > [46b8c3843dc677a5fc9e5aae6101a1c6f30b5ed6] and > > [46b8c3843dc677a5fc9e5aae6101a1c6f30b5ed6] > > 4(13030) SIP Request: > > 4(13030) method: <REGISTER> > > 4(13030) uri: <sip: X.X.X.X> > > 4(13030) version: <SIP/2.0> > > 4(13030) parse_headers: flags=2 > > 4(13030) Found param type 232, <branch> = <z9hG4bK-c4a0e25d>; state=16 > > 4(13030) end of header reached, state=5 > > 4(13030) parse_headers: Via found, flags=2 > > 4(13030) parse_headers: this is the first via > > 4(13030) After parse_msg... > > 4(13030) preparing to run routing scripts... > > 4(13030) parse_headers: flags=100 > > 4(13030) DEBUG:parse_to:end of header reached, state=10 > > 4(13030) DBUG:parse_to: display={12345}, ruri={sip:[EMAIL PROTECTED] > > 4(13030) DEBUG: get_hdr_field: <To> [32]; uri=[sip:[EMAIL PROTECTED] ] > > 4(13030) DEBUG: to body [12345 <sip:[EMAIL PROTECTED]> > > ] > > 4(13030) get_hdr_field: cseq <CSeq>: <51> <REGISTER> > > 4(13030) DEBUG:maxfwd:is_maxfwd_present: value = 70 > > 4(13030) parse_headers: flags=200 > > 4(13030) DEBUG: get_hdr_body : content_length=0 > > 4(13030) found end of header > > 4(13030) find_first_route: No Route headers found > > 4(13030) loose_route: There is no Route HF > > 4(13030) grep_sock_info - checking if host==us: 12==12 && [X.X.X.X] == > > [X.X.X.X] > > 4(13030) grep_sock_info - checking if port 5060 matches port 5060 > > 4(13030) grep_sock_info - checking if host==us: 12==12 && [ X.X.X.X] > == > > [X.X.X.X] > > 4(13030) grep_sock_info - checking if port 5060 matches port 5060 > > 4(13030) check_nonce(): comparing > > [46b8c3843dc677a5fc9e5aae6101a1c6f30b5ed6] and > > [46b8c3843dc677a5fc9e5aae6101a1c6f30b5ed6] > > 2(13027) SIP Request: > > 2(13027) method: <REGISTER> > > 2(13027) uri: <sip:X.X.X.X> > > 2(13027) version: <SIP/2.0> > > 2(13027) parse_headers: flags=2 > > 2(13027) Found param type 232, <branch> = <z9hG4bK-c4a0e25d>; state=16 > > 2(13027) end of header reached, state=5 > > 2(13027) parse_headers: Via found, flags=2 > > 2(13027) parse_headers: this is the first via > > 2(13027) After parse_msg... > > 2(13027) preparing to run routing scripts... > > 2(13027) parse_headers: flags=100 > > 2(13027) DEBUG:parse_to:end of header reached, state=10 > > 2(13027) DBUG:parse_to: display={12345}, ruri={sip:[EMAIL PROTECTED] > > 2(13027) DEBUG: get_hdr_field: <To> [32]; uri=[ sip:[EMAIL PROTECTED] > > 2(13027) DEBUG: to body [12345 <sip:[EMAIL PROTECTED]> > > ] > > 2(13027) get_hdr_field: cseq <CSeq>: <51> <REGISTER> > > 2(13027) DEBUG:maxfwd:is_maxfwd_present: value = 70 > > 2(13027) parse_headers: flags=200 > > 2(13027) DEBUG: get_hdr_body : content_length=0 > > 2(13027) found end of header > > 2(13027) find_first_route: No Route headers found > > 2(13027) loose_route: There is no Route HF > > 2(13027) grep_sock_info - checking if host==us: 12==12 && [X.X.X.X] == > > [X.X.X.X] > > 2(13027) grep_sock_info - checking if port 5060 matches port 5060 > > 2(13027) grep_sock_info - checking if host==us: 12==12 && [ X.X.X.X] > == > > [X.X.X.X] > > 2(13027) grep_sock_info - checking if port 5060 matches port 5060 > > 2(13027) check_nonce(): comparing > > [46b8c3843dc677a5fc9e5aae6101a1c6f30b5ed6] and > > [46b8c3843dc677a5fc9e5aae6101a1c6f30b5ed6] > > 1(13023) ERROR:auth_radius:radius_authorize_sterman: > > rc_auth failed > > 1(13023) build_auth_hf(): 'WWW-Authenticate: Digest realm="X.X.X.X", > > nonce="46b8c386ef003653667ceb8f5946c66c39a5916e" > > ' > > 1(13023) parse_headers: flags=ffffffffffffffff > > 1(13023) check_via_address(X.X.X.X.99, X.X.X.X.99, 0) > > 1(13023) DEBUG:destroy_avp_list: destroying list (nil) > > 1(13023) receive_msg: cleaning up > > 1(13023) SIP Request: > > 1(13023) method: <REGISTER> > > 1(13023) uri: <sip:X.X.X.X> > > 1(13023) version: <SIP/2.0> > > 1(13023) parse_headers: flags=2 > > 1(13023) Found param type 232, <branch> = <z9hG4bK-cab7643a>; state=16 > > 1(13023) end of header reached, state=5 > > 1(13023) parse_headers: Via found, flags=2 > > 1(13023) parse_headers: this is the first via > > 1(13023) After parse_msg... > > 1(13023) preparing to run routing scripts... > > 1(13023) parse_headers: flags=100 > > 1(13023) DEBUG:parse_to:end of header reached, state=10 > > 1(13023) DBUG:parse_to: display={12345}, ruri={sip:[EMAIL PROTECTED] > > 1(13023) DEBUG: get_hdr_field: <To> [32]; uri=[ sip:[EMAIL PROTECTED] > > 1(13023) DEBUG: to body [12345 <sip:[EMAIL PROTECTED]> > > ] > > 1(13023) get_hdr_field: cseq <CSeq>: <52> <REGISTER> > > 1(13023) DEBUG:maxfwd:is_maxfwd_present: value = 70 > > 1(13023) parse_headers: flags=200 > > 1(13023) DEBUG: get_hdr_body : content_length=0 > > 1(13023) found end of header > > 1(13023) find_first_route: No Route headers found > > 1(13023) loose_route: There is no Route HF > > 1(13023) grep_sock_info - checking if host==us: 12==12 && [X.X.X.X] == > > [X.X.X.X] > > 1(13023) grep_sock_info - checking if port 5060 matches port 5060 > > 1(13023) grep_sock_info - checking if host==us: 12==12 && [ X.X.X.X] > == > > [X.X.X.X] > > 1(13023) grep_sock_info - checking if port 5060 matches port 5060 > > 1(13023) check_nonce(): comparing > > [46b8c386ef003653667ceb8f5946c66c39a5916e] and > > [46b8c386ef003653667ceb8f5946c66c39a5916e] > > 4(13030) ERROR:auth_radius:radius_authorize_sterman: > > rc_auth failed > > 4(13030) build_auth_hf(): 'WWW-Authenticate: Digest realm="X.X.X.X", > > nonce="46b8c386ef003653667ceb8f5946c66c39a5916e" > > ' > > 4(13030) parse_headers: flags=ffffffffffffffff > > 4(13030) check_via_address(X.X.X.X.99, X.X.X.X.99, 0) > > 4(13030) DEBUG:destroy_avp_list: destroying list (nil) > > 4(13030) receive_msg: cleaning up > > 4(13030) SIP Request: > > 4(13030) method: <REGISTER> > > 4(13030) uri: <sip:X.X.X.X> > > 4(13030) version: <SIP/2.0> > > 4(13030) parse_headers: flags=2 > > 4(13030) Found param type 232, <branch> = <z9hG4bK-cab7643a>; state=16 > > 4(13030) end of header reached, state=5 > > 4(13030) parse_headers: Via found, flags=2 > > 4(13030) parse_headers: this is the first via > > 4(13030) After parse_msg... > > 4(13030) preparing to run routing scripts... > > 4(13030) parse_headers: flags=100 > > 4(13030) DEBUG:parse_to:end of header reached, state=10 > > 4(13030) DBUG:parse_to: display={12345}, ruri={sip:[EMAIL PROTECTED] > > 4(13030) DEBUG: get_hdr_field: <To> [32]; uri=[ sip:[EMAIL PROTECTED] > > 4(13030) DEBUG: to body [12345 <sip:[EMAIL PROTECTED]> > > ] > > 4(13030) get_hdr_field: cseq <CSeq>: <52> <REGISTER> > > 4(13030) DEBUG:maxfwd:is_maxfwd_present: value = 70 > > 4(13030) parse_headers: flags=200 > > 4(13030) DEBUG: get_hdr_body : content_length=0 > > 4(13030) found end of header > > 4(13030) find_first_route: No Route headers found > > 4(13030) loose_route: There is no Route HF > > 4(13030) grep_sock_info - checking if host==us: 12==12 && [X.X.X.X] == > > [X.X.X.X] > > 4(13030) grep_sock_info - checking if port 5060 matches port 5060 > > 4(13030) grep_sock_info - checking if host==us: 12==12 && [ X.X.X.X] > == > > [X.X.X.X] > > 4(13030) grep_sock_info - checking if port 5060 matches port 5060 > > 4(13030) check_nonce(): comparing > > [46b8c386ef003653667ceb8f5946c66c39a5916e] and > > [46b8c386ef003653667ceb8f5946c66c39a5916e] > > 3(13029) SIP Request: > > 3(13029) method: <REGISTER> > > 3(13029) uri: <sip:X.X.X.X> > > 3(13029) version: <SIP/2.0> > > 3(13029) parse_headers: flags=2 > > 3(13029) Found param type 232, <branch> = <z9hG4bK-cab7643a>; state=16 > > 3(13029) end of header reached, state=5 > > 3(13029) parse_headers: Via found, flags=2 > > 3(13029) parse_headers: this is the first via > > 3(13029) After parse_msg... > > 3(13029) preparing to run routing scripts... > > 3(13029) parse_headers: flags=100 > > 3(13029) DEBUG:parse_to:end of header reached, state=10 > > 3(13029) DBUG:parse_to: display={12345}, ruri={sip:[EMAIL PROTECTED] > > 3(13029) DEBUG: get_hdr_field: <To> [32]; uri=[ sip:[EMAIL PROTECTED] > > 3(13029) DEBUG: to body [12345 <sip:[EMAIL PROTECTED]> > > ] > > 3(13029) get_hdr_field: cseq <CSeq>: <52> <REGISTER> > > 3(13029) DEBUG:maxfwd:is_maxfwd_present: value = 70 > > 3(13029) parse_headers: flags=200 > > 3(13029) DEBUG: get_hdr_body : content_length=0 > > 3(13029) found end of header > > 3(13029) find_first_route: No Route headers found > > 3(13029) loose_route: There is no Route HF > > 3(13029) grep_sock_info - checking if host==us: 12==12 && [X.X.X.X] == > > [X.X.X.X] > > 3(13029) grep_sock_info - checking if port 5060 matches port 5060 > > 3(13029) grep_sock_info - checking if host==us: 12==12 && [ X.X.X.X] > == > > [X.X.X.X] > > 3(13029) grep_sock_info - checking if port 5060 matches port 5060 > > 3(13029) check_nonce(): comparing > > [46b8c386ef003653667ceb8f5946c66c39a5916e] and > > [46b8c386ef003653667ceb8f5946c66c39a5916e] > > 2(13027) ERROR:auth_radius:radius_authorize_sterman: > > rc_auth failed > > 2(13027) build_auth_hf(): 'WWW-Authenticate: Digest realm="X.X.X.X", > > nonce="46b8c388a3a803a04e8a22ee660de29dacab1456" > > ' > > 2(13027) parse_headers: flags=ffffffffffffffff > > 2(13027) check_via_address(X.X.X.X.99, X.X.X.X.99, 0) > > 2(13027) DEBUG:destroy_avp_list: destroying list (nil) > > 2(13027) receive_msg: cleaning up > > 1(13023) ERROR:auth_radius:radius_authorize_sterman: > > rc_auth failed > > 1(13023) build_auth_hf(): 'WWW-Authenticate: Digest realm="X.X.X.X", > > nonce="46b8c388a3a803a04e8a22ee660de29dacab1456" > > ' > > 1(13023) parse_headers: flags=ffffffffffffffff > > 1(13023) check_via_address( X.X.X.X.99, X.X.X.X.99, 0) > > 1(13023) DEBUG:destroy_avp_list: destroying list (nil) > > 1(13023) receive_msg: cleaning up > > 4(13030) ERROR:auth_radius:radius_authorize_sterman: > > rc_auth failed > > 4(13030) build_auth_hf(): 'WWW-Authenticate: Digest realm=" X.X.X.X", > > nonce="46b8c388a3a803a04e8a22ee660de29dacab1456" > > ' > > 4(13030) parse_headers: flags=ffffffffffffffff > > 4(13030) check_via_address(X.X.X.X.99, X.X.X.X.99, 0) > > 4(13030) DEBUG:destroy_avp_list: destroying list (nil) > > 4(13030) receive_msg: cleaning up > > 3(13029) ERROR:auth_radius:radius_authorize_sterman: > > rc_auth failed > > 3(13029) build_auth_hf(): 'WWW-Authenticate: Digest realm="X.X.X.X", > > nonce="46b8c38980794d4ddca01a8de941789cb20934a0" > > ' > > 3(13029) parse_headers: flags=ffffffffffffffff > > 3(13029) check_via_address(X.X.X.X.99, X.X.X.X.99, 0) > > 3(13029) DEBUG:destroy_avp_list: destroying list (nil) > > 3(13029) receive_msg: cleaning up > > > > > > _______________________________________________ > > Users mailing list > > [email protected] > > http://openser.org/cgi-bin/mailman/listinfo/users > > > > > > _______________________________________________ > Users mailing list > [email protected] > http://openser.org/cgi-bin/mailman/listinfo/users > -- Thanks &Regards Ravi Prakash Sunkara
_______________________________________________ Users mailing list [email protected] http://openser.org/cgi-bin/mailman/listinfo/users
