Dnia nie 27. czerwca 2004 16:44, Michal Zygmuntowicz napisał: > Your config looks fine. The problem must be elsewhere. As I wrote before I test it in local network. When I run Windows client, gatekeeper on Linux gets only GRQ and no RRQ. Why??? Here is log from gatekeeper: root@kaczorek root# gnugk -ttt -c /etc/gnugk.ini 2004/06/27 18:37:45.670 2 Toolkit.cxx(90) Network=192.168.0.0/255.255.255.0, IP=192.168.0.5 2004/06/27 18:37:45.671 2 Toolkit.cxx(90) Network=127.0.0.0/255.0.0.0, IP=127.0.0.1 2004/06/27 18:37:45.671 2 Toolkit.cxx(91) Default IP=192.168.0.5 2004/06/27 18:37:45.671 2 Toolkit.cxx(153) GK H.323 Proxy disabled 2004/06/27 18:37:45.672 2 gkacct.cxx(924) GKACCT Successfully logged event 8 OpenH323 Gatekeeper - The GNU Gatekeeper with ID 'KaczorekGK' started on 0.0.0.0 Gatekeeper(GNU) Version(2.0.8) Ext(pthreads=1,acct=1,radius=1,mysql=1,pgsql=1,ldap=0,large_fdset=0) Build(Jun 4 2004, 06:30:14) Sys(Linux i686 2.6.7) 2004/06/27 18:37:45.673 1 gk.cxx(542) OpenH323 Gatekeeper - The GNU Gatekeeper with ID 'KaczorekGK' started on 0.0.0.0 Gatekeeper(GNU) Version(2.0.8) Ext(pthreads=1,acct=1,radius=1,mysql=1,pgsql=1,ldap=0,large_fdset=0) Build(Jun 4 2004, 06:30:14) Sys(Linux i686 2.6.7) Default IP = 192.168.0.5 This program is free software. You can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 2 of the License, or (at your option) any later version. Disable Bandwidth Management 2004/06/27 18:37:45.674 2 gk.cxx(589) GK TimeToLive for Registrations: 600 2004/06/27 18:37:45.674 1 gkauth.cxx(423) GkAuth Add default rule with flag ff 2004/06/27 18:37:45.675 1 gkauth.cxx(423) GkAuth Add SQLAliasAuth rule with flag 2 2004/06/27 18:37:45.676 3 gksql.cxx(137) SQLAliasAuth Database connection pool created: gnugk@localhost[communicator] 2004/06/27 18:37:45.677 1 gkauth.cxx(423) GkAuth Add SQLPasswordAuth rule with flag 2 2004/06/27 18:37:45.677 3 gksql.cxx(137) SQLPasswordAuth Database connection pool created: gnugk@localhost[communicator] 2004/06/27 18:37:45.678 2 WaitingARQ.cxx(63) GK Virtual Queue enabled for aliases CC and request timeout 10 seconds 2004/06/27 18:37:45.678 2 WaitingARQ.cxx(70) GK Virtual Queue disabled for prefixes 2004/06/27 18:37:45.679 2 WaitingARQ.cxx(80) GK Virtual Queue disabled for regular expression 2004/06/27 18:37:45.679 2 RasSrv.cxx(602) GK Using Direct Signalling 2004/06/27 18:37:45.679 2 RasSrv.cxx(603) GK H.245 Routed Disabled 2004/06/27 18:37:45.680 1 RasSrv.cxx(2359) GK RasThread 15411 started 2004/06/27 18:37:45.680 1 MulticastGRQ.cxx(57) GK Multicast listener started 2004/06/27 18:37:45.680 2 RasSrv.cxx(2362) GK Entering connection handling loop 2004/06/27 18:37:54.122 2 RasSrv.cxx(2392) GK Read from 10.0.0.81:4347 2004/06/27 18:37:54.123 3 RasSrv.cxx(2405) GK gatekeeperRequest { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 rasAddress = ipAddress { ip = 4 octets { 0a 00 00 51 ...Q } port = 4347 } endpointType = { vendor = { vendor = { t35CountryCode = 9 t35Extension = 0 manufacturerCode = 61 } productId = 23 octets { 45 71 75 69 76 61 6c 65 6e 63 65 20 4f 70 65 6e Equivalence Open 50 68 6f 6e 65 00 00 Phone.. } versionId = 26 octets { 31 2e 39 2e 33 20 28 4f 70 65 6e 48 33 32 33 20 1.9.3 (OpenH323 76 31 2e 31 34 2e 31 29 00 00 v1.14.1).. } } terminal = { } mc = FALSE undefinedNode = FALSE } endpointAlias = 1 entries { [0]=h323_ID 5 characters { 006a 0061 0063 0065 006b jacek } } authenticationCapability = 2 entries { [0]=pwdHash <<null>> [1]=authenticationBES radius <<null>> } algorithmOIDs = 3 entries { [0]=0.0.8.235.0.2.6 [1]=1.2.840.113549.2.5 [2]=1.2.840.113548.10.1.2.1 } supportsAltGK = <<null>> } 2004/06/27 18:37:54.128 1 RasSrv.cxx(900) GK GRQ Received 2004/06/27 18:37:54.128 2 gkauth.h(86) GkAuth default check failed 2004/06/27 18:37:54.129 2 RasSrv.cxx(975) GRJ|10.0.0.81| jacek:h323_ID|terminal|securityDenial; 2004/06/27 18:37:54.129 3 RasSrv.cxx(2332) GK Send to 10.0.0.81:4347 gatekeeperReject { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 gatekeeperIdentifier = 10 characters { 004b 0061 0063 007a 006f 0072 0065 006b Kaczorek 0047 004b GK } rejectReason = securityDenial <<null>> } 2004/06/27 18:37:54.130 2 MulticastGRQ.cxx(92) GK Read from 10.0.0.81:4348 2004/06/27 18:37:54.131 2 RasSrv.cxx(2392) GK Read from 192.168.0.1:4349 2004/06/27 18:37:54.132 3 RasSrv.cxx(2405) GK gatekeeperRequest { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 rasAddress = ipAddress { ip = 4 octets { c0 a8 00 01 .... } port = 4349 } endpointType = { vendor = { vendor = { t35CountryCode = 9 t35Extension = 0 manufacturerCode = 61 } productId = 23 octets { 45 71 75 69 76 61 6c 65 6e 63 65 20 4f 70 65 6e Equivalence Open 50 68 6f 6e 65 00 00 Phone.. } versionId = 26 octets { 31 2e 39 2e 33 20 28 4f 70 65 6e 48 33 32 33 20 1.9.3 (OpenH323 76 31 2e 31 34 2e 31 29 00 00 v1.14.1).. } } terminal = { } mc = FALSE undefinedNode = FALSE } endpointAlias = 1 entries { [0]=h323_ID 5 characters { 006a 0061 0063 0065 006b jacek } } authenticationCapability = 2 entries { [0]=pwdHash <<null>> [1]=authenticationBES radius <<null>> } algorithmOIDs = 3 entries { [0]=0.0.8.235.0.2.6 [1]=1.2.840.113549.2.5 [2]=1.2.840.113548.10.1.2.1 } supportsAltGK = <<null>> } 2004/06/27 18:37:54.136 1 RasSrv.cxx(900) GK GRQ Received 2004/06/27 18:37:54.137 2 gkauth.h(86) GkAuth default check failed 2004/06/27 18:37:54.137 2 RasSrv.cxx(975) GRJ|192.168.0.1| jacek:h323_ID|terminal|securityDenial; 2004/06/27 18:37:54.137 3 RasSrv.cxx(2332) GK Send to 192.168.0.1:4349 gatekeeperReject { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 gatekeeperIdentifier = 10 characters { 004b 0061 0063 007a 006f 0072 0065 006b Kaczorek 0047 004b GK } rejectReason = securityDenial <<null>> } 2004/06/27 18:37:54.139 3 MulticastGRQ.cxx(101) GK gatekeeperRequest { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 rasAddress = ipAddress { ip = 4 octets { 0a 00 00 51 ...Q } port = 4348 } endpointType = { vendor = { vendor = { t35CountryCode = 9 t35Extension = 0 manufacturerCode = 61 } productId = 23 octets { 45 71 75 69 76 61 6c 65 6e 63 65 20 4f 70 65 6e Equivalence Open 50 68 6f 6e 65 00 00 Phone.. } versionId = 26 octets { 31 2e 39 2e 33 20 28 4f 70 65 6e 48 33 32 33 20 1.9.3 (OpenH323 76 31 2e 31 34 2e 31 29 00 00 v1.14.1).. } } terminal = { } mc = FALSE undefinedNode = FALSE } endpointAlias = 1 entries { [0]=h323_ID 5 characters { 006a 0061 0063 0065 006b jacek } } authenticationCapability = 2 entries { [0]=pwdHash <<null>> [1]=authenticationBES radius <<null>> } algorithmOIDs = 3 entries { [0]=0.0.8.235.0.2.6 [1]=1.2.840.113549.2.5 [2]=1.2.840.113548.10.1.2.1 } supportsAltGK = <<null>> } 2004/06/27 18:37:54.143 1 MulticastGRQ.cxx(109) GK Multicast GRQ Received 2004/06/27 18:37:54.144 1 RasSrv.cxx(900) GK GRQ Received 2004/06/27 18:37:54.144 2 gkauth.h(86) GkAuth default check failed 2004/06/27 18:37:54.144 2 RasSrv.cxx(975) GRJ|10.0.0.81| jacek:h323_ID|terminal|securityDenial; 2004/06/27 18:37:54.145 3 RasSrv.cxx(2332) GK Send to 10.0.0.81:4348 gatekeeperReject { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 gatekeeperIdentifier = 10 characters { 004b 0061 0063 007a 006f 0072 0065 006b Kaczorek 0047 004b GK } rejectReason = securityDenial <<null>> } 2004/06/27 18:37:54.146 2 MulticastGRQ.cxx(92) GK Read from 192.168.0.1:4350 2004/06/27 18:37:54.146 2 RasSrv.cxx(2392) GK Read from 192.168.176.1:4351 2004/06/27 18:37:54.147 3 MulticastGRQ.cxx(101) GK gatekeeperRequest { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 rasAddress = ipAddress { ip = 4 octets { c0 a8 00 01 .... } port = 4350 } endpointType = { vendor = { vendor = { t35CountryCode = 9 t35Extension = 0 manufacturerCode = 61 } productId = 23 octets { 45 71 75 69 76 61 6c 65 6e 63 65 20 4f 70 65 6e Equivalence Open 50 68 6f 6e 65 00 00 Phone.. } versionId = 26 octets { 31 2e 39 2e 33 20 28 4f 70 65 6e 48 33 32 33 20 1.9.3 (OpenH323 76 31 2e 31 34 2e 31 29 00 00 v1.14.1).. } } terminal = { } mc = FALSE undefinedNode = FALSE } endpointAlias = 1 entries { [0]=h323_ID 5 characters { 006a 0061 0063 0065 006b jacek } } authenticationCapability = 2 entries { [0]=pwdHash <<null>> [1]=authenticationBES radius <<null>> } algorithmOIDs = 3 entries { [0]=0.0.8.235.0.2.6 [1]=1.2.840.113549.2.5 [2]=1.2.840.113548.10.1.2.1 } supportsAltGK = <<null>> } 2004/06/27 18:37:54.152 1 MulticastGRQ.cxx(109) GK Multicast GRQ Received 2004/06/27 18:37:54.152 1 RasSrv.cxx(900) GK GRQ Received 2004/06/27 18:37:54.152 2 gkauth.h(86) GkAuth default check failed 2004/06/27 18:37:54.153 2 RasSrv.cxx(975) GRJ|192.168.0.1| jacek:h323_ID|terminal|securityDenial; 2004/06/27 18:37:54.153 3 RasSrv.cxx(2332) GK Send to 192.168.0.1:4350 gatekeeperReject { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 gatekeeperIdentifier = 10 characters { 004b 0061 0063 007a 006f 0072 0065 006b Kaczorek 0047 004b GK } rejectReason = securityDenial <<null>> } 2004/06/27 18:37:54.154 2 MulticastGRQ.cxx(92) GK Read from 192.168.176.1:4352 2004/06/27 18:37:54.155 3 RasSrv.cxx(2405) GK gatekeeperRequest { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 rasAddress = ipAddress { ip = 4 octets { c0 a8 b0 01 .... } port = 4351 } endpointType = { vendor = { vendor = { t35CountryCode = 9 t35Extension = 0 manufacturerCode = 61 } productId = 23 octets { 45 71 75 69 76 61 6c 65 6e 63 65 20 4f 70 65 6e Equivalence Open 50 68 6f 6e 65 00 00 Phone.. } versionId = 26 octets { 31 2e 39 2e 33 20 28 4f 70 65 6e 48 33 32 33 20 1.9.3 (OpenH323 76 31 2e 31 34 2e 31 29 00 00 v1.14.1).. } } terminal = { } mc = FALSE undefinedNode = FALSE } endpointAlias = 1 entries { [0]=h323_ID 5 characters { 006a 0061 0063 0065 006b jacek } } authenticationCapability = 2 entries { [0]=pwdHash <<null>> [1]=authenticationBES radius <<null>> } algorithmOIDs = 3 entries { [0]=0.0.8.235.0.2.6 [1]=1.2.840.113549.2.5 [2]=1.2.840.113548.10.1.2.1 } supportsAltGK = <<null>> } 2004/06/27 18:37:54.159 1 RasSrv.cxx(900) GK GRQ Received 2004/06/27 18:37:54.159 2 gkauth.h(86) GkAuth default check failed 2004/06/27 18:37:54.160 2 RasSrv.cxx(975) GRJ|192.168.176.1| jacek:h323_ID|terminal|securityDenial; 2004/06/27 18:37:54.160 3 RasSrv.cxx(2332) GK Send to 192.168.176.1:4351 gatekeeperReject { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 gatekeeperIdentifier = 10 characters { 004b 0061 0063 007a 006f 0072 0065 006b Kaczorek 0047 004b GK } rejectReason = securityDenial <<null>> } 2004/06/27 18:37:54.161 3 MulticastGRQ.cxx(101) GK gatekeeperRequest { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 rasAddress = ipAddress { ip = 4 octets { c0 a8 b0 01 .... } port = 4352 } endpointType = { vendor = { vendor = { t35CountryCode = 9 t35Extension = 0 manufacturerCode = 61 } productId = 23 octets { 45 71 75 69 76 61 6c 65 6e 63 65 20 4f 70 65 6e Equivalence Open 50 68 6f 6e 65 00 00 Phone.. } versionId = 26 octets { 31 2e 39 2e 33 20 28 4f 70 65 6e 48 33 32 33 20 1.9.3 (OpenH323 76 31 2e 31 34 2e 31 29 00 00 v1.14.1).. } } terminal = { } mc = FALSE undefinedNode = FALSE } endpointAlias = 1 entries { [0]=h323_ID 5 characters { 006a 0061 0063 0065 006b jacek } } authenticationCapability = 2 entries { [0]=pwdHash <<null>> [1]=authenticationBES radius <<null>> } algorithmOIDs = 3 entries { [0]=0.0.8.235.0.2.6 [1]=1.2.840.113549.2.5 [2]=1.2.840.113548.10.1.2.1 } supportsAltGK = <<null>> } 2004/06/27 18:37:54.166 1 MulticastGRQ.cxx(109) GK Multicast GRQ Received 2004/06/27 18:37:54.166 1 RasSrv.cxx(900) GK GRQ Received 2004/06/27 18:37:54.166 2 gkauth.h(86) GkAuth default check failed 2004/06/27 18:37:54.166 2 RasSrv.cxx(975) GRJ|192.168.176.1| jacek:h323_ID|terminal|securityDenial; 2004/06/27 18:37:54.167 3 RasSrv.cxx(2332) GK Send to 192.168.176.1:4352 gatekeeperReject { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 gatekeeperIdentifier = 10 characters { 004b 0061 0063 007a 006f 0072 0065 006b Kaczorek 0047 004b GK } rejectReason = securityDenial <<null>> } 2004/06/27 18:37:54.168 2 MulticastGRQ.cxx(92) GK Read from 192.168.187.1:4354 2004/06/27 18:37:54.169 3 MulticastGRQ.cxx(101) GK gatekeeperRequest { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 rasAddress = ipAddress { ip = 4 octets { c0 a8 bb 01 .... } port = 4354 } endpointType = { vendor = { vendor = { t35CountryCode = 9 t35Extension = 0 manufacturerCode = 61 } productId = 23 octets { 45 71 75 69 76 61 6c 65 6e 63 65 20 4f 70 65 6e Equivalence Open 50 68 6f 6e 65 00 00 Phone.. } versionId = 26 octets { 31 2e 39 2e 33 20 28 4f 70 65 6e 48 33 32 33 20 1.9.3 (OpenH323 76 31 2e 31 34 2e 31 29 00 00 v1.14.1).. } } terminal = { } mc = FALSE undefinedNode = FALSE } endpointAlias = 1 entries { [0]=h323_ID 5 characters { 006a 0061 0063 0065 006b jacek } } authenticationCapability = 2 entries { [0]=pwdHash <<null>> [1]=authenticationBES radius <<null>> } algorithmOIDs = 3 entries { [0]=0.0.8.235.0.2.6 [1]=1.2.840.113549.2.5 [2]=1.2.840.113548.10.1.2.1 } supportsAltGK = <<null>> } 2004/06/27 18:37:54.174 1 MulticastGRQ.cxx(109) GK Multicast GRQ Received 2004/06/27 18:37:54.174 1 RasSrv.cxx(900) GK GRQ Received 2004/06/27 18:37:54.174 2 gkauth.h(86) GkAuth default check failed 2004/06/27 18:37:54.175 2 RasSrv.cxx(975) GRJ|192.168.187.1| jacek:h323_ID|terminal|securityDenial; 2004/06/27 18:37:54.175 3 RasSrv.cxx(2332) GK Send to 192.168.187.1:4354 gatekeeperReject { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 gatekeeperIdentifier = 10 characters { 004b 0061 0063 007a 006f 0072 0065 006b Kaczorek 0047 004b GK } rejectReason = securityDenial <<null>> } 2004/06/27 18:37:54.176 2 RasSrv.cxx(2392) GK Read from 192.168.187.1:4353 2004/06/27 18:37:54.177 3 RasSrv.cxx(2405) GK gatekeeperRequest { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 rasAddress = ipAddress { ip = 4 octets { c0 a8 bb 01 .... } port = 4353 } endpointType = { vendor = { vendor = { t35CountryCode = 9 t35Extension = 0 manufacturerCode = 61 } productId = 23 octets { 45 71 75 69 76 61 6c 65 6e 63 65 20 4f 70 65 6e Equivalence Open 50 68 6f 6e 65 00 00 Phone.. } versionId = 26 octets { 31 2e 39 2e 33 20 28 4f 70 65 6e 48 33 32 33 20 1.9.3 (OpenH323 76 31 2e 31 34 2e 31 29 00 00 v1.14.1).. } } terminal = { } mc = FALSE undefinedNode = FALSE } endpointAlias = 1 entries { [0]=h323_ID 5 characters { 006a 0061 0063 0065 006b jacek } } authenticationCapability = 2 entries { [0]=pwdHash <<null>> [1]=authenticationBES radius <<null>> } algorithmOIDs = 3 entries { [0]=0.0.8.235.0.2.6 [1]=1.2.840.113549.2.5 [2]=1.2.840.113548.10.1.2.1 } supportsAltGK = <<null>> } 2004/06/27 18:37:54.182 1 RasSrv.cxx(900) GK GRQ Received 2004/06/27 18:37:54.182 2 gkauth.h(86) GkAuth default check failed 2004/06/27 18:37:54.182 2 RasSrv.cxx(975) GRJ|192.168.187.1| jacek:h323_ID|terminal|securityDenial; 2004/06/27 18:37:54.183 3 RasSrv.cxx(2332) GK Send to 192.168.187.1:4353 gatekeeperReject { requestSeqNum = 45351 protocolIdentifier = 0.0.8.2250.0.4 gatekeeperIdentifier = 10 characters { 004b 0061 0063 007a 006f 0072 0065 006b Kaczorek 0047 004b GK } rejectReason = securityDenial <<null>> } ------------------------------------------------------- This SF.Net email sponsored by Black Hat Briefings & Training. Attend Black Hat Briefings & Training, Las Vegas July 24-29 - digital self defense, top technical experts, no vendor pitches, unmatched networking opportunities. Visit www.blackhat.com _______________________________________________________ List: Openh323gk-users@xxxxxxxxxxxxxxxxxxxxx Archive: http://sourceforge.net/mailarchive/forum.php?forum_id?49 Homepage: http://www.gnugk.org/