Здравствуйте, Коллеги!
Сразу оговорюсь VoIP и Asterisk трогал давно, много воды утекло, что-то подзабылось, что-то изменилось...
Понадобилось установить OpenSIPS, скомпилялось всё без проблем, настраивал вроде по мануалу, используя родные приблуды (opensipsctl, opensipsdbctl) и даже веб интерфейс, но тщетно :(
SIP-клиенты показывают 403, 408, 508 ошибки в зависимости от различных настроек самих клиентов.
Подозреваю, что что-то с прохождением трафика извне на сервер. Сервер располагается в локальной сети, за натом, имеет локальный айпишник. Внешний IP конечно есть и порт 5060 открыт и проброшен на сервер с OpenSIPS. В логах случаются какие-то отрыжки. Понаставил свои метки, кои приведу ниже.
Роутеры в конфиге руками не трогал, ибо пока не до них, авторизоваться бы.Реальный IP здесь я заменил на 123.123.123.123, остальное всё без купюр.
Очень жду и надеюсь на Вашу помощь!!! Отчаялся уже :(
Вот метки в логах
Jun 6 11:21:57 mx01 /usr/sbin/opensips[17025]: Start
Jun 6 11:21:57 mx01 /usr/sbin/opensips[17025]: 1
Jun 6 11:21:57 mx01 /usr/sbin/opensips[17025]: 2
Jun 6 11:21:57 mx01 /usr/sbin/opensips[17025]: 6
Jun 6 11:21:57 mx01 /usr/sbin/opensips[17025]: 7
Jun 6 11:21:57 mx01 /usr/sbin/opensips[17025]: 8
Jun 6 11:21:57 mx01 /usr/sbin/opensips[17025]: 12
Jun 6 11:21:57 mx01 /usr/sbin/opensips[17025]: Attempt to route with preloaded Route's [sip:Konstantin@123.123.123.123/sip:Konstantin@123.123.123.123/sip:123.123.123.123/PLhW3y7g1Mmvo56uuINXSwqWgLzTtXfG]
Jun 6 11:22:24 mx01 /usr/sbin/opensips[17020]: Start
Jun 6 11:22:24 mx01 /usr/sbin/opensips[17020]: 1
Jun 6 11:22:24 mx01 /usr/sbin/opensips[17020]: 2
Jun 6 11:22:24 mx01 /usr/sbin/opensips[17020]: 6
Jun 6 11:22:24 mx01 /usr/sbin/opensips[17020]: 7
Jun 6 11:22:24 mx01 /usr/sbin/opensips[17020]: 8
Jun 6 11:22:24 mx01 /usr/sbin/opensips[17020]: 12
Jun 6 11:22:24 mx01 /usr/sbin/opensips[17020]: 13
Jun 6 11:22:26 mx01 /usr/sbin/opensips[17023]: Start
Jun 6 11:22:26 mx01 /usr/sbin/opensips[17023]: 1
Jun 6 11:22:26 mx01 /usr/sbin/opensips[17023]: 2
Jun 6 11:22:26 mx01 /usr/sbin/opensips[17023]: 6
Jun 6 11:22:26 mx01 /usr/sbin/opensips[17023]: 7
Jun 6 11:22:28 mx01 /usr/sbin/opensips[17025]: Start
Jun 6 11:22:28 mx01 /usr/sbin/opensips[17025]: 1
Jun 6 11:22:28 mx01 /usr/sbin/opensips[17025]: 2
Jun 6 11:22:28 mx01 /usr/sbin/opensips[17025]: 6
Jun 6 11:22:28 mx01 /usr/sbin/opensips[17025]: 7
А вот сам конфиг.
#
# $Id$
#
# OpenSIPS residential configuration script
# by OpenSIPS Solutions <team@opensips-solutions.com>
#
# This script was generated via "make menuconfig", from
# the "Residential" scenario.
# You can enable / disable more features / functionalities by
# re-generating the scenario with different options.#
#
# Please refer to the Core CookBook at:
# http://www.opensips.org/Resources/DocsCookbooks
# for a explanation of possible statements, functions and parameters.
#
####### Global Parameters #########
debug=3
log_stderror=no
log_facility=LOG_LOCAL0
fork=yes
children=4
/* uncomment the following lines to enable debugging */
#debug=6
#fork=no
#log_stderror=yes
/* uncomment the next line to enable the auto temporary blacklisting of
not available destinations (default disabled) */
#disable_dns_blacklist=no
/* uncomment the next line to enable IPv6 lookup after IPv4 dns
lookup failures (default disabled) */
#dns_try_ipv6=yes
/* comment the next line to enable the auto discovery of local aliases
based on revers DNS on IPs */
auto_aliases=no
listen=udp:192.168.1.101:5060 # CUSTOMIZE ME
#listen=udp:123.123.123.123:5060
disable_tcp=yes
#listen=tcp:192.168.1.101:5060 # CUSTOMIZE ME
disable_tls=yes
####### Modules Section ########
#set module path
mpath="/usr/lib64/opensips/modules/"
#### SIGNALING module
loadmodule "signaling.so"
#### StateLess module
loadmodule "sl.so"
#### Transaction Module
loadmodule "tm.so"
modparam("tm", "fr_timer", 5)
modparam("tm", "fr_inv_timer", 30)
modparam("tm", "restart_fr_on_each_reply", 0)
modparam("tm", "onreply_avp_mode", 1)
#### Record Route Module
loadmodule "rr.so"
/* do not append from tag to the RR (no need for this script) */
modparam("rr", "append_fromtag", 0)
#### MAX ForWarD module
loadmodule "maxfwd.so"
#### SIP MSG OPerationS module
loadmodule "sipmsgops.so"
#### FIFO Management Interface
loadmodule "mi_fifo.so"
modparam("mi_fifo", "fifo_name", "/tmp/opensips_fifo")
modparam("mi_fifo", "fifo_mode", 0666)
#### URI module
loadmodule "uri.so"
modparam("uri", "use_uri_table", 0)
# postgres
loadmodule "db_postgres.so"
db_default_url="postgres://opensips:123456@localhost/opensips"
#### MYSQL module
#loadmodule "db_mysql.so"
#### HTTPD module
loadmodule "httpd.so"
modparam("httpd", "port", 8888)
#### USeR LOCation module
loadmodule "usrloc.so"
modparam("usrloc", "nat_bflag", "NAT")
modparam("usrloc", "db_mode", 0)
#### REGISTRAR module
loadmodule "registrar.so"
modparam("registrar", "tcp_persistent_flag", "TCP_PERSISTENT")
modparam("registrar", "received_avp", "$avp(received_nh)")
/* uncomment the next line not to allow more than 10 contacts per AOR */
#modparam("registrar", "max_contacts", 10)
#### ACCounting module
loadmodule "acc.so"
/* what special events should be accounted ? */
modparam("acc", "early_media", 0)
modparam("acc", "report_cancels", 0)
/* by default we do not adjust the direct of the sequential requests.
if you enable this parameter, be sure the enable "append_fromtag"
in "rr" module */
modparam("acc", "detect_direction", 0)
modparam("acc", "failed_transaction_flag", "ACC_FAILED")
/* account triggers (flags) */
modparam("acc", "log_flag", "ACC_DO")
modparam("acc", "log_missed_flag", "ACC_MISSED")
#### AUTHentication modules
loadmodule "auth.so"
loadmodule "auth_db.so"
modparam("auth_db", "calculate_ha1", yes)
modparam("auth_db", "password_column", "password")
modparam("auth_db", "db_url",
"postgres://opensips:123456@localhost/opensips") # CUSTOMIZE ME
modparam("auth_db", "load_credentials", "")
#### NAT modules
loadmodule "nathelper.so"
modparam("nathelper", "natping_interval", 30)
modparam("nathelper", "ping_nated_only", 1)
modparam("nathelper", "received_avp", "$avp(42)")
modparam("nathelper", "sipping_bflag", 7)
modparam("nathelper", "sipping_from", "sip:pinger@123.123.123.123")
loadmodule "rtpproxy.so"
#modparam("rtpproxy", "rtpproxy_sock", "udp:localhost:12221") # CUSTOMIZE ME
modparam("rtpproxy", "rtpproxy_sock", "unix:/var/run/rtpproxy.sock")
#### MI_HTTP module
loadmodule "mi_http.so"
####### Routing Logic ########
# main request routing logic
route{
xlog("L_INFO", "Start");
force_rport();
if (nat_uac_test("23")) {
if (is_method("REGISTER")) {
fix_nated_register();
setbflag(NAT);
} else {
fix_nated_contact();
setflag(NAT);
}
}
xlog("L_INFO", "1");
if (!mf_process_maxfwd_header("10")) {
sl_send_reply("483","Too Many Hops");
exit;
}
xlog("L_INFO", "2");
if (has_totag()) {
# sequential request withing a dialog should
# take the path determined by record-routing
xlog("L_INFO", "3");
if (loose_route()) {
xlog("L_INFO", "4");
if (is_method("BYE")) {
setflag(ACC_DO); # do accounting ...
setflag(ACC_FAILED); # ... even if the transaction fails
} else if (is_method("INVITE")) {
# even if in most of the cases is useless, do RR for
# re-INVITEs alos, as some buggy clients do change route set
# during the dialog.
record_route();
}
if (check_route_param("nat=yes"))
setflag(NAT);
# route it out to whatever destination was set by loose_route()
# in $du (destination URI).
route(relay);
} else {
xlog("L_INFO", "5");
if ( is_method("ACK") ) {
if ( t_check_trans() ) {
# non loose-route, but stateful ACK; must be an ACK after
# a 487 or e.g. 404 from upstream server
t_relay();
exit;
} else {
# ACK without matching transaction ->
# ignore and discard
exit;
}
}
sl_send_reply("404","Not here");
}
exit;
}
xlog("L_INFO", "6");
# CANCEL processing
if (is_method("CANCEL"))
{
if (t_check_trans())
t_relay();
exit;
}
xlog("L_INFO", "7");
t_check_trans();
xlog("L_INFO", "8");
if ( !(is_method("REGISTER") ) ) {
xlog("L_INFO", "9");
if (from_uri==myself)
{
xlog("L_INFO", "10");
# authenticate if from local subscriber
# authenticate all initial non-REGISTER request that pretend to be
# generated by local subscriber (domain from FROM URI is local)
if (!proxy_authorize("", "subscriber")) {
proxy_challenge("", "0");
exit;
}
if (!db_check_from()) {
sl_send_reply("403","Forbidden auth ID");
exit;
}
consume_credentials();
# caller authenticated
} else {
xlog("L_INFO", "11");
# if caller is not local, then called number must be local
if (!uri==myself) {
send_reply("403","Rely forbidden");
exit;
}
}
}
xlog("L_INFO", "12");
# preloaded route checking
if (loose_route()) {
xlog("L_ERR",
"Attempt to route with preloaded Route's [$fu/$tu/$ru/$ci]");
if (!is_method("ACK"))
sl_send_reply("403","Preload Route denied");
exit;
}
xlog("L_INFO", "13");
# record routing
if (!is_method("REGISTER|MESSAGE"))
record_route();
# account only INVITEs
if (is_method("INVITE")) {
xlog("L_INFO", "14");
setflag(ACC_DO); # do accounting
}
if (!uri==myself) {
append_hf("P-hint: outbound\r\n");
route(relay);
}
# requests for my domain
if (is_method("PUBLISH|SUBSCRIBE"))
{
xlog("L_INFO", "15");
sl_send_reply("503", "Service Unavailable");
exit;
}
if (is_method("REGISTER"))
{
xlog("L_INFO", "16");
# authenticate the REGISTER requests
if (!www_authorize("", "subscriber"))
{
www_challenge("", "0");
exit;
}
if (!db_check_to())
{
sl_send_reply("403","Forbidden auth ID");
exit;
}
if ( proto==TCP || 0 ) setflag(TCP_PERSISTENT);
if (!save("location"))
sl_reply_error();
exit;
}
if ($rU==NULL) {
# request with no Username in RURI
sl_send_reply("484","Address Incomplete");
exit;
}
# do lookup with method filtering
if (!lookup("location","m")) {
if (!db_does_uri_exist()) {
send_reply("420","Bad Extension");
exit;
}
t_newtran();
t_reply("404", "Not Found");
exit;
}
if (isbflagset(NAT)) setflag(NAT);
# when routing via usrloc, log the missed calls also
setflag(ACC_MISSED);
route(relay);
}
route[relay] {
# for INVITEs enable some additional helper routes
if (is_method("INVITE")) {
if (isflagset(NAT)) {
rtpproxy_offer("ro");
}
t_on_branch("per_branch_ops");
t_on_reply("handle_nat");
t_on_failure("missed_call");
}
if (isflagset(NAT)) {
add_rr_param(";nat=yes");
}
if (!t_relay()) {
send_reply("500","Internal Error");
};
exit;
}
branch_route[per_branch_ops] {
xlog("new branch at $ru\n");
}
onreply_route[handle_nat] {
if (nat_uac_test("1"))
fix_nated_contact();
if ( isflagset(NAT) )
rtpproxy_answer("ro");
xlog("incoming reply\n");
}
failure_route[missed_call] {
if (t_was_cancelled()) {
exit;
}
# uncomment the following lines if you want to block client
# redirect based on 3xx replies.
##if (t_check_status("3[0-9][0-9]")) {
##t_reply("404","Not found");
## exit;
##}
}