On Thu, 16 Apr 2009 12:13:03 -0700, Maxim Sobolev wrote: > > Below is the rtpproxy log output. What looks strange is the "lookup > > request failed" line, and then the sending reply "3560_8 0 > > 174.133.24.130", with the 0 port number. > > > > Here is the setup for the originating client: > > > >> DBUG:handle_command: received command "3560_7 > >> Uc107,119,100,106,0,105,98,8,3,101 > >> YTc5OTljZTc4OTFjNDQwZDYxZTVhMTUzMzQ0ZTNkMGE. 64.105.44.39 16548 ae213634;0" > >> INFO:handle_command: new session > >> YTc5OTljZTc4OTFjNDQwZDYxZTVhMTUzMzQ0ZTNkMGE., tag ae213634;0 requested, > >> type strong > >> INFO:handle_command: new session on a port 64680 created, tag ae213634;0 > >> INFO:handle_command: pre-filling caller's address with 64.105.44.39:16548 > >> DBUG:doreply: sending reply "3560_7 64680 174.133.24.130" > > > > Here is the setup for the receiving client: > > > >> DBUG:handle_command: received command "3560_8 Lc107,0,8,101 > >> YTc5OTljZTc4OTFjNDQwZDYxZTVhMTUzMzQ0ZTNkMGE. 64.105.44.41 3000 ae213634;1 > >> bf2ce529baeb74e;1" > >> INFO:handle_command: lookup request failed: session > >> YTc5OTljZTc4OTFjNDQwZDYxZTVhMTUzMzQ0ZTNkMGE., tags > >> ae213634;1/bf2ce529baeb74e;1 not found > >> DBUG:doreply: sending reply "3560_8 0 174.133.24.130" > > 0 means the proxy cannot locate the session. For some reason the proxy > requests stream #0 in INVITE, while stream #1 in the 200 OK. I am not > sure why it does so, can you please send us you kamalio configuration file?
Maxim, Thanks for your response. The cfg file is below. I am running kamailio 1.5.0, and rtpproxy 1.2.0. The cfg file was generated by the sipwise sip:wizard tool. I tweaked it where necessary to make it compatible with 1.5.0. If I'm not mistaken, the ftp stream for the 200 OK is set up in onreply_route[2]. ######################################################################## # This configuration is autogenerated by sip:wizard # (http://www.sipwise.com/wizard) on Wed Apr 15 17:02:34 +0200 2009 # for OpenSER 1.2 # # Copyright (C) 2007 Sipwise (supp...@sipwise.com) ######################################################################## ######################################################################## # By obtaining, using, and/or copying this configuration and/or its # associated documentation, you agree that you have read, understood, # and will comply with the Terms of Usage provided at # http://www.sipwise.com/news/?page_id=6 as well as the following # additions: # # Permission to use, copy, modify, and distribute this configuration and # its associated documentation for any purpose and without fee is hereby # granted, provided that the above copyright notice appears in all # copies, and that both that copyright notice and this permission notice # appear in supporting documentation, and that the name of Sipwise or # the author will not be used in advertising or publicity pertaining to # distribution of the configuration without specific, written prior # permission. ######################################################################## ######################################################################## # Before using this configuration, read the following prerequisites in # order to gain the designated functionallity: # # base: # You have to insert all locally served domains (i.e. # "openserctl domain add your.domain.com"). # # nat-rtpproxy: # You have to install RTPProxy # (http://www.openser.org/downloads/snapshots/rtpproxy/) for relaying # RTP traffic. # # usr-preferences: # This feature relies on UUID-based provisioning. Thus, you have # to add the uuid-column to the subscriber table ("alter table # subscriber add column uuid varchar(64);") and populate it with a # UUID (unique user identifier) per user, for example an # auto-incremented id. # # offnet-incoming-sip: # You have to populate the "trusted"-table with rules for # allowed peering hosts (i.e. src_ip="1.2.3.4", proto="udp", # from_pattern="^sip:....@domain.of.peering.host$", tag="1234"). If the # feature "usr-preferences" is selected, the tag-value is used as # caller-uuid for such calls. # # offnet-pstn: # You have to add a routing entry for lcr (i.e. "openserctl lcr # addroute '' '' 1 1"). Additionally, you have to add your gateways # (i.e. "openserctl lcr addgw my-test-gw 1.2.3.4 5060 sip udp 1"). # # ring-timeout: # You have to provision the ring-timeout (AVP ringtimeout as # type 1) for each user in the usr_preferences table (i.e. # uuid='1234', username='', domain='', attribute='ringtimeout', # type=1, value='60'). If no timeout is provisioned, the default # timeout will be used. # # cfu: # You have to provision the call-forward-unconditional as full # SIP URI (AVP cfu as type 0) for each user in the usr_preferences # table (i.e. uuid='1234', username='', domain='', attribute='cfu', # type=0, value='sip:f...@otherdomain.com'). Forwards to another user # in the same domain or to other domains are possible. # # cfc: # You have to provision the call-forward-conditional as full SIP # URI (AVP cfc as type 0) for each user in the usr_preferences table # (i.e. uuid='1234', username='', domain='', attribute='cfc', type=0, # value='sip:f...@otherdomain.com'). Forwards to another user in the # same domain or to other domains are possible. # # user-aliases: # You have to add aliases for your users (i.e. "openserctl alias # add 01234567 sip:b...@yourdomain.com" for usrloc-based aliases or # make entries into "dbaliases" table for db-based aliases) # ######################################################################## ######################################################################## # Configuration 'sip:wizard - Wed Apr 15 17:02:34 +0200 2009' ######################################################################## listen = udp:127.0.0.1:5060 mpath = "/usr/local/kamailio/lib/kamailio/modules/" children = 8 port = 5060 debug = 6 fork = no #mfs group = "openser" #mfs user = "openser" disable_tcp = no log_facility = LOG_DAEMON log_stderror = yes tcp_children = 4 mhomed = no server_signature = yes #mfs sock_group = "openser" #mfs sock_mode = 0600 #mfs sock_user = "openser" #mfs unix_sock = "/tmp/openser.sock" #mfs unix_sock_children = 1 reply_to_via = no sip_warning = no check_via = no dns = no rev_dns = no disable_core_dump = no dns_try_ipv6 = yes dns_use_search_list = yes # mfs added these modules loadmodule "siputils.so" loadmodule "pv.so" loadmodule "usrloc.so" modparam("usrloc", "user_column", "username") modparam("usrloc", "domain_column", "domain") modparam("usrloc", "contact_column", "contact") modparam("usrloc", "expires_column", "expires") modparam("usrloc", "q_column", "q") modparam("usrloc", "callid_column", "callid") modparam("usrloc", "cseq_column", "cseq") modparam("usrloc", "methods_column", "methods") modparam("usrloc", "flags_column", "flags") modparam("usrloc", "user_agent_column", "user_agent") modparam("usrloc", "received_column", "received") modparam("usrloc", "socket_column", "socket") modparam("usrloc", "use_domain", 0) modparam("usrloc", "desc_time_order", 0) modparam("usrloc", "timer_interval", 60) modparam("usrloc", "db_url", "mysql://openser:opense...@localhost/openser") modparam("usrloc", "db_mode", 1) modparam("usrloc", "matching_mode", 0) modparam("usrloc", "cseq_delay", 20) modparam("usrloc", "nat_bflag", 6) loadmodule "registrar.so" modparam("registrar", "default_expires", 3600) modparam("registrar", "min_expires", 60) modparam("registrar", "max_expires", 0) modparam("registrar", "default_q", 0) modparam("registrar", "append_branches", 1) modparam("registrar", "case_sensitive", 0) modparam("registrar", "received_param", "received") modparam("registrar", "max_contacts", 0) modparam("registrar", "retry_after", 0) modparam("registrar", "method_filtering", 0) modparam("registrar", "path_mode", 2) modparam("registrar", "path_use_received", 0) modparam("registrar", "received_avp", "$avp(i:801)") loadmodule "rr.so" modparam("rr", "enable_full_lr", 0) modparam("rr", "append_fromtag", 1) modparam("rr", "enable_double_rr", 1) modparam("rr", "add_username", 0) loadmodule "tm.so" modparam("tm", "fr_timer", 30) modparam("tm", "fr_inv_timer", 120) modparam("tm", "wt_timer", 5) modparam("tm", "delete_timer", 2) #mfs??? modparam("tm", "noisy_ctimer", 0) modparam("tm", "ruri_matching", 1) modparam("tm", "via1_matching", 1) modparam("tm", "unix_tx_timeout", 2) modparam("tm", "restart_fr_on_each_reply", 1) modparam("tm", "pass_provisional_replies", 0) modparam("tm", "fr_inv_timer_avp", "$avp(s:callee_fr_inv_timer)") loadmodule "xlog.so" modparam("xlog", "buf_size", 4096) modparam("xlog", "force_color", 0) loadmodule "mi_fifo.so" modparam("mi_fifo", "fifo_name", "/tmp/openser_fifo") modparam("mi_fifo", "fifo_mode", 0660) #mfs modparam("mi_fifo", "fifo_group", "openser") #mfs modparam("mi_fifo", "fifo_user", "openser") modparam("mi_fifo", "reply_dir", "/tmp/") modparam("mi_fifo", "reply_indent", "\t") loadmodule "domain.so" modparam("domain", "db_url", "mysql://openser:opense...@localhost/openser") modparam("domain", "db_mode", 1) modparam("domain", "domain_table", "domain") modparam("domain", "domain_col", "domain") loadmodule "nathelper.so" modparam("nathelper", "natping_interval", 60) modparam("nathelper", "ping_nated_only", 1) modparam("nathelper", "rtpproxy_sock", "udp:moresby.forteinc.com:5095") #mfs ??? modparam("nathelper", "rtpproxy_disable", 0) modparam("nathelper", "rtpproxy_disable_tout", 60) modparam("nathelper", "rtpproxy_tout", 1) modparam("nathelper", "rtpproxy_retr", 5) modparam("nathelper", "sipping_method", "OPTIONS") modparam("nathelper", "received_avp", "$avp(i:801)") loadmodule "textops.so" #mfs loadmodule "uri.so" #OBSOLETE loadmodule "sl.so" modparam("sl", "enable_stats", 1) loadmodule "maxfwd.so" modparam("maxfwd", "max_limit", 256) loadmodule "db_mysql.so" modparam("db_mysql", "ping_interval", 300) modparam("db_mysql", "auto_reconnect", 1) loadmodule "auth.so" modparam("auth", "nonce_expire", 300) modparam("auth", "rpid_suffix", ";party=calling;id-type=subscriber;screen=yes") modparam("auth", "rpid_avp", "$avp(s:rpid)") loadmodule "auth_db.so" modparam("auth_db", "db_url", "mysql://openser:opense...@localhost/openser") modparam("auth_db", "user_column", "username") modparam("auth_db", "domain_column", "domain") modparam("auth_db", "password_column", "password") modparam("auth_db", "password_column_2", "ha1b") modparam("auth_db", "calculate_ha1", 1) modparam("auth_db", "use_domain", 0) modparam("auth_db", "load_credentials", "$avp(s:caller_uuid)=uuid") loadmodule "uri_db.so" modparam("uri_db", "db_url", "mysql://openser:opense...@localhost/openser") #mfs modparam("uri_db", "uri_table", "uri") #mfs modparam("uri_db", "uri_user_column", "username") #mfs modparam("uri_db", "uri_domain_column", "domain") #mfs modparam("uri_db", "uri_uriuser_column", "uri_user") #mfs modparam("uri_db", "subscriber_table", "subscriber") #mfs modparam("uri_db", "subscriber_user_column", "username") #mfs modparam("uri_db", "subscriber_domain_column", "domain") #mfs modparam("uri_db", "use_uri_table", 0) modparam("uri_db", "use_domain", 0) loadmodule "avpops.so" modparam("avpops", "db_url", "mysql://openser:opense...@localhost/openser") modparam("avpops", "avp_table", "usr_preferences") modparam("avpops", "use_domain", 0) modparam("avpops", "uuid_column", "uuid") modparam("avpops", "username_column", "username") modparam("avpops", "domain_column", "domain") modparam("avpops", "attribute_column", "attribute") modparam("avpops", "value_column", "value") modparam("avpops", "type_column", "type") loadmodule "enum.so" modparam("enum", "domain_suffix", "e164.org.") loadmodule "permissions.so" modparam("permissions", "default_allow_file", "permissions.allow") modparam("permissions", "default_deny_file", "permissions.deny") modparam("permissions", "check_all_branches", 1) modparam("permissions", "allow_suffix", ".allow") modparam("permissions", "deny_suffix", ".deny") modparam("permissions", "db_url", "mysql://openser:opense...@localhost/openser") modparam("permissions", "db_mode", 1) modparam("permissions", "trusted_table", "trusted") modparam("permissions", "source_col", "src_ip") modparam("permissions", "proto_col", "proto") modparam("permissions", "from_col", "from_pattern") modparam("permissions", "tag_col", "tag") modparam("permissions", "peer_tag_avp", "$avp(s:peer_uuid)") loadmodule "lcr.so" modparam("lcr", "db_url", "mysql://openser:opense...@localhost/openser") modparam("lcr", "gw_table", "gw") modparam("lcr", "gw_name_column", "gw_name") modparam("lcr", "ip_addr_column", "ip_addr") modparam("lcr", "port_column", "port") modparam("lcr", "uri_scheme_column", "uri_scheme") modparam("lcr", "transport_column", "transport") modparam("lcr", "grp_id_column", "grp_id") modparam("lcr", "lcr_table", "lcr") modparam("lcr", "strip_column", "strip") modparam("lcr", "prefix_column", "prefix") modparam("lcr", "from_uri_column", "from_uri") modparam("lcr", "priority_column", "priority") modparam("lcr", "gw_uri_avp", "$avp(i:1400)") modparam("lcr", "ruri_user_avp", "$avp(i:1402)") #mfs obsolete modparam("lcr", "contact_avp", "1401") modparam("lcr", "fr_inv_timer_avp", "$avp(s:fr_inv_timer_avp)") modparam("lcr", "fr_inv_timer", 90) modparam("lcr", "fr_inv_timer_next", 30) modparam("lcr", "rpid_avp", "$avp(s:rpid)") modparam("lcr", "flags_avp", "$avp(i:1403)") loadmodule "alias_db.so" modparam("alias_db", "db_url", "mysql://openser:opense...@localhost/openser") modparam("alias_db", "user_column", "username") modparam("alias_db", "domain_column", "domain") modparam("alias_db", "alias_user_column", "alias_username") modparam("alias_db", "alias_domain_column", "alias_domain") modparam("alias_db", "use_domain", 0) avp_aliases="orig_callee_user=s:101" avp_aliases="callee_uuid=s:102" avp_aliases="caller_uuid=s:103" ######################################################################## # Request route 'main' ######################################################################## route[0] { xlog("L_INFO", "New request - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); force_rport(); if(msg:len > max_len) { xlog("L_INFO", "Message too big - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); sl_send_reply("513", "Message Too Big"); exit; } if (!mf_process_maxfwd_header("10")) { xlog("L_INFO", "Too many hops - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); sl_send_reply("483", "Too Many Hops"); exit; } if(!is_method("REGISTER")) { if(nat_uac_test("19")) { record_route(";nat=yes"); } else { record_route(); } } if(is_method("CANCEL") || is_method("BYE")) { unforce_rtp_proxy(); } if(loose_route()) { if(!has_totag()) { xlog("L_INFO", "Initial loose-routing rejected - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); sl_send_reply("403", "Initial Loose-Routing Rejected"); exit; } if(nat_uac_test("19") || search("^Route:.*;nat=yes")) { fix_nated_contact(); setbflag(6); } route(7); } if(is_method("REGISTER")) { route(6); } if(is_method("INVITE")) { route(8); } if(is_method("CANCEL") || is_method("ACK")) { route(14); } route(15); } ######################################################################## # Request route 'clear-usr-preferences-caller' ######################################################################## route[1] { xlog("L_INFO", "Clear caller preferences - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); } ######################################################################## # Request route 'clear-usr-preferences-callee' ######################################################################## route[2] { xlog("L_INFO", "Clear callee preferences - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); avp_delete("$avp(s:callee_fr_inv_timer)/g"); avp_delete("$avp(s:cfu)/g"); avp_delete("$avp(s:cfc)/g"); } ######################################################################## # Request route 'usr-preferences-caller' ######################################################################## route[3] { route(1); xlog("L_INFO", "Load caller preferences for uuid '$avp(s:caller_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); # load caller avps avp_db_load("$avp(s:caller_uuid)", "*"); } ######################################################################## # Request route 'usr-preferences-callee' ######################################################################## route[4] { xlog("L_INFO", "Load callee preferences for uuid '$avp(s:callee_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); # load callee avps avp_db_load("$avp(s:callee_uuid)", "*"); if(is_avp_set("$avp(s:cfu)/s")) { xlog("L_INFO", "Call-forward-unconditional to '$avp(s:cfu)' found - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); avp_delete("$avp(s:caller_uuid)/g"); avp_copy("$avp(s:callee_uuid)", "$avp(s:caller_uuid)/d"); avp_pushto("$ru", "$avp(s:cfu)"); route(3); route(9); exit; } if(is_avp_set("$avp(s:ringtimeout)/n")) { xlog("L_INFO", "Setting ring timeout to $avp(s:ringtimeout) secs - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); avp_copy("$avp(s:ringtimeout)", "$avp(s:callee_fr_inv_timer)/d"); } } ######################################################################## # Request route 'stop-rtp-proxy' ######################################################################## route[5] { if(isflagset(22)) { unforce_rtp_proxy(); } } ######################################################################## # Request route 'base-route-register' ######################################################################## route[6] { sl_send_reply("100", "Trying"); if(!www_authorize("", "subscriber")) { xlog("L_INFO", "Register authentication failed - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); www_challenge("", "0"); exit; } if(!check_to()) { xlog("L_INFO", "Spoofed To-URI detected - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); sl_send_reply("403", "Spoofed To-URI Detected"); exit; } consume_credentials(); if(!search("^Contact:[ ]*\*") && nat_uac_test("19")) { fix_nated_register(); setbflag(6); } if(!save("location")) { xlog("L_ERR", "Saving contact failed - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); sl_reply_error(); exit; } xlog("L_INFO", "Registration successful - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); exit; } ######################################################################## # Request route 'base-outbound' ######################################################################## route[7] { if(isbflagset(6)) { if(!isflagset(22) && !search("^Content-Length:[ ]*0")) { setflag(22); force_rtp_proxy(); } t_on_reply("2"); } else { t_on_reply("1"); } if(!isflagset(21)) { t_on_failure("2"); } if(isflagset(29)) { append_branch(); } if(is_present_hf("Proxy-Authorization")) { consume_credentials(); } xlog("L_INFO", "Request leaving server, D-URI='$du' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); # no 100 (we already sent it) and no DNS blacklisting if(!t_relay("0x05")) { sl_reply_error(); if(is_method("INVITE") && isbflagset(6)) { unforce_rtp_proxy(); } } exit; } ######################################################################## # Request route 'base-route-invite' ######################################################################## route[8] { sl_send_reply("100", "Trying"); if(from_gw()) { $avp(caller_uuid) = "0"; xlog("L_INFO", "Call from PSTN' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); setflag(23); } else { if(allow_trusted()) { if(is_avp_set("$avp(s:peer_uuid)/s")) { # use tag-column from trusted-table as uuid for this caller avp_copy("$avp(s:peer_uuid)", "$avp(s:caller_uuid)/d"); } else { # if no uuid is set, use "0" as default uuid $avp(caller_uuid) = "0"; } xlog("L_INFO", "Call from trusted peer with uuid '$avp(s:caller_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); if(!is_domain_local("$rd")) { xlog("L_INFO", "Rejecting peering attempt with non-local request domain - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); sl_send_reply("403", "Relaying Denied"); exit; } setflag(23); } else { if(!proxy_authorize("", "subscriber")) { xlog("L_INFO", "Proxy authentication failed - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); proxy_challenge("", "0"); exit; } if(!check_from()) { xlog("L_INFO", "Spoofed From-URI detected - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); sl_send_reply("403", "Spoofed From-URI Detected"); exit; } } } route(3); if(nat_uac_test("19")) { fix_nated_contact(); setbflag(6); } route(9); } ######################################################################## # Request route 'invite-find-callee' ######################################################################## route[9] { if(alias_db_lookup("dbaliases")) { xlog("L_INFO", "Callee was aliased - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); } route(2); if(!is_domain_local("$rd")) { setflag(20); $avp(callee_uuid) = "0"; route(11); } avp_delete("$avp(s:callee_uuid)"); avp_db_query("select uuid from subscriber where username = '$rU'", "$avp(s:callee_uuid)"); if(is_avp_set("$avp(s:callee_uuid)/s")) { xlog("L_INFO", "Callee is local, uuid='$avp(s:callee_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); route(10); } else { $avp(callee_uuid) = "0"; xlog("L_INFO", "Callee is not local - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); route(11); } exit; } ######################################################################## # Request route 'invite-to-internal' ######################################################################## route[10] { route(4); if(!lookup("location")) { xlog("L_INFO", "Local user offline - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); sl_send_reply("404", "User Offline"); } else { xlog("L_INFO", "Local user online - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); route(7); } exit; } ######################################################################## # Request route 'invite-to-external' ######################################################################## route[11] { if(isflagset(20)) { xlog("L_INFO", "Call to foreign domain - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); route(7); exit; } route(13); if(!isflagset(23)) { # don't allow calls relaying from PSTN to PSTN, if not explicitely forwarded if(uri =~ "^sip:[0-9]+@") { # only route numeric users to PSTN if(!load_gws()) { xlog("L_ERR", "Error loading PSTN gateways - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); sl_send_reply("503", "PSTN Termination Currently Unavailable"); exit; } if(!next_gw()) { xlog("L_ERR", "No PSTN gateways available - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); sl_send_reply("503", "PSTN Termination Currently Unavailable"); exit; } setflag(21); t_on_failure("1"); route(7); } } xlog("L_INFO", "Call to unknown user - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); sl_send_reply("404", "User Not Found"); exit; } ######################################################################## # Request route 'normalize-e164' ######################################################################## route[12] { # European numbering plans look like this: # CC = country code (i.e. 43 for Austria) # NDC = national destination code (i.e. 1 for Vienna) # SN = subscriber number (i.e. 4001234) # # CC + NDC + SN, i.e. 4314001234 # # Within the same CC+NDC, it can be omitted, so if # +4314001234 wants to call +4315002345, one can dial # just 5002345. # # Within the same CC, CC can be ommitted and a "0" is prefixed # to NDC, so if +4314001234 wants to call +4326003456, # one can dial 026003456. # # For international calls, either "00" or + is prefixed, like # +49123456780 or 0049123456789. # avp_delete("$avp(s:orig_callee_user)/g"); $avp(orig_callee_user) = $rU; if(uri =~ "^sip:(\+[1-9])?[0-9]+@") { # looks like a PSTN number if(uri =~ "^sip:0[1-9][0-9]+@") { # we have format 0+NDC+SN strip(1); prefix("+1"); } else if(uri =~ "^sip:00[1-9]+@") { # we have format 00 + CC + NDC + SN strip(2); prefix("+"); } else if(!uri =~ "^sip:\+[1-9][0-9]+@") { # unknown format, maybe NDC wasn't added before? xlog("L_INFO", "Not normalized callee '$avp(s:orig_callee_user)' to E.164 format - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); return(-1); } # else we have "+" + CC + NDC + SN xlog("L_INFO", "Normalized callee '$avp(s:orig_callee_user)' to E.164 format '$rU' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); return(1); } else { xlog("L_INFO", "Not normalized callee '$avp(s:orig_callee_user)' to E.164 format - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); return(-1); } } ######################################################################## # Request route 'lookup-enum' ######################################################################## route[13] { route(12); if($rc == 1) { if(enum_query("e164.org.")) { # TODO: do GW fallback (load gws, set failure-route)? xlog("L_INFO", "ENUM query succeeded - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); setdsturi("sip:bandwidth.com:5060"); route(7); exit; } else { xlog("L_INFO", "ENUM query failed - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); # ENUM query failed, revert $rU avp_pushto("$ru/username", "$avp(s:orig_callee_user)"); } } } ######################################################################## # Request route 'base-route-local' ######################################################################## route[14] { t_on_reply("1"); if(t_check_trans()) { xlog("L_INFO", "Request leaving server - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); if(!t_relay()) { sl_reply_error(); } } else { xlog("L_INFO", "Dropping mis-routed request - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); } exit; } ######################################################################## # Request route 'base-route-generic' ######################################################################## route[15] { xlog("L_INFO", "Method not supported - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); sl_send_reply("501", "Method Not Supported Here"); exit; } ######################################################################## # Request route 'base-filter-failover' ######################################################################## route[16] { if(!t_check_status("408|500|503")) { xlog("L_INFO", "No failover routing needed for this response code - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); route(5); exit; } } ######################################################################## # Reply route 'base-standard-reply' ######################################################################## onreply_route[1] { xlog("L_INFO", "Reply - S=$rs D=$rr F=$fu T=$tu IP=$si ID=$ci\n"); exit; } ######################################################################## # Reply route 'base-nat-reply' ######################################################################## onreply_route[2] { xlog("L_INFO", "NAT-Reply - S=$rs D=$rr F=$fu T=$tu IP=$si ID=$ci\n"); #mfs I rearranged this to be the same as the code in openser.cfg if(isbflagset(6) && status=~"(180)|(183)|2[0-9][0-9]") { if(!search("^Content-Length:[ ]*0")) { xlog("L_INFO", "NAT-Reply - force_rtp_proxy\n"); fix_nated_contact(); force_rtp_proxy(); } } else if(nat_uac_test("1")) { fix_nated_contact(); } exit; } ######################################################################## # Failure route 'pstn-failover' ######################################################################## failure_route[1] { xlog("L_INFO", "Failure route for PSTN entered - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); route(16); if(!next_gw()) { xlog("L_ERR", "Failed to select next PSTN gateway - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); route(5); exit; } t_on_failure("1"); route(7); } ######################################################################## # Failure route 'base-standard-failure' ######################################################################## failure_route[2] { if(t_check_status("422|481|487")) { xlog("L_INFO", "Final reply - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); route(5); exit; } t_on_branch("1"); xlog("L_INFO", "Redirect from UAC intercepted - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); route(9); # if($avp(s:cfc) != NULL) if( is_avp_set( "$avp(s:cfc)")) { avp_pushto("$ru", "$avp(s:cfc)"); setflag(29); append_branch(); t_on_branch("1"); xlog("L_INFO", "CFC detected - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); route(9); } route(16); route(5); } ######################################################################## # Branch route 'cfc-drop-local' ######################################################################## branch_route[1] { if(is_domain_local("$rd")) { xlog("L_INFO", "Dropping local branch - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n"); drop(); } } _______________________________________________ Users mailing list Users@rtpproxy.org http://lists.rtpproxy.org/mailman/listinfo/users