Hi, Looks like that. Jun 10 00:47:29 [24576] ERROR:auth_radius:radius_authorize_sterman: rc_auth failed
Your radius server is a remote server? Could you try to start sniffing at the opensips server? BR Uwe Jun 10 00:47:29 [24576] ERROR:auth_radius:radius_authorize_sterman: rc_auth failed Leon Li schrieb: > My radiusclient.conf is almost the same as this, except the different > directory. I turned on debug as below and run OpenSIPs as root (-u root) > but still nothing shows it try to send authentication to radius? > > Jun 10 00:47:29 [24576] DBG:core:parse_msg: SIP Request: > Jun 10 00:47:29 [24576] DBG:core:parse_msg: method: <REGISTER> > Jun 10 00:47:29 [24576] DBG:core:parse_msg: uri: > <sip:202.158.197.134> > Jun 10 00:47:29 [24576] DBG:core:parse_msg: version: <SIP/2.0> > Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=2 > Jun 10 00:47:29 [24576] DBG:core:parse_to: end of header reached, > state=10 > Jun 10 00:47:29 [24576] DBG:core:parse_to: display={"test"}, > ruri={sip:t...@202.158.197.134} > Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: <To> [35]; > uri=[sip:t...@202.158.197.134] > Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: to body ["test" > <sip:t...@202.158.197.134> > ] > Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: cseq <CSeq>: <1> > <REGISTER> > Jun 10 00:47:29 [24576] DBG:core:parse_via_param: found param type 232, > <branch> = <z9hG4bK-3ab88355ef-DL>; state=16 > Jun 10 00:47:29 [24576] DBG:core:parse_via: end of header reached, > state=5 > Jun 10 00:47:29 [24576] DBG:core:parse_headers: via found, flags=2 > Jun 10 00:47:29 [24576] DBG:core:parse_headers: this is the first via > Jun 10 00:47:29 [24576] DBG:core:receive_msg: After parse_msg... > Jun 10 00:47:29 [24576] DBG:core:receive_msg: preparing to run routing > scripts... > Jun 10 00:47:29 [24576] DBG:maxfwd:is_maxfwd_present: value = 70 > Jun 10 00:47:29 [24576] DBG:uri:has_totag: no totag > Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=78 > Jun 10 00:47:29 [24576] DBG:tm:t_lookup_request: start searching: > hash=44313, isACK=0 > Jun 10 00:47:29 [24576] DBG:tm:matching_3261: RFC3261 transaction > matching failed > Jun 10 00:47:29 [24576] DBG:tm:t_lookup_request: no transaction found > Jun 10 00:47:29 [24576] DBG:core:grep_sock_info: checking if host==us: > 15==15 && [202.158.197.134] == [202.158.197.134] > Jun 10 00:47:29 [24576] DBG:core:grep_sock_info: checking if port 5060 > matches port 5060 > Jun 10 00:47:29 [24576] DBG:core:parse_to_param: tag=DLdda82ca71a > Jun 10 00:47:29 [24576] DBG:core:parse_to_param: epid=09C9A6A0 > Jun 10 00:47:29 [24576] DBG:core:parse_to: end of header reached, > state=29 > Jun 10 00:47:29 [24576] DBG:core:parse_to: display={"test"}, > ruri={sip:t...@202.158.197.134} > REGISTER for (test) sip:202.158.197.134 > Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=4000 > Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: content_length=0 > Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: found end of header > Jun 10 00:47:29 [24576] DBG:auth:pre_auth: credentials with given realm > not found > Proxy Authentication Required (Digest) > Jun 10 00:47:29 [24576] DBG:auth:build_auth_hf: 'WWW-Authenticate: > Digest realm="202.158.197.134", > nonce="4a2f03cd2aecc81d4dd620f4ff564bed1d4d6963" > ' > Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=ffffffffffffffff > Jun 10 00:47:29 [24576] DBG:core:check_via_address: params > 202.158.213.91, 202.158.213.91, 0 > Jun 10 00:47:29 [24576] DBG:core:destroy_avp_list: destroying list (nil) > Jun 10 00:47:29 [24576] DBG:core:receive_msg: cleaning up > Jun 10 00:47:29 [24576] DBG:core:parse_msg: SIP Request: > Jun 10 00:47:29 [24576] DBG:core:parse_msg: method: <REGISTER> > Jun 10 00:47:29 [24576] DBG:core:parse_msg: uri: > <sip:202.158.197.134> > Jun 10 00:47:29 [24576] DBG:core:parse_msg: version: <SIP/2.0> > Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=2 > Jun 10 00:47:29 [24576] DBG:core:parse_to: end of header reached, > state=10 > Jun 10 00:47:29 [24576] DBG:core:parse_to: display={"test"}, > ruri={sip:t...@202.158.197.134} > Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: <To> [35]; > uri=[sip:t...@202.158.197.134] > Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: to body ["test" > <sip:t...@202.158.197.134> > ] > Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: cseq <CSeq>: <2> > <REGISTER> > Jun 10 00:47:29 [24576] DBG:core:parse_via_param: found param type 232, > <branch> = <z9hG4bK-4e1197fe1e-DL>; state=16 > Jun 10 00:47:29 [24576] DBG:core:parse_via: end of header reached, > state=5 > Jun 10 00:47:29 [24576] DBG:core:parse_headers: via found, flags=2 > Jun 10 00:47:29 [24576] DBG:core:parse_headers: this is the first via > Jun 10 00:47:29 [24576] DBG:core:receive_msg: After parse_msg... > Jun 10 00:47:29 [24576] DBG:core:receive_msg: preparing to run routing > scripts... > Jun 10 00:47:29 [24576] DBG:maxfwd:is_maxfwd_present: value = 70 > Jun 10 00:47:29 [24576] DBG:uri:has_totag: no totag > Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=78 > Jun 10 00:47:29 [24576] DBG:tm:t_lookup_request: start searching: > hash=44310, isACK=0 > Jun 10 00:47:29 [24576] DBG:tm:matching_3261: RFC3261 transaction > matching failed > Jun 10 00:47:29 [24576] DBG:tm:t_lookup_request: no transaction found > Jun 10 00:47:29 [24576] DBG:core:grep_sock_info: checking if host==us: > 15==15 && [202.158.197.134] == [202.158.197.134] > Jun 10 00:47:29 [24576] DBG:core:grep_sock_info: checking if port 5060 > matches port 5060 > Jun 10 00:47:29 [24576] DBG:core:parse_to_param: tag=DLdda82ca71a > Jun 10 00:47:29 [24576] DBG:core:parse_to_param: epid=09C9A6A0 > Jun 10 00:47:29 [24576] DBG:core:parse_to: end of header reached, > state=29 > Jun 10 00:47:29 [24576] DBG:core:parse_to: display={"test"}, > ruri={sip:t...@202.158.197.134} > REGISTER for (test) sip:202.158.197.134 > Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=4000 > Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: content_length=0 > Jun 10 00:47:29 [24576] DBG:auth:check_nonce: comparing > [4a2f03cd2aecc81d4dd620f4ff564bed1d4d6963] and > [4a2f03cd2aecc81d4dd620f4ff564bed1d4d6963] > Jun 10 00:47:29 [24576] ERROR:auth_radius:radius_authorize_sterman: > rc_auth failed > Proxy Authentication Required (Digest) > Jun 10 00:47:29 [24576] DBG:auth:build_auth_hf: 'WWW-Authenticate: > Digest realm="202.158.197.134", > nonce="4a2f03cd2aecc81d4dd620f4ff564bed1d4d6963" > ' > Jun 10 00:47:29 [24576] DBG:core:parse_headers: flags=ffffffffffffffff > Jun 10 00:47:29 [24576] DBG:core:get_hdr_field: found end of header > Jun 10 00:47:29 [24576] DBG:core:check_via_address: params > 202.158.213.91, 202.158.213.91, 0 > Jun 10 00:47:29 [24576] DBG:core:destroy_avp_list: destroying list (nil) > Jun 10 00:47:29 [24576] DBG:core:receive_msg: cleaning up > > Regards, > Leon > > -----Original Message----- > From: Uwe Kastens [mailto:ki...@kiste.org] > Sent: Tuesday, 9 June 2009 5:27 PM > To: Leon Li > Cc: users@lists.opensips.org > Subject: Re: [OpenSIPS-Users] No RADIUS traffic > > Hi, > > cat radiusclient.conf |grep -v ^#|grep -v ^$ > auth_order radius,local > login_tries 4 > login_timeout 60 > nologin /etc/nologin > issue /etc/radiusclient-ng/issue > authserver localhost > acctserver localhost > servers /etc/radiusclient-ng/servers > dictionary /etc/radiusclient-ng/dictionary > login_radius /usr/sbin/login.radius > seqfile /var/run/opensips/radius.seq > mapfile /etc/radiusclient-ng/port-id-map > default_realm > radius_timeout 10 > radius_retries 3 > bindaddr localhost > login_local /bin/login > > BR > > Uwe > > -- kiste lat: 54.322684, lon: 10.13586 _______________________________________________ Users mailing list Users@lists.opensips.org http://lists.opensips.org/cgi-bin/mailman/listinfo/users