Hi All,

  I'm trying to connect OpenSER with FreeRadius. I've managed to get the digest 
authentication
going correctly, having the Radius respond with LOGIN OK for the requests that 
are in the users file. However, although the authentication process appears to 
succeed, the IP phone doesn't register to the OpenSER server. 

  The following can be seen in the debug:

 0(17821) SIP Request:
 0(17821)  method:  <REGISTER>
 0(17821)  uri:     <sip:192.168.2.80>
 0(17821)  version: <SIP/2.0>
 0(17821) parse_headers: flags=2
 0(17821) Found param type 232, <branch> = <z9hG4bK4d7202f23b6595fc>; state=16
 0(17821) end of header reached, state=5
 0(17821) parse_headers: Via found, flags=2
 0(17821) parse_headers: this is the first via
 0(17821) After parse_msg...
 0(17821) preparing to run routing scripts...
 0(17821) parse_headers: flags=100
 0(17821) DEBUG:parse_to:end of header reached, state=10
 0(17821) DBUG:parse_to: display={}, ruri={sip:[EMAIL PROTECTED];user=phone}
 0(17821) DEBUG: get_hdr_field: <To> [35]; uri=[sip:[EMAIL 
PROTECTED];user=phone]
 0(17821) DEBUG: to body [<sip:[EMAIL PROTECTED];user=phone>
]
 0(17821) get_hdr_field: cseq <CSeq>: <20048> <REGISTER>
 0(17821) DEBUG:maxfwd:is_maxfwd_present: value = 70
 0(17821) parse_headers: flags=200
 0(17821) DEBUG: get_hdr_body : content_length=0
 0(17821) found end of header
 0(17821) find_first_route: No Route headers found
 0(17821) loose_route: There is no Route HF
 0(17821) grep_sock_info - checking if host==us: 12==12 &&  [192.168.2.80] == 
[192.168.2.80]
 0(17821) grep_sock_info - checking if port 5060 matches port 5060
 0(17821) grep_sock_info - checking if host==us: 12==12 &&  [192.168.2.80] == 
[192.168.2.80]
 0(17821) grep_sock_info - checking if port 5060 matches port 5060
 0(17821) check_nonce(): comparing [469aba5f4ff6b78f7b9588ad19fc0ab514e709da] 
and [469aba5f4ff6b78f7b9588ad19fc0ab514e709da]
 0(17821) ERROR:auth_radius:radius_authorize_sterman: rc_auth failed
 0(17821) build_auth_hf(): 'WWW-Authenticate: Digest realm="openser.org", 
nonce="469aba5f4ff6b78f7b9588ad19fc0ab514e709da", qop="auth"
'
 0(17821) parse_headers: flags=ffffffffffffffff
 0(17821) check_via_address(192.168.2.101, 192.168.2.101, 0)
 0(17821) DEBUG:destroy_avp_list: destroying list (nil)
 0(17821) receive_msg: cleaning up

  As you can surely see, the ERROR is somewhere in the authorization status. 
Now, I've verified
the secret key between the machine, and all seems to be in place - any pointers 
will be highly appreciated.

Z2L

_______________________________________________
Users mailing list
Users@openser.org
http://openser.org/cgi-bin/mailman/listinfo/users

Reply via email to