Marc, can u post your newly modified configuration again? Also, I would add an exit after route(1) in the loose routing. Did u try also disabling the accounting?
Dan On 8/2/07, Marc LEURENT <[EMAIL PROTECTED]> wrote: > Do you have any idea to solve this matter: > In the BYE request: > > 0(2569) found end of header > 0(2569) find_next_route: No next Route HF found > 0(2569) after_loose: No next URI found > > So the BYE message is not forwarded by openser > > > > > > > Please find below INVITE and BYE requests > > > > > > > > > 0(2632) SIP Request: > 0(2632) method: <INVITE> > 0(2632) uri: <sip:[EMAIL PROTECTED]:5060> > 0(2632) version: <SIP/2.0> > 0(2632) parse_headers: flags=2 > 0(2632) Found param type 232, <branch> = <z9hG4bK4747925369759203710>; > state=16 > 0(2632) end of header reached, state=5 > 0(2632) parse_headers: Via found, flags=2 > 0(2632) parse_headers: this is the first via > 0(2632) After parse_msg... > 0(2632) preparing to run routing scripts... > 0(2632) parse_headers: flags=100 > 0(2632) DEBUG:parse_to:end of header reached, state=10 > 0(2632) DBUG:parse_to: display={}, ruri={sip:[EMAIL > PROTECTED]:5060;user=phone} > 0(2632) DEBUG: get_hdr_field: <To> [46]; uri=[sip:[EMAIL > PROTECTED]:5060;user=phone] > 0(2632) DEBUG: to body [<sip:[EMAIL PROTECTED]:5060;user=phone> > ] > 0(2632) get_hdr_field: cseq <CSeq>: <1> <INVITE> > 0(2632) DEBUG:maxfwd:is_maxfwd_present: value = 70 > 0(2632) DBG:maxfwd:process_maxfwd_header: value 70 decreased to 10 > 0(2632) ROUTE2: STARTING NAT DETECTION > 0(2632) !!!!!!!!! NAT UAC TEST 19 SUCEDEED > 0(2632) parse_headers: flags=80 > 0(2632) ROUTE2: SETFLAG 3 > 0(2632) DEBUG: add_param: tag=c0a80101-b67ff5 > 0(2632) DEBUG:parse_to:end of header reached, state=29 > 0(2632) DBUG:parse_to: display={"101"}, ruri={sip:[EMAIL > PROTECTED]:5060;user=phone} > 0(2632) parse_headers: flags=200 > 0(2632) DEBUG: get_hdr_body : content_length=269 > 0(2632) found end of header > 0(2632) find_first_route: No Route headers found > 0(2632) loose_route: There is no Route HF > 0(2632) DEBUG: has_totag: no totag > 0(2632) I AM SETTING THE FLAGS FOR RADIUS > 0(2632) SETTING FLAGS 1 & 2 FOR RADIUS > 0(2632) CHECKING IF URI <> myself > 0(2632) grep_sock_info - checking if host==us: 18==12 && > [sd-7501.dedibox.fr] == [88.191.45.91] > 0(2632) grep_sock_info - checking if port 5060 matches port 5060 > 0(2632) grep_sock_info - checking if host==us: 18==12 && > [sd-7501.dedibox.fr] == [88.191.45.91] > 0(2632) grep_sock_info - checking if port 5060 matches port 5060 > 0(2632) grep_sock_info - checking if host==us: 18==12 && > [sd-7501.dedibox.fr] == [88.191.45.91] > 0(2632) grep_sock_info - checking if port 5060 matches port 5060 > 0(2632) grep_sock_info - checking if host==us: 18==12 && > [sd-7501.dedibox.fr] == [88.191.45.91] > 0(2632) grep_sock_info - checking if port 5060 matches port 5060 > 0(2632) rewrite_uri: Rewriting Request-URI with 'sip:[EMAIL > PROTECTED]:1028;user=phone' > 0(2632) parse_headers: flags=ffffffffffffffff > 0(2632) STARTING ROUTE 1 > 0(2632) subst_run: running. r=1 > 0(2632) subst_str: no match > 0(2632) FLAG 3 OK GOTO ROUTE 3 > 0(2632) !!!!!!!!! ON ROUTE 3 FOR NATTED CONTACT > 0(2632) DEBUG: t_newtran: T on entrance=0xffffffff > 0(2632) parse_headers: flags=ffffffffffffffff > 0(2632) parse_headers: flags=78 > 0(2632) t_lookup_request: start searching: hash=12532, isACK=0 > 0(2632) DEBUG: RFC3261 transaction matching failed > 0(2632) DEBUG: t_lookup_request: no transaction found > 0(2632) DBG: trans=0xb5c08fa8, callback type 1, id 1 entered > 0(2632) trace_onreq_in: trace off... > 0(2632) DBG: trans=0xb5c08fa8, callback type 1, id 0 entered > 0(2632) parse_headers: flags=78 > 0(2632) DEBUG: noisy_timer set for accounting > 0(2632) DEBUG:rr:is_direction: param ftag not found > 0(2632) parse_headers: flags=ffffffffffffffff > 0(2632) check_via_address(82.127.0.79, 82.127.0.79, 0) > > > > > > > > 0(2569) SIP Request: > 0(2569) method: <BYE> > 0(2569) uri: <sip:[EMAIL PROTECTED]:1312> > 0(2569) version: <SIP/2.0> > 0(2569) parse_headers: flags=2 > 0(2569) Found param type 232, <branch> = <z9hG4bK2074253192092946047>; > state=16 > 0(2569) end of header reached, state=5 > 0(2569) parse_headers: Via found, flags=2 > 0(2569) parse_headers: this is the first via > 0(2569) After parse_msg... > 0(2569) preparing to run routing scripts... > 0(2569) parse_headers: flags=100 > 0(2569) DEBUG: add_param: tag=c0a80101-b31387 > 0(2569) DEBUG:parse_to:end of header reached, state=29 > 0(2569) DBUG:parse_to: display={}, ruri={sip:[EMAIL > PROTECTED]:5060;user=phone} > 0(2569) DEBUG: get_hdr_field: <To> [66]; uri=[sip:[EMAIL > PROTECTED]:5060;user=phone] > 0(2569) DEBUG: to body [<sip:[EMAIL PROTECTED]:5060;user=phone>] > 0(2569) get_hdr_field: cseq <CSeq>: <1> <BYE> > 0(2569) DEBUG:maxfwd:is_maxfwd_present: value = 70 > 0(2569) DBG:maxfwd:process_maxfwd_header: value 70 decreased to 10 > 0(2569) ROUTE2: STARTING NAT DETECTION > 0(2569) !!!!!!!!! NAT UAC TEST 19 SUCEDEED > 0(2569) parse_headers: flags=80 > 0(2569) DEBUG: get_hdr_body : content_length=0 > 0(2569) found end of header > 0(2569) ROUTE2: SETFLAG 3 > 0(2569) DEBUG: add_param: tag=c0a80101-2376fc2 > 0(2569) DEBUG:parse_to:end of header reached, state=29 > 0(2569) DBUG:parse_to: display={}, ruri={sip:[EMAIL > PROTECTED]:5060;user=phone} > 0(2569) parse_headers: flags=200 > 0(2569) is_preloaded: No > 0(2569) grep_sock_info - checking if host==us: 11==12 && [82.127.0.79] == > [88.191.45.91] > 0(2569) grep_sock_info - checking if port 5060 matches port 1312 > 0(2569) grep_sock_info - checking if host==us: 11==12 && [82.127.0.79] == > [88.191.45.91] > 0(2569) grep_sock_info - checking if port 5060 matches port 1312 > 0(2569) DEBUG:check_self: host != me > 0(2569) grep_sock_info - checking if host==us: 12==12 && [88.191.45.91] == > [88.191.45.91] > 0(2569) grep_sock_info - checking if port 5060 matches port 5060 > 0(2569) after_loose: Topmost route URI: > 'sip:88.191.45.91;lr=on;ftag=c0a80101-b31387' is me > 0(2569) parse_headers: flags=200 > 0(2569) found end of header > 0(2569) find_next_route: No next Route HF found > 0(2569) after_loose: No next URI found > 0(2569) DBG:rr:run_rr_callbacks: callback id 0 entered with > <lr=on;ftag=c0a80101-b31387> > > > > > Dan-Cristian Bogos a écrit : > > That's because for INVITE your will take routing decisions but BYE u > > will just proxy out. > > > > DanB > > > > On 8/2/07, Marc LEURENT <[EMAIL PROTECTED]> wrote: > >> I've compared the INVITE and BYE method.... > >> And the uri in the INVITE method is > >> 0(2632) SIP Request: > >> 0(2632) method: <INVITE> > >> 0(2632) uri: <sip:[EMAIL PROTECTED]:5060> > >> 0(2632) version: <SIP/2.0> > >> > >> whereas in the BYE method > >> > >> 0(2569) SIP Request: > >> 0(2569) method: <BYE> > >> 0(2569) uri: <sip:[EMAIL PROTECTED]:1312> > >> 0(2569) version: <SIP/2.0> > >> > >> > >> so the DEBUG:check_self: host != me > >> I'm going to try without accoounting, but it should'nt change anything... > >> > >> Best Regards > >> > >> > >> > >> > >> > >> > _______________________________________________ Users mailing list Users@openser.org http://openser.org/cgi-bin/mailman/listinfo/users