Re: Trouble with SQLPasswordAuth

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Dnia nie 27. czerwca 2004 16:44, Michal Zygmuntowicz napisał:
> Your config looks fine. The problem must be elsewhere.

As I wrote before I test it in local network.
When I run Windows client, gatekeeper on Linux gets only GRQ and no RRQ.
Why???

Here is log from gatekeeper:

root@kaczorek root# gnugk -ttt -c /etc/gnugk.ini
2004/06/27 18:37:45.670 2            Toolkit.cxx(90)    
Network=192.168.0.0/255.255.255.0, IP=192.168.0.5
2004/06/27 18:37:45.671 2            Toolkit.cxx(90)    
Network=127.0.0.0/255.0.0.0, IP=127.0.0.1
2004/06/27 18:37:45.671 2            Toolkit.cxx(91)    Default IP=192.168.0.5
2004/06/27 18:37:45.671 2            Toolkit.cxx(153)   GK      H.323 Proxy 
disabled
2004/06/27 18:37:45.672 2             gkacct.cxx(924)   GKACCT  Successfully 
logged event 8
OpenH323 Gatekeeper - The GNU Gatekeeper with ID 'KaczorekGK' started on 
0.0.0.0
Gatekeeper(GNU) Version(2.0.8) 
Ext(pthreads=1,acct=1,radius=1,mysql=1,pgsql=1,ldap=0,large_fdset=0) 
Build(Jun  4 2004, 06:30:14) Sys(Linux i686 2.6.7)

2004/06/27 18:37:45.673 1                 gk.cxx(542)   OpenH323 Gatekeeper - 
The GNU Gatekeeper with ID 'KaczorekGK' started on 0.0.0.0
Gatekeeper(GNU) Version(2.0.8) 
Ext(pthreads=1,acct=1,radius=1,mysql=1,pgsql=1,ldap=0,large_fdset=0) 
Build(Jun  4 2004, 06:30:14) Sys(Linux i686 2.6.7)

Default IP = 192.168.0.5

This program is free software. You can redistribute it and/or
modify it under the terms of the GNU General Public License
as published by the Free Software Foundation, either version 2
of the License, or (at your option) any later version.

Disable Bandwidth Management
2004/06/27 18:37:45.674 2                 gk.cxx(589)   GK      TimeToLive for 
Registrations: 600
2004/06/27 18:37:45.674 1             gkauth.cxx(423)   GkAuth  Add default 
rule with flag ff
2004/06/27 18:37:45.675 1             gkauth.cxx(423)   GkAuth  Add 
SQLAliasAuth rule with flag 2
2004/06/27 18:37:45.676 3              gksql.cxx(137)   SQLAliasAuth    
Database connection pool created: gnugk@localhost[communicator]
2004/06/27 18:37:45.677 1             gkauth.cxx(423)   GkAuth  Add 
SQLPasswordAuth rule with flag 2
2004/06/27 18:37:45.677 3              gksql.cxx(137)   SQLPasswordAuth 
Database connection pool created: gnugk@localhost[communicator]
2004/06/27 18:37:45.678 2         WaitingARQ.cxx(63)    GK      Virtual Queue 
enabled for aliases CC and request timeout 10 seconds
2004/06/27 18:37:45.678 2         WaitingARQ.cxx(70)    GK      Virtual Queue 
disabled for prefixes
2004/06/27 18:37:45.679 2         WaitingARQ.cxx(80)    GK      Virtual Queue 
disabled for regular expression
2004/06/27 18:37:45.679 2             RasSrv.cxx(602)   GK      Using Direct 
Signalling
2004/06/27 18:37:45.679 2             RasSrv.cxx(603)   GK      H.245 Routed 
Disabled
2004/06/27 18:37:45.680 1             RasSrv.cxx(2359)  GK      RasThread 
15411 started
2004/06/27 18:37:45.680 1       MulticastGRQ.cxx(57)    GK      Multicast 
listener started
2004/06/27 18:37:45.680 2             RasSrv.cxx(2362)  GK      Entering 
connection handling loop
2004/06/27 18:37:54.122 2             RasSrv.cxx(2392)  GK      Read from 
10.0.0.81:4347
2004/06/27 18:37:54.123 3             RasSrv.cxx(2405)  GK
gatekeeperRequest {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    rasAddress = ipAddress {
      ip =  4 octets {
        0a 00 00 51                                        ...Q
      }
      port = 4347
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 9
          t35Extension = 0
          manufacturerCode = 61
        }
        productId =  23 octets {
          45 71 75 69 76 61 6c 65  6e 63 65 20 4f 70 65 6e   Equivalence Open
          50 68 6f 6e 65 00 00                               Phone..
        }
        versionId =  26 octets {
          31 2e 39 2e 33 20 28 4f  70 65 6e 48 33 32 33 20   1.9.3 (OpenH323
          76 31 2e 31 34 2e 31 29  00 00                     v1.14.1)..
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    endpointAlias = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    authenticationCapability = 2 entries {
      [0]=pwdHash <<null>>
      [1]=authenticationBES radius <<null>>
    }
    algorithmOIDs = 3 entries {
      [0]=0.0.8.235.0.2.6
      [1]=1.2.840.113549.2.5
      [2]=1.2.840.113548.10.1.2.1
    }
    supportsAltGK = <<null>>
  }
2004/06/27 18:37:54.128 1             RasSrv.cxx(900)   GK      GRQ Received
2004/06/27 18:37:54.128 2               gkauth.h(86)    GkAuth  default check 
failed
2004/06/27 18:37:54.129 2             RasSrv.cxx(975)   GRJ|10.0.0.81|
jacek:h323_ID|terminal|securityDenial;

2004/06/27 18:37:54.129 3             RasSrv.cxx(2332)  GK      Send to 
10.0.0.81:4347
gatekeeperReject {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    rejectReason = securityDenial <<null>>
  }
2004/06/27 18:37:54.130 2       MulticastGRQ.cxx(92)    GK      Read from 
10.0.0.81:4348
2004/06/27 18:37:54.131 2             RasSrv.cxx(2392)  GK      Read from 
192.168.0.1:4349
2004/06/27 18:37:54.132 3             RasSrv.cxx(2405)  GK
gatekeeperRequest {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 01                                        ....
      }
      port = 4349
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 9
          t35Extension = 0
          manufacturerCode = 61
        }
        productId =  23 octets {
          45 71 75 69 76 61 6c 65  6e 63 65 20 4f 70 65 6e   Equivalence Open
          50 68 6f 6e 65 00 00                               Phone..
        }
        versionId =  26 octets {
          31 2e 39 2e 33 20 28 4f  70 65 6e 48 33 32 33 20   1.9.3 (OpenH323
          76 31 2e 31 34 2e 31 29  00 00                     v1.14.1)..
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    endpointAlias = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    authenticationCapability = 2 entries {
      [0]=pwdHash <<null>>
      [1]=authenticationBES radius <<null>>
    }
    algorithmOIDs = 3 entries {
      [0]=0.0.8.235.0.2.6
      [1]=1.2.840.113549.2.5
      [2]=1.2.840.113548.10.1.2.1
    }
    supportsAltGK = <<null>>
  }
2004/06/27 18:37:54.136 1             RasSrv.cxx(900)   GK      GRQ Received
2004/06/27 18:37:54.137 2               gkauth.h(86)    GkAuth  default check 
failed
2004/06/27 18:37:54.137 2             RasSrv.cxx(975)   GRJ|192.168.0.1|
jacek:h323_ID|terminal|securityDenial;

2004/06/27 18:37:54.137 3             RasSrv.cxx(2332)  GK      Send to 
192.168.0.1:4349
gatekeeperReject {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    rejectReason = securityDenial <<null>>
  }
2004/06/27 18:37:54.139 3       MulticastGRQ.cxx(101)   GK
gatekeeperRequest {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    rasAddress = ipAddress {
      ip =  4 octets {
        0a 00 00 51                                        ...Q
      }
      port = 4348
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 9
          t35Extension = 0
          manufacturerCode = 61
        }
        productId =  23 octets {
          45 71 75 69 76 61 6c 65  6e 63 65 20 4f 70 65 6e   Equivalence Open
          50 68 6f 6e 65 00 00                               Phone..
        }
        versionId =  26 octets {
          31 2e 39 2e 33 20 28 4f  70 65 6e 48 33 32 33 20   1.9.3 (OpenH323
          76 31 2e 31 34 2e 31 29  00 00                     v1.14.1)..
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    endpointAlias = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    authenticationCapability = 2 entries {
      [0]=pwdHash <<null>>
      [1]=authenticationBES radius <<null>>
    }
    algorithmOIDs = 3 entries {
      [0]=0.0.8.235.0.2.6
      [1]=1.2.840.113549.2.5
      [2]=1.2.840.113548.10.1.2.1
    }
    supportsAltGK = <<null>>
  }
2004/06/27 18:37:54.143 1       MulticastGRQ.cxx(109)   GK      Multicast GRQ 
Received
2004/06/27 18:37:54.144 1             RasSrv.cxx(900)   GK      GRQ Received
2004/06/27 18:37:54.144 2               gkauth.h(86)    GkAuth  default check 
failed
2004/06/27 18:37:54.144 2             RasSrv.cxx(975)   GRJ|10.0.0.81|
jacek:h323_ID|terminal|securityDenial;

2004/06/27 18:37:54.145 3             RasSrv.cxx(2332)  GK      Send to 
10.0.0.81:4348
gatekeeperReject {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    rejectReason = securityDenial <<null>>
  }
2004/06/27 18:37:54.146 2       MulticastGRQ.cxx(92)    GK      Read from 
192.168.0.1:4350
2004/06/27 18:37:54.146 2             RasSrv.cxx(2392)  GK      Read from 
192.168.176.1:4351
2004/06/27 18:37:54.147 3       MulticastGRQ.cxx(101)   GK
gatekeeperRequest {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 01                                        ....
      }
      port = 4350
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 9
          t35Extension = 0
          manufacturerCode = 61
        }
        productId =  23 octets {
          45 71 75 69 76 61 6c 65  6e 63 65 20 4f 70 65 6e   Equivalence Open
          50 68 6f 6e 65 00 00                               Phone..
        }
        versionId =  26 octets {
          31 2e 39 2e 33 20 28 4f  70 65 6e 48 33 32 33 20   1.9.3 (OpenH323
          76 31 2e 31 34 2e 31 29  00 00                     v1.14.1)..
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    endpointAlias = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    authenticationCapability = 2 entries {
      [0]=pwdHash <<null>>
      [1]=authenticationBES radius <<null>>
    }
    algorithmOIDs = 3 entries {
      [0]=0.0.8.235.0.2.6
      [1]=1.2.840.113549.2.5
      [2]=1.2.840.113548.10.1.2.1
    }
    supportsAltGK = <<null>>
  }
2004/06/27 18:37:54.152 1       MulticastGRQ.cxx(109)   GK      Multicast GRQ 
Received
2004/06/27 18:37:54.152 1             RasSrv.cxx(900)   GK      GRQ Received
2004/06/27 18:37:54.152 2               gkauth.h(86)    GkAuth  default check 
failed
2004/06/27 18:37:54.153 2             RasSrv.cxx(975)   GRJ|192.168.0.1|
jacek:h323_ID|terminal|securityDenial;

2004/06/27 18:37:54.153 3             RasSrv.cxx(2332)  GK      Send to 
192.168.0.1:4350
gatekeeperReject {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    rejectReason = securityDenial <<null>>
  }
2004/06/27 18:37:54.154 2       MulticastGRQ.cxx(92)    GK      Read from 
192.168.176.1:4352
2004/06/27 18:37:54.155 3             RasSrv.cxx(2405)  GK
gatekeeperRequest {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 b0 01                                        ....
      }
      port = 4351
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 9
          t35Extension = 0
          manufacturerCode = 61
        }
        productId =  23 octets {
          45 71 75 69 76 61 6c 65  6e 63 65 20 4f 70 65 6e   Equivalence Open
          50 68 6f 6e 65 00 00                               Phone..
        }
        versionId =  26 octets {
          31 2e 39 2e 33 20 28 4f  70 65 6e 48 33 32 33 20   1.9.3 (OpenH323
          76 31 2e 31 34 2e 31 29  00 00                     v1.14.1)..
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    endpointAlias = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    authenticationCapability = 2 entries {
      [0]=pwdHash <<null>>
      [1]=authenticationBES radius <<null>>
    }
    algorithmOIDs = 3 entries {
      [0]=0.0.8.235.0.2.6
      [1]=1.2.840.113549.2.5
      [2]=1.2.840.113548.10.1.2.1
    }
    supportsAltGK = <<null>>
  }
2004/06/27 18:37:54.159 1             RasSrv.cxx(900)   GK      GRQ Received
2004/06/27 18:37:54.159 2               gkauth.h(86)    GkAuth  default check 
failed
2004/06/27 18:37:54.160 2             RasSrv.cxx(975)   GRJ|192.168.176.1|
jacek:h323_ID|terminal|securityDenial;

2004/06/27 18:37:54.160 3             RasSrv.cxx(2332)  GK      Send to 
192.168.176.1:4351
gatekeeperReject {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    rejectReason = securityDenial <<null>>
  }
2004/06/27 18:37:54.161 3       MulticastGRQ.cxx(101)   GK
gatekeeperRequest {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 b0 01                                        ....
      }
      port = 4352
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 9
          t35Extension = 0
          manufacturerCode = 61
        }
        productId =  23 octets {
          45 71 75 69 76 61 6c 65  6e 63 65 20 4f 70 65 6e   Equivalence Open
          50 68 6f 6e 65 00 00                               Phone..
        }
        versionId =  26 octets {
          31 2e 39 2e 33 20 28 4f  70 65 6e 48 33 32 33 20   1.9.3 (OpenH323
          76 31 2e 31 34 2e 31 29  00 00                     v1.14.1)..
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    endpointAlias = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    authenticationCapability = 2 entries {
      [0]=pwdHash <<null>>
      [1]=authenticationBES radius <<null>>
    }
    algorithmOIDs = 3 entries {
      [0]=0.0.8.235.0.2.6
      [1]=1.2.840.113549.2.5
      [2]=1.2.840.113548.10.1.2.1
    }
    supportsAltGK = <<null>>
  }
2004/06/27 18:37:54.166 1       MulticastGRQ.cxx(109)   GK      Multicast GRQ 
Received
2004/06/27 18:37:54.166 1             RasSrv.cxx(900)   GK      GRQ Received
2004/06/27 18:37:54.166 2               gkauth.h(86)    GkAuth  default check 
failed
2004/06/27 18:37:54.166 2             RasSrv.cxx(975)   GRJ|192.168.176.1|
jacek:h323_ID|terminal|securityDenial;

2004/06/27 18:37:54.167 3             RasSrv.cxx(2332)  GK      Send to 
192.168.176.1:4352
gatekeeperReject {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    rejectReason = securityDenial <<null>>
  }
2004/06/27 18:37:54.168 2       MulticastGRQ.cxx(92)    GK      Read from 
192.168.187.1:4354
2004/06/27 18:37:54.169 3       MulticastGRQ.cxx(101)   GK
gatekeeperRequest {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 bb 01                                        ....
      }
      port = 4354
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 9
          t35Extension = 0
          manufacturerCode = 61
        }
        productId =  23 octets {
          45 71 75 69 76 61 6c 65  6e 63 65 20 4f 70 65 6e   Equivalence Open
          50 68 6f 6e 65 00 00                               Phone..
        }
        versionId =  26 octets {
          31 2e 39 2e 33 20 28 4f  70 65 6e 48 33 32 33 20   1.9.3 (OpenH323
          76 31 2e 31 34 2e 31 29  00 00                     v1.14.1)..
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    endpointAlias = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    authenticationCapability = 2 entries {
      [0]=pwdHash <<null>>
      [1]=authenticationBES radius <<null>>
    }
    algorithmOIDs = 3 entries {
      [0]=0.0.8.235.0.2.6
      [1]=1.2.840.113549.2.5
      [2]=1.2.840.113548.10.1.2.1
    }
    supportsAltGK = <<null>>
  }
2004/06/27 18:37:54.174 1       MulticastGRQ.cxx(109)   GK      Multicast GRQ 
Received
2004/06/27 18:37:54.174 1             RasSrv.cxx(900)   GK      GRQ Received
2004/06/27 18:37:54.174 2               gkauth.h(86)    GkAuth  default check 
failed
2004/06/27 18:37:54.175 2             RasSrv.cxx(975)   GRJ|192.168.187.1|
jacek:h323_ID|terminal|securityDenial;

2004/06/27 18:37:54.175 3             RasSrv.cxx(2332)  GK      Send to 
192.168.187.1:4354
gatekeeperReject {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    rejectReason = securityDenial <<null>>
  }
2004/06/27 18:37:54.176 2             RasSrv.cxx(2392)  GK      Read from 
192.168.187.1:4353
2004/06/27 18:37:54.177 3             RasSrv.cxx(2405)  GK
gatekeeperRequest {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 bb 01                                        ....
      }
      port = 4353
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 9
          t35Extension = 0
          manufacturerCode = 61
        }
        productId =  23 octets {
          45 71 75 69 76 61 6c 65  6e 63 65 20 4f 70 65 6e   Equivalence Open
          50 68 6f 6e 65 00 00                               Phone..
        }
        versionId =  26 octets {
          31 2e 39 2e 33 20 28 4f  70 65 6e 48 33 32 33 20   1.9.3 (OpenH323
          76 31 2e 31 34 2e 31 29  00 00                     v1.14.1)..
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    endpointAlias = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    authenticationCapability = 2 entries {
      [0]=pwdHash <<null>>
      [1]=authenticationBES radius <<null>>
    }
    algorithmOIDs = 3 entries {
      [0]=0.0.8.235.0.2.6
      [1]=1.2.840.113549.2.5
      [2]=1.2.840.113548.10.1.2.1
    }
    supportsAltGK = <<null>>
  }
2004/06/27 18:37:54.182 1             RasSrv.cxx(900)   GK      GRQ Received
2004/06/27 18:37:54.182 2               gkauth.h(86)    GkAuth  default check 
failed
2004/06/27 18:37:54.182 2             RasSrv.cxx(975)   GRJ|192.168.187.1|
jacek:h323_ID|terminal|securityDenial;

2004/06/27 18:37:54.183 3             RasSrv.cxx(2332)  GK      Send to 
192.168.187.1:4353
gatekeeperReject {
    requestSeqNum = 45351
    protocolIdentifier = 0.0.8.2250.0.4
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    rejectReason = securityDenial <<null>>
  }


-------------------------------------------------------
This SF.Net email sponsored by Black Hat Briefings & Training.
Attend Black Hat Briefings & Training, Las Vegas July 24-29 - 
digital self defense, top technical experts, no vendor pitches, 
unmatched networking opportunities. Visit www.blackhat.com

_______________________________________________________

List: Openh323gk-users@xxxxxxxxxxxxxxxxxxxxx
Archive: http://sourceforge.net/mailarchive/forum.php?forum_id?49
Homepage: http://www.gnugk.org/


[Index of Archives]     [SIP]     [Open H.323]     [Gnu Gatekeeper]     [Asterisk PBX]     [ISDN Cause Codes]     [Yosemite News]

  Powered by Linux