Hi all,
i try to registering whit the gatekeeper radius auth chek ok, but ohphone make error.
this is my gatekeeper.ini:
[Gatekeeper::Main]
Fourtytwo=42
Name=TorGK
[RoutedMode]
GKRouted=1
H245Routed=1
[GkStatus::Auth]
rule=allow
[Gatekeeper::Auth]
RadAliasAuth=sufficient;RRQ,ARQ
default=allow
[RadAliasAuth]
Servers=10.0.0.1:1812
SharedSecret=voip
RequestRetransmissions=2
IncludeEndpointIP=1
ohphone:
Listening interfaces : ALL:1720
Enabling H.235 security access to gatekeeper.
Searching for gatekeeper wit h id "TorGK" ...Error registering with gatekeeper at
"TorGK"
OhPhone ended.
gnugk:
}
2003/06/13 11:57:52.104 1 RasSrv.cxx(825) GK GRQ Received
2003/06/13 11:57:52.104 1 MulticastGRQ.cxx(104) GK Multicast GRQ R
ceived
2003/06/13 11:57:52.104 4 gkauth.h(80) GkAuth default check o
2003/06/13 11:57:52.104 1 RasSrv.cxx(825) GK GRQ Received
2003/06/13 11:57:52.104 1 MulticastGRQ.cxx(104) GK Multicast GRQ R
ceived
2003/06/13 11:57:52.104 4 gkauth.h(80) GkAuth default check o
2003/06/13 11:57:52.104 1 RasSrv.cxx(825) GK GRQ Received
2003/06/13 11:57:52.104 2 & n bsp; RasSrv.cxx(900) GCF|10.0.0.51|pelliccia
h323_ID|terminal;
2003/06/13 11:57:52.104 2 & n bsp; RasSrv.cxx(900) GCF|10.0.0.51|pelliccia
h323_ID|terminal;
2003/06/13 11:57:52.114 4 gkauth.h(80) GkAuth default check o
2003/06/13 11:57:52.114 3 RasSrv.cxx(2072) GK Send to 10.0.0.
1:3659
gatekeeperConfirm {
requestSeqNum = 42157
protocolIdentifier = 0.0.8.2250.0.4
gatekeeperIdentifier = 5 characters {
0054 006f 0072 0047 004b TorGK
}
rasAddress = ipAddress {
ip = 4 octets {
&nbs p ; 0a 00 00 33 ...3
}
port = 1719
}
}
2003/06/13 11:57:52.114 2 RasSrv.cxx(900) GCF|10.0.0.51|pelliccia
h323_ID|terminal;
1:3659
gatekeeperConfirm {
requestSeqNum = 42157
protocolIdentifier = 0.0.8.2250.0.4
gatekeeperIdentifier = 5 characters {
0054 006f 0072 0047 004b TorGK
}
rasAddress = ipAddress {
ip = 4 octets {
&nbs p ; 0a 00 00 33 ...3
}
port = 1719
}
}
2003/06/13 11:57:52.114 2 RasSrv.cxx(900) GCF|10.0.0.51|pelliccia
h323_ID|terminal;
2003/06/13 11:57:52.124 5 RasSrv.cxx(2086) GK Sent Successful
2003/06/13 11:57:52.124 3 RasSrv.cxx(2072) GK Send to 10.0.0.
1:3660
gatekeeperConfirm {
requestSeqNum = 4 2 157
protocolIdentifier = 0.0.8.2250.0.4
gatekeeperIdentifier = 5 characters {
0054 006f 0072 0047 004b TorGK
}
rasAddress = ipAddress {
ip = 4 octets {
0a 00 00 33 ...3
}
port = 1719
}
}
2003/06/13 11:57:52.124 2 RasSrv.cxx(2132) GK & n bsp; Read from 10.0.
.51:3659
2003/06/13 11:57:52.124 5 RasSrv.cxx(2086) GK Sent Successful
2003/06/13 11:57:52.124 3 RasSrv.cxx(2145) GK
registrationRequest {
requestSeqNum = 42158
protocolIdentifier = 0.0.8.2250.0.4
discoveryComplete = TRUE
callSignalAddress = 1 entries {
[0]=ipAddress {
ip = 4 octets {
0a 00 00 33 ... 3
}
port = 1720
}
}
rasAddress = 1 entries {
[0]=ipAddress {
ip = 4 octets {
0a 00 00 33 ...3
}
port = 3659
}
}
terminalType = {
vendor = {
vendor = {
& n bsp; t35CountryCode = 9
t35Extension = 0
manufacturerCode = 61
}
productId = 27 octets {
4f 70 65 6e 20 48 33 32 33 20 50 72 6f 6a 65 63 Open H323 Projec
74 20 4f 68 50 68 6f 6e 65 00 00 t OhPhone..
}
versionId = 26 octets {
31 2e 33 2e 37 20 28 4f 70 65 6e 48 33 32 33 20 1.3.7 (OpenH323
& nbsp; 76 31 2e 31 31 2e 37 29 00 00 v1.11.7)..
}
}
terminal = {
}
mc = FALSE
undefinedNode = FALSE
}
terminalAlias = 1 entries {
[0]=h323_ID 9 characters {
0070 0065 006c 006c 0069 0063 0063 0069 pellicci
0061 a
&nb s p; }
}
gatekeeperIdentifier = 5 characters {
0054 006f 0072 0047 004b TorGK
}
endpointVendor = {
vendor = {
t35CountryCode = 9
t35Extension = 0
manufacturerCode = 61
}
productId = 27 octets {
4f 70 65 6e 20 48 33 32 33 20 50 72 6f 6a 65 63 Open H323 Projec
74 20 4f 68 50 68 6f 6e 65 00 00 & n bsp; t OhPhone..
}
versionId = 26 octets {
31 2e 33 2e 37 20 28 4f 70 65 6e 48 33 32 33 20 1.3.7 (OpenH323
76 31 2e 31 31 2e 37 29 00 00 v1.11.7)..
}
}
tokens = 1 entries {
[0]={
tokenOID = 1.2.840.113548.10.1.2.1
timeStamp = 1055498272
challenge = 16 octets {
9f ef 14 14 b8 31 d1 7d 2f 6f 60 d2 df ab 6d ad .....1.}/o`...m.
&nb s p; }
random = 113
generalID = 10 characters {
0070 0065 006c 006c 0069 0063 0063 0069 pellicci
0061 0000 a
}
}
}
cryptoTokens = 2 entries {
[0]=nestedcryptoToken cryptoHashedToken {
tokenOID = 0.0.8.235.0.2.1
hashedVals = {
tokenOID = 0.0.8.235.0.2.5
timeStamp = 1055498272
random = 77558496
generalID = 5 characters {
0054 006f 0072 0047 004b TorGK
}
sendersID = 9 characters {
0070 0065 006c 006c 0069 0063 0063 0069 pellicci
0061   ; a
}
}
token = {
algorithmOID = 0.0.8.235.0.2.6
paramS = {
}
hash = Hex: b3 7e f1 67 05 8d d6 6a 1d bb d0 df
}
}
[1]=cryptoEPPwdHash {
alias = h323_ID 9 characters {
0070 0065 006c 006c 0069 0063 0063 0069 pellicci
0061 & n bsp; a
}
timeStamp = 1055498272
token = {
algorithmOID = 1.2.840.113549.2.5
paramS = {
}
hash = Hex: 12 0a 8f 38 79 17 87 10 3e ab 04 81 1f d2 89 8a
}
}
}
keepAlive = FALSE
willSupplyUUIEs = TRUE
maintainConnection = FALSE
&n b sp; supportsAltGK = <<null>>
usageReportingCapability = {
nonStandardUsageTypes = 0 entries {
}
startTime = <<null>>
endTime = <<null>>
terminationCause = <<null>>
}
callCreditCapability = {
canEnforceDurationLimit = TRUE
}
}
2003/06/13 11:57:52.154 1 MulticastGRQ.cxx(83) GK Multicast threa
: Read error: Connection reset
2003/06/13 11:57:52.154 1 RasSrv.cxx(927) GK RRQ Received
2003/06/13 11:57:52.154 5 &nbs p ; radproto.cxx(1861) RADIUS Sending PDU to
ADIUS server 10.0.0.1 (10.0.0.1:1812) from port:43681:[0,82-83], PDU: {
code = 1 (Access-Request)
id = 83
length = 73 octets
authenticator = 16 octets {
58 1f 4e 5a d2 e3 29 e0 03 89 34 84 a7 12 99 34 X.NZ..)...4....4
}
attributes = 6 elements {
[0]= {
type = 1 (User-Name)
length = 11 octets
& nbsp; value = 9 octets {
70 65 6c 6c 69 63 63 69 61 pelliccia
}
}
[1]= {
type = 2 (User-Password)
length = 18 octets
value = 16 octets {
8c 40 06 b6 b2 79 c0 03 13 72 e1 fd f0 e5 16 6c .@...y...r....
l
& nbsp; }
}
[2]= {
type = 4 (NAS-IP-Address)
length = 6 octets
value = 4 octets {
0a 00 00 33 ...3
}
}
[ 3 ]= {
type = 61 (NAS-Port-Type)
length = 6 octets
value = 4 octets {
00 00 00 05 ....
}
}
[4]= {
type = 6 (Service-Type)
length = 6 o c tets
value = 4 octets {
00 00 00 01 ....
}
}
[5]= {
type = 8 (Framed-IP-Address)
length = 6 octets
value = 4 octets {
0a 00 0 0 33 ...3
}
}
}
}
2003/06/13 11:57:52.124 3 RasSrv.cxx(2072) GK Send to 10.0.0.
1:3660
gatekeeperConfirm {
requestSeqNum = 4 2 157
protocolIdentifier = 0.0.8.2250.0.4
gatekeeperIdentifier = 5 characters {
0054 006f 0072 0047 004b TorGK
}
rasAddress = ipAddress {
ip = 4 octets {
0a 00 00 33 ...3
}
port = 1719
}
}
2003/06/13 11:57:52.124 2 RasSrv.cxx(2132) GK & n bsp; Read from 10.0.
.51:3659
2003/06/13 11:57:52.124 5 RasSrv.cxx(2086) GK Sent Successful
2003/06/13 11:57:52.124 3 RasSrv.cxx(2145) GK
registrationRequest {
requestSeqNum = 42158
protocolIdentifier = 0.0.8.2250.0.4
discoveryComplete = TRUE
callSignalAddress = 1 entries {
[0]=ipAddress {
ip = 4 octets {
0a 00 00 33 ... 3
}
port = 1720
}
}
rasAddress = 1 entries {
[0]=ipAddress {
ip = 4 octets {
0a 00 00 33 ...3
}
port = 3659
}
}
terminalType = {
vendor = {
vendor = {
& n bsp; t35CountryCode = 9
t35Extension = 0
manufacturerCode = 61
}
productId = 27 octets {
4f 70 65 6e 20 48 33 32 33 20 50 72 6f 6a 65 63 Open H323 Projec
74 20 4f 68 50 68 6f 6e 65 00 00 t OhPhone..
}
versionId = 26 octets {
31 2e 33 2e 37 20 28 4f 70 65 6e 48 33 32 33 20 1.3.7 (OpenH323
& nbsp; 76 31 2e 31 31 2e 37 29 00 00 v1.11.7)..
}
}
terminal = {
}
mc = FALSE
undefinedNode = FALSE
}
terminalAlias = 1 entries {
[0]=h323_ID 9 characters {
0070 0065 006c 006c 0069 0063 0063 0069 pellicci
0061 a
&nb s p; }
}
gatekeeperIdentifier = 5 characters {
0054 006f 0072 0047 004b TorGK
}
endpointVendor = {
vendor = {
t35CountryCode = 9
t35Extension = 0
manufacturerCode = 61
}
productId = 27 octets {
4f 70 65 6e 20 48 33 32 33 20 50 72 6f 6a 65 63 Open H323 Projec
74 20 4f 68 50 68 6f 6e 65 00 00 & n bsp; t OhPhone..
}
versionId = 26 octets {
31 2e 33 2e 37 20 28 4f 70 65 6e 48 33 32 33 20 1.3.7 (OpenH323
76 31 2e 31 31 2e 37 29 00 00 v1.11.7)..
}
}
tokens = 1 entries {
[0]={
tokenOID = 1.2.840.113548.10.1.2.1
timeStamp = 1055498272
challenge = 16 octets {
9f ef 14 14 b8 31 d1 7d 2f 6f 60 d2 df ab 6d ad .....1.}/o`...m.
&nb s p; }
random = 113
generalID = 10 characters {
0070 0065 006c 006c 0069 0063 0063 0069 pellicci
0061 0000 a
}
}
}
cryptoTokens = 2 entries {
[0]=nestedcryptoToken cryptoHashedToken {
tokenOID = 0.0.8.235.0.2.1
hashedVals = {
tokenOID = 0.0.8.235.0.2.5
timeStamp = 1055498272
random = 77558496
generalID = 5 characters {
0054 006f 0072 0047 004b TorGK
}
sendersID = 9 characters {
0070 0065 006c 006c 0069 0063 0063 0069 pellicci
0061   ; a
}
}
token = {
algorithmOID = 0.0.8.235.0.2.6
paramS = {
}
hash = Hex: b3 7e f1 67 05 8d d6 6a 1d bb d0 df
}
}
[1]=cryptoEPPwdHash {
alias = h323_ID 9 characters {
0070 0065 006c 006c 0069 0063 0063 0069 pellicci
0061 & n bsp; a
}
timeStamp = 1055498272
token = {
algorithmOID = 1.2.840.113549.2.5
paramS = {
}
hash = Hex: 12 0a 8f 38 79 17 87 10 3e ab 04 81 1f d2 89 8a
}
}
}
keepAlive = FALSE
willSupplyUUIEs = TRUE
maintainConnection = FALSE
&n b sp; supportsAltGK = <<null>>
usageReportingCapability = {
nonStandardUsageTypes = 0 entries {
}
startTime = <<null>>
endTime = <<null>>
terminationCause = <<null>>
}
callCreditCapability = {
canEnforceDurationLimit = TRUE
}
}
2003/06/13 11:57:52.154 1 MulticastGRQ.cxx(83) GK Multicast threa
: Read error: Connection reset
2003/06/13 11:57:52.154 1 RasSrv.cxx(927) GK RRQ Received
2003/06/13 11:57:52.154 5 &nbs p ; radproto.cxx(1861) RADIUS Sending PDU to
ADIUS server 10.0.0.1 (10.0.0.1:1812) from port:43681:[0,82-83], PDU: {
code = 1 (Access-Request)
id = 83
length = 73 octets
authenticator = 16 octets {
58 1f 4e 5a d2 e3 29 e0 03 89 34 84 a7 12 99 34 X.NZ..)...4....4
}
attributes = 6 elements {
[0]= {
type = 1 (User-Name)
length = 11 octets
& nbsp; value = 9 octets {
70 65 6c 6c 69 63 63 69 61 pelliccia
}
}
[1]= {
type = 2 (User-Password)
length = 18 octets
value = 16 octets {
8c 40 06 b6 b2 79 c0 03 13 72 e1 fd f0 e5 16 6c .@...y...r....
l
& nbsp; }
}
[2]= {
type = 4 (NAS-IP-Address)
length = 6 octets
value = 4 octets {
0a 00 00 33 ...3
}
}
[ 3 ]= {
type = 61 (NAS-Port-Type)
length = 6 octets
value = 4 octets {
00 00 00 05 ....
}
}
[4]= {
type = 6 (Service-Type)
length = 6 o c tets
value = 4 octets {
00 00 00 01 ....
}
}
[5]= {
type = 8 (Framed-IP-Address)
length = 6 octets
value = 4 octets {
0a 00 0 0 33 ...3
}
}
}
}
2003/06/13 11:57:52.174 5 radproto.cxx(1880) RADIUS Received PDU fr
m RADIUS server 10.0.0.1 (10.0.0.1:1812) by socket port:43681:[0,82-83], PDU: {
code = 2 (Access-Accept)
id = 83
length = 20 octets
authenticator = 16 octets {
& nbsp; 75 e5 ab a8 8b ce 25 4a 52 27 a9 77 37 44 4e 5a u.....%JR'.w7DNZ
}
attributes = <<null>>
}
m RADIUS server 10.0.0.1 (10.0.0.1:1812) by socket port:43681:[0,82-83], PDU: {
code = 2 (Access-Accept)
id = 83
length = 20 octets
authenticator = 16 octets {
& nbsp; 75 e5 ab a8 8b ce 25 4a 52 27 a9 77 37 44 4e 5a u.....%JR'.w7DNZ
}
attributes = <<null>>
}
2003/06/13 11:57:52.174 4 gkauth.h(80) GkAuth RadAliasAuth ch
ck ok
2003/06/13 11:57:52.174 2 RasSrv.cxx(1144) RCF|10.0.0.51:1720|pell
ccia:h323_ID|terminal|5687_endp;
ck ok
2003/06/13 11:57:52.174 2 RasSrv.cxx(1144) RCF|10.0.0.51:1720|pell
ccia:h323_ID|terminal|5687_endp;
2003/06/13 11:57:52.174 3 RasSrv.cxx(2072) GK Send to 10.0.0.
1:3659
registrationConfirm {
requestSeqNum = 42158
protocolIdentifier = 0.0.8.2250.0.4
cal l SignalAddress = 1 entries {
[0]=ipAddress {
ip = 4 octets {
0a 00 00 33 ...3
}
port = 1721
}
}
terminalAlias = 1 entries {
[0]=h323_ID 9 characters {
0070 0065 006c 006c 0069 0063 0063 0069 pellicci
0061 & n bsp; a
}
}
gatekeeperIdentifier = 5 characters {
0054 006f 0072 0047 004b TorGK
}
endpointIdentifier = 9 characters {
0035 0036 0038 0037 005f 0065 006e 0064 5687_end
0070 p
}
cryptoTokens = 1 entries {
[0]=cryptoE P PwdHash {
alias = h323_ID 9 characters {
0070 0065 006c 006c 0069 0063 0063 0069 pellicci
0061 a
}
timeStamp = 1055498272
token = {
algorithmOID = 1.2.840.113549.2.5
paramS = {
}
hash = Hex: 12 0a 8f 38 79 17 87 10 3e ab 04 81 1f d2 89 8a
}
}
}
willRespondToIRR = FALSE
maintainConnection = FALSE
}
2003/06/13 11:57:52.184 5 RasSrv.cxx(2086) GK Sent Successful
1:3659
registrationConfirm {
requestSeqNum = 42158
protocolIdentifier = 0.0.8.2250.0.4
cal l SignalAddress = 1 entries {
[0]=ipAddress {
ip = 4 octets {
0a 00 00 33 ...3
}
port = 1721
}
}
terminalAlias = 1 entries {
[0]=h323_ID 9 characters {
0070 0065 006c 006c 0069 0063 0063 0069 pellicci
0061 & n bsp; a
}
}
gatekeeperIdentifier = 5 characters {
0054 006f 0072 0047 004b TorGK
}
endpointIdentifier = 9 characters {
0035 0036 0038 0037 005f 0065 006e 0064 5687_end
0070 p
}
cryptoTokens = 1 entries {
[0]=cryptoE P PwdHash {
alias = h323_ID 9 characters {
0070 0065 006c 006c 0069 0063 0063 0069 pellicci
0061 a
}
timeStamp = 1055498272
token = {
algorithmOID = 1.2.840.113549.2.5
paramS = {
}
hash = Hex: 12 0a 8f 38 79 17 87 10 3e ab 04 81 1f d2 89 8a
}
}
}
willRespondToIRR = FALSE
maintainConnection = FALSE
}
2003/06/13 11:57:52.184 5 RasSrv.cxx(2086) GK Sent Successful
----
Email.it, the professional e-mail, gratis per te: clicca qui
Sponsor:
Solo su Occhialeria.it una vastissima scelta a prezzi insuperabili!
Per te le migliori marche e un incredibile assortimento.
Clicca qui