Без проблем. Прошу прощения за некоторые возможные неточности в описаниях, сам на стадии изучения
OpenSer ставился из rpm (ОС FedoraCore7), установлены следующие пакеты:
openser-cpl-1.2.2-3.fc7
openser-jabber-1.2.2-3.fc7
openser-radius-1.2.2-3.fc7
openser-mysql-1.2.2-3.fc7
openser-odbc-1.2.2-3.fc7
openser-1.2.2-3.fc7
openser-debuginfo-1.2.2-3.fc7
mediaproxy-1.9.0-1.fc7
Конфиг сгенерирован с помощью следующего ресурса:
http://www.sipwise.com
########################################################################
# This configuration is autogenerated by sip:wizard
# (http://www.sipwise.com/wizard) on Wed Sep 05 12:42:15 +0200 2007
# for OpenSER 1.2
#
# Copyright (C) 2007 Sipwise (support@sipwise.com)
########################################################################
########################################################################
# By obtaining, using, and/or copying this configuration and/or its
# associated documentation, you agree that you have read, understood,
# and will comply with the Terms of Usage provided at
# http://www.sipwise.com/news/?page_id=6 as well as the following
# additions:
#
# Permission to use, copy, modify, and distribute this configuration and
# its associated documentation for any purpose and without fee is hereby
# granted, provided that the above copyright notice appears in all
# copies, and that both that copyright notice and this permission notice
# appear in supporting documentation, and that the name of Sipwise or
# the author will not be used in advertising or publicity pertaining to
# distribution of the configuration without specific, written prior
# permission.
########################################################################
########################################################################
# Before using this configuration, read the following prerequisites in
# order to gain the designated functionallity:
#
# base:
# You have to insert all locally served domains (i.e.
# "openserctl domain add your.domain.com").
#
# nat-mediaproxy:
# You have to install mediaproxy
# (http://mediaproxy.ag-projects.com/) for relaying RTP traffic.
#
# usr-preferences(!!!сноска1):
# This feature relies on UUID-based provisioning. Thus, you have
# to add the uuid-column to the subscriber table ("alter table
# subscriber add column uuid varchar(64);") and populate it with a
# UUID (unique user identifier) per user, for example an
# auto-incremented id.
#
# offnet-incoming-sip:
# You have to populate the "trusted"-table with rules for
# allowed peering hosts (i.e. src_ip="1.2.3.4", proto="udp",
# from_pattern="^sip:.*@domain.of.peering.host$", tag="1234"). If the
# feature "usr-preferences" is selected, the tag-value is used as
# caller-uuid for such calls.
#
# offnet-pstn:
# You have to add a routing entry for lcr (i.e. "openserctl lcr
# addroute '' '' 1 1"). Additionally, you have to add your gateways
# (i.e. "openserctl lcr addgw my-test-gw 1.2.3.4 5060 sip udp 1").
#
# ring-timeout:
# You have to provision the ring-timeout (AVP ringtimeout as
# type 1) for each user in the usr_preferences table (i.e.
# uuid='1234', username='', domain='', attribute='ringtimeout',
# type=1, value='60'). If no timeout is provisioned, the default
# timeout will be used.
#
# cfu:
# You have to provision the call-forward-unconditional as full
# SIP URI (AVP cfu as type 0) for each user in the usr_preferences
# table (i.e. uuid='1234', username='', domain='', attribute='cfu',
# type=0, value='sip:foo@otherdomain.com'). Forwards to another user
# in the same domain or to other domains are possible.
#
# cfc:
# You have to provision the call-forward-conditional as full SIP
# URI (AVP cfc as type 0) for each user in the usr_preferences table
# (i.e. uuid='1234', username='', domain='', attribute='cfc', type=0,
# value='sip:foo@otherdomain.com'). Forwards to another user in the
# same domain or to other domains are possible.
#
# user-aliases:
# You have to add aliases for your users (i.e. "openserctl alias
# add 01234567 sip:bob@yourdomain.com" for usrloc-based aliases or
# make entries into "dbaliases" table for db-based aliases)
#
# cli:
# You have to provision the CLI as full SIP URI (AVP cli as type
# 0) for each user in the usr_preferences table (i.e. uuid='1234',
# username='', domain='', attribute='cli', type=0,
# value='sip:01234567@yourdomain.com').
#
#
# clir:
# You have to provision '1' to enable CLIR and '0' to disable it
# (AVP clir as type 1) for each user in the usr_preferences table
# (i.e. uuid='1234', username='', domain='', attribute='clir',
# type=1, value='1').
#
# acc-db:
# You have to add the columns "src_leg" and "dst_leg" to your
# acc-table ("alter table acc add column src_leg varchar(128); alter
# table acc add column dst_leg varchar(128);").
#
########################################################################
########################################################################
# Configuration 'sip:wizard - Wed Sep 05 12:42:15 +0200 2007'
########################################################################
listen = udp:x.x.x.x:5060
mpath = "/usr/lib/openser/modules"
alias = sip.yourdomain.com
children = 8
debug = 9
fork = yes
group = "openser"
user = "openser"
disable_tcp = no
log_facility = LOG_LOCAL6
log_stderror = no
tcp_children = 4
mhomed = no
server_signature = yes
sock_group = "openser"
sock_mode = 0600
sock_user = "openser"
unix_sock = "/tmp/openser.sock"
unix_sock_children = 1
reply_to_via = no
sip_warning = no
check_via = no
dns = no
rev_dns = no
disable_core_dump = no
dns_try_ipv6 = yes
dns_use_search_list = yes
loadmodule "usrloc.so"
modparam("usrloc", "user_column", "username")
modparam("usrloc", "domain_column", "domain")
modparam("usrloc", "contact_column", "contact")
modparam("usrloc", "expires_column", "expires")
modparam("usrloc", "q_column", "q")
modparam("usrloc", "callid_column", "callid")
modparam("usrloc", "cseq_column", "cseq")
modparam("usrloc", "methods_column", "methods")
modparam("usrloc", "flags_column", "flags")
modparam("usrloc", "user_agent_column", "user_agent")
modparam("usrloc", "received_column", "received")
modparam("usrloc", "socket_column", "socket")
#modparam("usrloc", "use_domain", 0)
modparam("usrloc", "use_domain", 1)
modparam("usrloc", "desc_time_order", 0)
modparam("usrloc", "timer_interval", 60)
modparam("usrloc", "db_url", "mysql://openser:openserrw@localhost/openser")
modparam("usrloc", "db_mode", 1)
modparam("usrloc", "matching_mode", 0)
modparam("usrloc", "cseq_delay", 20)
modparam("usrloc", "nat_bflag", 6)
loadmodule "registrar.so"
modparam("registrar", "default_expires", 3600)
modparam("registrar", "min_expires", 60)
modparam("registrar", "max_expires", 0)
modparam("registrar", "default_q", 0)
modparam("registrar", "append_branches", 1)
modparam("registrar", "case_sensitive", 0)
modparam("registrar", "received_param", "received")
modparam("registrar", "max_contacts", 0)
modparam("registrar", "retry_after", 0)
modparam("registrar", "method_filtering", 0)
modparam("registrar", "path_mode", 2)
modparam("registrar", "path_use_received", 0)
modparam("registrar", "received_avp", "$avp(i:801)")
loadmodule "rr.so"
modparam("rr", "enable_full_lr", 0)
modparam("rr", "append_fromtag", 1)
modparam("rr", "enable_double_rr", 1)
modparam("rr", "add_username", 0)
loadmodule "tm.so"
modparam("tm", "fr_timer", 30)
modparam("tm", "fr_inv_timer", 120)
modparam("tm", "wt_timer", 5)
modparam("tm", "delete_timer", 2)
modparam("tm", "noisy_ctimer", 0)
modparam("tm", "ruri_matching", 1)
modparam("tm", "via1_matching", 1)
modparam("tm", "unix_tx_timeout", 2)
modparam("tm", "restart_fr_on_each_reply", 1)
modparam("tm", "pass_provisional_replies", 0)
modparam("tm", "fr_inv_timer_avp", "$avp(s:callee_fr_inv_timer)")
loadmodule "xlog.so"
modparam("xlog", "buf_size", 4096)
modparam("xlog", "force_color", 0)
loadmodule "mi_fifo.so"
modparam("mi_fifo", "fifo_name", "/tmp/openser_fifo")
modparam("mi_fifo", "fifo_mode", 0660)
modparam("mi_fifo", "fifo_group", "openser")
modparam("mi_fifo", "fifo_user", "openser")
modparam("mi_fifo", "reply_dir", "/tmp/")
modparam("mi_fifo", "reply_indent", "\t")
loadmodule "domain.so"
modparam("domain", "db_url", "mysql://openser:openserrw@localhost/openser")
modparam("domain", "db_mode", 1)
modparam("domain", "domain_table", "domain")
modparam("domain", "domain_col", "domain")
loadmodule "nathelper.so"
modparam("nathelper", "natping_interval", 0)
modparam("nathelper", "ping_nated_only", 1)
modparam("nathelper", "rtpproxy_sock", "unix:/var/run/rtpproxy.sock")
modparam("nathelper", "rtpproxy_disable", 1)
modparam("nathelper", "rtpproxy_disable_tout", 60)
modparam("nathelper", "rtpproxy_tout", 1)
modparam("nathelper", "rtpproxy_retr", 5)
modparam("nathelper", "sipping_method", "OPTIONS")
modparam("nathelper", "received_avp", "$avp(i:801)")
loadmodule "textops.so"
loadmodule "mediaproxy.so"
modparam("mediaproxy", "mediaproxy_socket", "/var/run/proxydispatcher.sock")
modparam("mediaproxy", "mediaproxy_socket", "/var/run/mediaproxy.sock")
modparam("mediaproxy", "sip_asymmetrics", "/etc/openser/sip-asymmetric-clients")
modparam("mediaproxy", "rtp_asymmetrics", "/etc/openser/rtp-asymmetric-clients")
modparam("mediaproxy", "natping_interval", 60)
loadmodule "uri.so"
loadmodule "sl.so"
modparam("sl", "enable_stats", 1)
loadmodule "maxfwd.so"
modparam("maxfwd", "max_limit", 256)
loadmodule "mysql.so"
modparam("mysql", "ping_interval", 300)
modparam("mysql", "auto_reconnect", 1)
loadmodule "auth.so"
modparam("auth", "nonce_expire", 300)
modparam("auth", "rpid_suffix", ";party=calling;id-type=subscriber;screen=yes")
modparam("auth", "rpid_avp", "$avp(s:rpid)")
loadmodule "auth_db.so"
modparam("auth_db", "db_url", "mysql://openser:openserrw@localhost/openser")
modparam("auth_db", "user_column", "username")
modparam("auth_db", "domain_column", "domain")
modparam("auth_db", "password_column", "password")
modparam("auth_db", "password_column_2", "ha1b")
modparam("auth_db", "calculate_ha1", 1)
#modparam("auth_db", "use_domain", 0)
modparam("auth_db", "use_domain", 1)
modparam("auth_db", "load_credentials", "$avp(s:caller_uuid)=uuid")
loadmodule "uri_db.so"
modparam("uri_db", "db_url", "mysql://openser:openserrw@localhost/openser")
modparam("uri_db", "uri_table", "uri")
modparam("uri_db", "uri_user_column", "username")
modparam("uri_db", "uri_domain_column", "domain")
modparam("uri_db", "uri_uriuser_column", "uri_user")
modparam("uri_db", "subscriber_table", "subscriber")
modparam("uri_db", "subscriber_user_column", "username")
modparam("uri_db", "subscriber_domain_column", "domain")
modparam("uri_db", "use_uri_table", 0)
#modparam("uri_db", "use_domain", 0)
modparam("uri_db", "use_domain", 1)
loadmodule "avpops.so"
modparam("avpops", "db_url", "mysql://openser:openserrw@localhost/openser")
modparam("avpops", "avp_table", "usr_preferences")
#modparam("avpops", "use_domain", 0)
modparam("avpops", "use_domain", 1)
modparam("avpops", "uuid_column", "uuid")
modparam("avpops", "username_column", "username")
modparam("avpops", "domain_column", "domain")
modparam("avpops", "attribute_column", "attribute")
modparam("avpops", "value_column", "value")
modparam("avpops", "type_column", "type")
loadmodule "permissions.so"
modparam("permissions", "default_allow_file", "permissions.allow")
modparam("permissions", "default_deny_file", "permissions.deny")
modparam("permissions", "check_all_branches", 1)
modparam("permissions", "allow_suffix", ".allow")
modparam("permissions", "deny_suffix", ".deny")
modparam("permissions", "db_url", "mysql://openser:openserrw@localhost/openser")
modparam("permissions", "db_mode", 1)
modparam("permissions", "trusted_table", "trusted")
modparam("permissions", "source_col", "src_ip")
modparam("permissions", "proto_col", "proto")
modparam("permissions", "from_col", "from_pattern")
modparam("permissions", "tag_col", "tag")
modparam("permissions", "peer_tag_avp", "s:peer_uuid")
loadmodule "lcr.so"
modparam("lcr", "db_url", "mysql://openser:openserrw@localhost/openser")
modparam("lcr", "gw_table", "gw")
modparam("lcr", "gw_name_column", "gw_name")
modparam("lcr", "ip_addr_column", "ip_addr")
modparam("lcr", "port_column", "port")
modparam("lcr", "uri_scheme_column", "uri_scheme")
modparam("lcr", "transport_column", "transport")
modparam("lcr", "grp_id_column", "grp_id")
modparam("lcr", "lcr_table", "lcr")
modparam("lcr", "strip_column", "strip")
modparam("lcr", "prefix_column", "prefix")
modparam("lcr", "from_uri_column", "from_uri")
modparam("lcr", "priority_column", "priority")
modparam("lcr", "gw_uri_avp", "1400")
modparam("lcr", "ruri_user_avp", "1402")
modparam("lcr", "contact_avp", "1401")
modparam("lcr", "fr_inv_timer_avp", "s:fr_inv_timer_avp")
modparam("lcr", "fr_inv_timer", 90)
modparam("lcr", "fr_inv_timer_next", 30)
modparam("lcr", "rpid_avp", "s:rpid")
loadmodule "alias_db.so"
modparam("alias_db", "db_url", "mysql://openser:openserrw@localhost/openser")
modparam("alias_db", "user_column", "username")
modparam("alias_db", "domain_column", "domain")
modparam("alias_db", "alias_user_column", "alias_username")
modparam("alias_db", "alias_domain_column", "alias_domain")
#modparam("alias_db", "use_domain", 0)
modparam("alias_db", "use_domain", 1)
loadmodule "uac.so"
modparam("uac", "rr_store_param", "vsf")
modparam("uac", "from_restore_mode", "auto")
modparam("uac", "from_passwd", "s1p:Wiz4rd!")
loadmodule "acc.so"
modparam("acc", "early_media", 0)
modparam("acc", "failed_transaction_flag", 24)
modparam("acc", "report_ack", 0)
modparam("acc", "report_cancels", 0)
modparam("acc", "log_flag", 2)
modparam("acc", "log_missed_flag", 3)
modparam("acc", "log_level", 2)
modparam("acc", "db_flag", 25)
modparam("acc", "db_missed_flag", 0)
modparam("acc", "db_table_acc", "acc")
modparam("acc", "db_table_missed_calls", "missed_calls")
modparam("acc", "db_url", "mysql://openser:openserrw@localhost/openser")
modparam("acc", "acc_method_column", "method")
modparam("acc", "acc_callid_column", "callid")
modparam("acc", "acc_time_column", "time")
modparam("acc", "acc_totag_column", "to_tag")
modparam("acc", "acc_from_tag_column", "from_tag")
modparam("acc", "detect_direction", 1)
modparam("acc", "acc_sip_code_column", "sip_code")
modparam("acc", "acc_sip_reason_column", "sip_reason")
modparam("acc", "multi_leg_info", "src_leg=$avp(i:901);dst_leg=$avp(i:902)")
########################################################################
# Request route 'main'
########################################################################
route[0]
{
xlog("L_INFO", "New request - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
force_rport();
if(msg:len > max_len)
{
xlog("L_INFO", "Message too big - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
sl_send_reply("513", "Message Too Big");
exit;
}
if (!mf_process_maxfwd_header("10"))
{
xlog("L_INFO", "Too many hops - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
sl_send_reply("483", "Too Many Hops");
exit;
}
if(!is_method("REGISTER"))
{
if(nat_uac_test("19"))
{
record_route(";nat=yes");
}
else
{
record_route();
}
}
if(is_method("CANCEL") || is_method("BYE"))
{
end_media_session();
}
if(loose_route())
{
if(!has_totag())
if(!has_totag())
{
xlog("L_INFO", "Initial loose-routing rejected - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
sl_send_reply("403", "Initial Loose-Routing Rejected");
exit;
}
if(nat_uac_test("19") || search("^Route:.*;nat=yes"))
{
fix_nated_contact();
setbflag(6);
}
if(is_method("BYE"))
{
setflag(24); # account failed transactions
setflag(25); # account successful transactions
}
# mark as loose-routed for acc
setflag(26);
route(12);
}
if(is_method("REGISTER"))
{
route(11);
}
setflag(24); # account failed transactions
setflag(25); # account successful transactions
if(is_method("INVITE"))
{
route(13);
}
if(is_method("CANCEL") || is_method("ACK"))
{
route(17);
}
route(18);
}
########################################################################
# Request route 'clear-usr-preferences-caller'
########################################################################
route[1]
{
xlog("L_INFO", "Clear caller preferences - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
avp_delete("$avp(s:caller_cli)/g");
avp_delete("$avp(s:clir)/g");
}
########################################################################
# Request route 'clear-usr-preferences-callee'
########################################################################
route[2]
{
xlog("L_INFO", "Clear callee preferences - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
avp_delete("$avp(s:callee_fr_inv_timer)/g");
avp_delete("$avp(s:cfu)/g");
avp_delete("$avp(s:cfc)/g");
}
########################################################################
# Request route 'usr-preferences-caller'
########################################################################
route[3]
{
route(1);
xlog("L_INFO", "Load caller preferences for uuid '$avp(s:caller_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
# load caller avps
avp_db_load("$avp(s:caller_uuid)", "*");
avp_copy("$avp(s:cli)", "$avp(s:caller_cli)/d");
if(is_avp_set("$avp(s:clir)/n") && avp_check("$avp(s:clir)", "eq/i:1"))
{
# mark for anonymization
setflag(28);
}
}
########################################################################
# Request route 'usr-preferences-callee'
########################################################################
route[4]
{
xlog("L_INFO", "Load callee preferences for uuid '$avp(s:callee_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
# load callee avps
avp_db_load("$avp(s:callee_uuid)", "*");
if(is_avp_set("$avp(s:cfu)/s"))
{
xlog("L_INFO", "Call-forward-unconditional to '$avp(s:cfu)' found - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(8);
avp_delete("$avp(s:caller_uuid)/g");
avp_copy("$avp(s:callee_uuid)", "$avp(s:caller_uuid)/d");
avp_pushto("$ru", "$avp(s:cfu)");
route(3);
route(14);
exit;
}
if(is_avp_set("$avp(s:ringtimeout)/n"))
{
xlog("L_INFO", "Setting ring timeout to $avp(s:ringtimeout) secs - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
avp_copy("$avp(s:ringtimeout)", "$avp(s:callee_fr_inv_timer)/d");
}
}
########################################################################
# Request route 'acc-caller'
########################################################################
route[5]
{
xlog("L_INFO", "Setting acc source-leg for uuid '$avp(s:caller_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
avp_printf("$avp(i:901)", "$avp(s:caller_uuid)|$avp(s:acc_caller_user)|$avp(s:acc_caller_domain)|$avp(s:acc_state)");
}
########################################################################
# Request route 'acc-callee'
########################################################################
route[6]
{
xlog("L_INFO", "Setting acc destination-leg for uuid '$avp(s:callee_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
avp_printf("$avp(i:902)", "$avp(s:callee_uuid)|$avp(s:acc_callee_user)|$avp(s:acc_callee_domain)");
}
########################################################################
# Request route 'acc-failure'
########################################################################
route[7]
{
xlog("L_INFO", "Accounting failed request for uuid '$avp(s:caller_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(5);
route(6);
resetflag(24);
acc_db_request("404", "acc");
}
########################################################################
# Request route 'cfu-acc'
########################################################################
route[8]
{
$avp(s:acc_callee_user) = $rU;
$avp(s:acc_callee_domain) = $rd;
route(5);
route(6);
avp_delete("$avp(s:acc_caller_user)");
avp_delete("$avp(s:acc_caller_domain)");
avp_copy("$avp(s:acc_callee_user)", "$avp(s:acc_caller_user)");
avp_copy("$avp(s:acc_callee_domain)", "$avp(s:acc_caller_domain)");
avp_delete("$avp(s:acc_state)/g");
$avp(s:acc_state) = "cfu";
}
########################################################################
# Request route 'clir'
########################################################################
route[9]
{
if(isflagset(28) && !isflagset(27))
{
setflag(27);
xlog("L_INFO", "Anonymize caller - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
uac_replace_from("Anonymous","sip:anonymous@anonymous.invalid");
if(is_present_hf("Privacy"))
{
remove_hf("Privacy");
}
append_hf("Privacy: id\r\n");
}
}
########################################################################
# Request route 'stop-media-proxy'
########################################################################
route[10]
{
if(isflagset(22))
{
end_media_session();
}
}
########################################################################
# Request route 'base-route-register'
########################################################################
route[11]
{
sl_send_reply("100", "Trying");
if(!www_authorize("", "subscriber"))
{
xlog("L_INFO", "Register authentication failed - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
www_challenge("", "0");
exit;
}
if(!check_to())
{
xlog("L_INFO", "Spoofed To-URI detected - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
sl_send_reply("403", "Spoofed To-URI Detected");
exit;
}
consume_credentials();
if(!search("^Contact:[ ]*\*") && nat_uac_test("19"))
{
fix_nated_register();
setbflag(6);
}
if(!save("location"))
{
xlog("L_ERR", "Saving contact failed - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
sl_reply_error();
exit;
}
xlog("L_INFO", "Registration successful - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
exit;
}
########################################################################
# Request route 'base-outbound'
########################################################################
route[12]
{
if(is_present_hf("P-Asserted-Identity"))
{
remove_hf("P-Asserted-Identity");
}
if(is_present_hf("Remote-Party-ID"))
{
remove_hf("Remote-Party-ID");
}
if(is_avp_set("$avp(s:caller_cli)/s"))
{
if(!isflagset(28))
{
xlog("L_INFO", "Set caller CLI '$avp(s:caller_cli)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
append_hf("P-Asserted-Identity: <$avp(s:caller_cli)>\r\n");
}
}
route(9);
if(isbflagset(6))
{
if(!isflagset(22) && !search("^Content-Length:[ ]*0"))
{
setflag(22);
use_media_proxy();
}
t_on_reply("2");
}
else
{
t_on_reply("1");
}
if(!isflagset(21))
{
t_on_failure("2");
if(!isflagset(26))
{
$avp(s:acc_callee_user) = $rU;
$avp(s:acc_callee_domain) = $rd;
route(5);
route(6);
}
}
if(isflagset(29))
{
append_branch();
}
if(is_present_hf("Proxy-Authorization"))
{
consume_credentials();
}
xlog("L_INFO", "Request leaving server, D-URI='$du' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
# no 100 (we already sent it) and no DNS blacklisting
if(!t_relay("0x05"))
{
sl_reply_error();
if(is_method("INVITE") && isbflagset(6))
{
end_media_session();
}
}
exit;
}
########################################################################
# Request route 'base-route-invite'
########################################################################
route[13]
{
sl_send_reply("100", "Trying");
if(from_gw())
{
$avp(s:caller_uuid) = "0";
xlog("L_INFO", "Call from PSTN' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
setflag(23);
}
else
{
if(allow_trusted())
{
if(is_avp_set("$avp(s:peer_uuid)/s"))
{
# use tag-column from trusted-table as uuid for this caller
avp_copy("$avp(s:peer_uuid)", "$avp(s:caller_uuid)/d");
}
else
{
# if no uuid is set, use "0" as default uuid
$avp(s:caller_uuid) = "0";
}
xlog("L_INFO", "Call from trusted peer with uuid '$avp(s:caller_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
if(!is_domain_local("$rd"))
{
xlog("L_INFO", "Rejecting peering attempt with non-local request domain - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
sl_send_reply("403", "Relaying Denied");
exit;
}
setflag(23);
}
else
{
if(!proxy_authorize("", "subscriber"))
{
xlog("L_INFO", "Proxy authentication failed - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
proxy_challenge("", "0");
exit;
}
if(!check_from())
{
xlog("L_INFO", "Spoofed From-URI detected - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
sl_send_reply("403", "Spoofed From-URI Detected");
exit;
}
}
}
$avp(s:acc_caller_user) = $fU;
$avp(s:acc_caller_domain) = $fd;
$avp(s:acc_state) = "call";
route(3);
if(nat_uac_test("19"))
{
fix_nated_contact();
setbflag(6);
}
route(14);
}
########################################################################
# Request route 'invite-find-callee'
########################################################################
route[14]
{
if(alias_db_lookup("dbaliases"))
{
xlog("L_INFO", "Callee was aliased - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
}
route(2);
if(!is_domain_local("$rd"))
{
setflag(20);
$avp(s:callee_uuid) = "0";
route(16);
}
avp_delete("$avp(s:callee_uuid)");
avp_db_query("select uuid from subscriber where username = '$rU'", "$avp(s:callee_uuid)");
if(is_avp_set("$avp(s:callee_uuid)/s"))
{
xlog("L_INFO", "Callee is local, uuid='$avp(s:callee_uuid)' - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(15);
}
else
{
$avp(s:callee_uuid) = "0";
xlog("L_INFO", "Callee is not local - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(16);
}
exit;
}
########################################################################
# Request route 'invite-to-internal'
########################################################################
route[15]
{
route(4);
if(!lookup("location"))
{
xlog("L_INFO", "Local user offline - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
$avp(s:acc_callee_user) = $rU;
$avp(s:acc_callee_domain) = $rd;
route(7);
sl_send_reply("404", "User Offline");
}
else
{
xlog("L_INFO", "Local user online - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(12);
}
exit;
}
########################################################################
# Request route 'invite-to-external'
########################################################################
route[16]
{
if(isflagset(20))
{
xlog("L_INFO", "Call to foreign domain - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(12);
exit;
}
if(!isflagset(23))
{
# don't allow calls relaying from PSTN to PSTN, if not explicitely forwarded
if(uri =~ "^sip:[0-9]+@")
{
# only route numeric users to PSTN
if(!load_gws())
{
xlog("L_ERR", "Error loading PSTN gateways - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
sl_send_reply("503", "PSTN Termination Currently Unavailable");
exit;
}
if(!next_gw())
{
xlog("L_ERR", "No PSTN gateways available - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
sl_send_reply("503", "PSTN Termination Currently Unavailable");
exit;
}
setflag(21);
t_on_failure("1");
route(12);
}
}
xlog("L_INFO", "Call to unknown user - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(7);
sl_send_reply("404", "User Not Found");
exit;
}
########################################################################
# Request route 'base-route-local'
########################################################################
route[17]
{
t_on_reply("1");
if(t_check_trans())
{
xlog("L_INFO", "Request leaving server - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
if(!t_relay())
{
sl_reply_error();
}
}
else
{
xlog("L_INFO", "Dropping mis-routed request - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
}
exit;
}
########################################################################
# Request route 'base-route-generic'
########################################################################
route[18]
{
xlog("L_INFO", "Method not supported - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
sl_send_reply("501", "Method Not Supported Here");
exit;
}
########################################################################
# Request route 'base-filter-failover'
########################################################################
route[19]
{
if(!t_check_status("408|500|503"))
{
xlog("L_INFO", "No failover routing needed for this response code - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(10);
exit;
}
}
########################################################################
# Reply route 'base-standard-reply'
########################################################################
onreply_route[1]
{
xlog("L_INFO", "Reply - S=$rs D=$rr F=$fu T=$tu IP=$si ID=$ci\n");
exit;
}
########################################################################
# Reply route 'base-nat-reply'
########################################################################
onreply_route[2]
{
xlog("L_INFO", "NAT-Reply - S=$rs D=$rr F=$fu T=$tu IP=$si ID=$ci\n");
if(nat_uac_test("1"))
{
fix_nated_contact();
}
if(isbflagset(6) && status=~"(180)|(183)|2[0-9][0-9]")
{
if(!search("^Content-Length:[ ]*0"))
{
use_media_proxy();
}
}
exit;
}
########################################################################
# Failure route 'pstn-failover'
########################################################################
failure_route[1]
{
xlog("L_INFO", "Failure route for PSTN entered - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(19);
if(!next_gw())
{
xlog("L_ERR", "Failed to select next PSTN gateway - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(10);
exit;
}
t_on_failure("1");
route(12);
}
########################################################################
# Failure route 'base-standard-failure'
########################################################################
failure_route[2]
{
if(t_check_status("422|481|487"))
{
xlog("L_INFO", "Final reply - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(10);
exit;
}
t_on_branch("1");
xlog("L_INFO", "Redirect from UAC intercepted - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(14);
if($avp(s:cfc) != NULL)
{
avp_delete("$avp(s:acc_caller_user)/g");
avp_delete("$avp(s:acc_caller_domain)/g");
avp_delete("$avp(s:acc_state)/g");
avp_copy("$avp(s:acc_callee_user)", "$avp(s:acc_caller_user)");
avp_copy("$avp(s:acc_callee_domain)", "$avp(s:acc_caller_domain)");
$avp(s:acc_state) = "cfc";
avp_pushto("$ru", "$avp(s:cfc)");
setflag(29);
append_branch();
t_on_branch("1");
xlog("L_INFO", "CFC detected - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
route(14);
}
route(19);
route(10);
}
########################################################################
# Branch route 'cfc-drop-local'
########################################################################
branch_route[1]
{
if(is_domain_local("$rd"))
{
xlog("L_INFO", "Dropping local branch - M=$rm RURI=$ru F=$fu T=$tu IP=$si ID=$ci\n");
drop();
}
}
Конфиг после генерации особых изменений не претерпел. Управление сервером пока происходит через утилиту openserctl, пока ее хватает, но есть камень (Сноска1) поле uuid если вы его будете использовать, openserctl не добавляет, поэтому приходится добавлять через запрос к БД.