docs don't show it:
*
https://www.kamailio.org/docs/modules/5.3.x/modules/uac.html#uac.f.uac_auth
In the code is not, so if it is somewhere is the docs, likely it is a
mistaken backport.
Cheers,
Daniel
On 03.02.22 17:03, Richard Robson wrote:
hi Henning
I'm trying to find out if
hi Henning
I'm trying to find out if we have a back port.
uac_auth() is working , but uac_auth(1) and uac_auth("1") also fail
acording to to the 5.3.x Docs uac_auth([mode]) should work
On 03/02/2022 15:47, Henning Westerholt wrote:
Hello,
5.3.0 was released on 17th October 2019.
The uac
we have been running 5.3.4 with the uac_auth_mode() function ans it has
been working
we have upgraded to 5.3.8 and with the same script we are getting an
error with the uac module saying it was unable to find the cmd auc_auth_mode
I have tried this with uac_auth as well with the same result.
led "ext"
Regards,
Richard
On 30/11/2021 20:03, Karsten Horsmann wrote:
Hi Richard,
Hmmm for some reason I split my vars into parts.
And you prefix that with tls? Like this?
"!ADVERTISE_NAT_ADDRESS_TLS!tls:1.2.3.4:5061!g"
Best
Karsten
Richard Robson schrieb am D
o.cfg
import_file "kamailio-local.cfg"
#!substdef "!MY_HTTPS_ADDR!tls:MY_PUB_IP:MY_WSS_HTTPS!g"
listen=udp:MY_PUB_IP:5060
listen=tcp:MY_PUB_IP:5060
listen=tls:MY_PUB_IP:5061
listen=MY_HTTPS_ADDR
Kind regards
Karsten
Am Di., 30. Nov. 2021 um 16:57 Uhr schrieb Richard Robso
I have a problem when trying to add an advertised address in Kamailio 5.4.2
we have a checf config that is populating various variable. some of
these are for the Listeners
we have this working and Im getting all protocols for the listeners
based on the non _TLS Vars but the TLS config is t
idn't handle this well (for example SMTP servers, Helo works, sending not). You can AFAIK only adjust that on your Linux system via sysctl. Richard Robson <richard@rikrobson.co.uk> schrieb am Mi., 20. Okt. 2021, 18:01:I'm trying in vain to get a tls connection to a carrier.
~Wi
I'm trying in vain to get a tls connection to a carrier.
~Without too much detail we are exchanging certificates and they are
saying we are triggering a reset of the connection because we are
requesting to chage the tcp window size.
there are requiring us to have a window size of 65535. th
.com <https://gilawa.com/>
*From:* Richard Robson
*Sent:* Tuesday, September 7, 2021 3:13 PM
*To:* Henning Westerholt ; Kamailio (SER) - Users
Mailing List
*Subject:* Re: [SR-Users] via header not removed wit hremove_hf()
hi ,
Thanks Hennig,
I added the counts to check and i'll retest with
alatan.de/blog/>
Kamailio services – https://gilawa.com <https://gilawa.com/>
*From:*sr-users *On Behalf Of
*Richard Robson
*Sent:* Tuesday, September 7, 2021 2:10 PM
*To:* Kamailio (SER) - Users Mailing List
*Subject:* [SR-Users] via header not removed wit hremove_hf()
during tes
during testing I need to remove a Via header
This is the code snippet
route[REPLACE_VIA] {
xlog ("L_INFO", "[REPLACE_VIA] Start of block\n");
xlog ("L_INFO", "[REPLACE_VIA] $hdrc(Via) Via headers\n");
if(remove_hf("Via")) {
xlog ("L_INFO", "[REPLACE_VIA] remov
11 matches
Mail list logo