you might want to turn the logging on gnugk up to 5 or 6 to see, in the
gnugk logs, why it's (gnugk) denying access.
the way to do that is to telnet to port 7000 and issue debug trc 5
Nyamul Hassaan wrote:
Hi
Thank you guys for your ideas. However, I'm still faced with registration
problems. I see 2 GCF messages first, then I see RRJ again. I've pasted
the debug output (-ttttt 5 levels) below.
I'm using the following Cisco ATA Settings:
UseLoginID => 1
LoginID0 => abcduser
PWD0 => abcdpass
GKID => *
GkOrProxy => 11.22.33.44
ConnectMode => 0x00060402
GnuGK is configured for SimplePasswordAuth and this login works from my
softphone.
What else could I be doing wrong?
Regards
HASSAAN
=================== Status Window ====================
GCF|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|unknown;
GCF|aa.bb.cc.dd|0:h323_ID=1231:dialedDigits|unknown;
RRJ|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|terminal|securityDenial;
RRJ|aa.bb.cc.dd|0:h323_ID=1231:dialedDigits|terminal|securityDenial;
RRJ|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|terminal|securityDenial;
RRJ|aa.bb.cc.dd|0:h323_ID=1231:dialedDigits|terminal|securityDenial;
RRJ|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|terminal|securityDenial;
RRJ|aa.bb.cc.dd|0:h323_ID=1231:dialedDigits|terminal|securityDenial;
RRJ|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|terminal|securityDenial;
=================== Debug Info ====================
2005/10/02 04:30:15.204 2 RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30315
2005/10/02 04:30:15.204 3 RasSrv.cxx(219) RAS
gatekeeperRequest {
requestSeqNum = 1816
protocolIdentifier = 0.0.8.2250.0.2
rasAddress = ipAddress {
ip = 4 octets {
c0 a8 00 02 ....
}
port = 1719
}
endpointType = {
vendor = {
vendor = {
t35CountryCode = 181
t35Extension = 0
manufacturerCode = 18
}
productId = 13 octets {
43 69 73 63 6f 20 41 54 41 20 31 38 36 Cisco ATA 186
}
versionId = 25 octets {
76 3a 30 78 30 34 30 30 30 33 30 31 20 66 3a 20 v:0x04000301 f:
62 3a 30 34 30 32 31 39 41 b:040219A
}
}
mc = FALSE
undefinedNode = FALSE
}
gatekeeperIdentifier = 10 characters {
0067 0061 0074 0065 006b 0065 0065 0070 gatekeep
0065 0072 er
}
endpointAlias = 2 entries {
[0]=h323_ID 6 characters {
006d 006d 006b 0074 0030 0032 abcduser
}
[1]=h323_ID 6 characters {
006d 006d 006b 0074 0030 0032 abcduser
}
}
}
2005/10/02 04:30:15.204 1 RasSrv.cxx(343) RAS GRQ Received
2005/10/02 04:30:15.204 2 RasSrv.cxx(1303) RAS GRQ is not meant for
this gatekeeper
2005/10/02 04:30:15.735 2 RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30317
2005/10/02 04:30:15.735 3 RasSrv.cxx(219) RAS
gatekeeperRequest {
requestSeqNum = 840
protocolIdentifier = 0.0.8.2250.0.2
rasAddress = ipAddress {
ip = 4 octets {
c0 a8 00 02 ....
}
port = 1739
}
endpointType = {
vendor = {
vendor = {
t35CountryCode = 181
t35Extension = 0
manufacturerCode = 18
}
productId = 13 octets {
43 69 73 63 6f 20 41 54 41 20 31 38 36 Cisco ATA 186
}
versionId = 25 octets {
76 3a 30 78 30 34 30 30 30 33 30 31 20 66 3a 20 v:0x04000301 f:
62 3a 30 34 30 32 31 39 41 b:040219A
}
}
mc = FALSE
undefinedNode = FALSE
}
gatekeeperIdentifier = 10 characters {
0067 0061 0074 0065 006b 0065 0065 0070 gatekeep
0065 0072 er
}
endpointAlias = 2 entries {
[0]=h323_ID 1 characters {
0030 0
}
[1]=dialedDigits "1231"
}
}
2005/10/02 04:30:15.745 1 RasSrv.cxx(343) RAS GRQ Received
2005/10/02 04:30:15.745 2 RasSrv.cxx(1303) RAS GRQ is not meant for
this gatekeeper
2005/10/02 04:30:20.211 2 RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30315
2005/10/02 04:30:20.211 3 RasSrv.cxx(219) RAS
gatekeeperRequest {
requestSeqNum = 1816
protocolIdentifier = 0.0.8.2250.0.2
rasAddress = ipAddress {
ip = 4 octets {
c0 a8 00 02 ....
}
port = 1719
}
endpointType = {
vendor = {
vendor = {
t35CountryCode = 181
t35Extension = 0
manufacturerCode = 18
}
productId = 13 octets {
43 69 73 63 6f 20 41 54 41 20 31 38 36 Cisco ATA 186
}
versionId = 25 octets {
76 3a 30 78 30 34 30 30 30 33 30 31 20 66 3a 20 v:0x04000301 f:
62 3a 30 34 30 32 31 39 41 b:040219A
}
}
mc = FALSE
undefinedNode = FALSE
}
gatekeeperIdentifier = 10 characters {
0067 0061 0074 0065 006b 0065 0065 0070 gatekeep
0065 0072 er
}
endpointAlias = 2 entries {
[0]=h323_ID 6 characters {
006d 006d 006b 0074 0030 0032 abcduser
}
[1]=h323_ID 6 characters {
006d 006d 006b 0074 0030 0032 abcduser
}
}
}
2005/10/02 04:30:20.211 1 RasSrv.cxx(343) RAS GRQ Received
2005/10/02 04:30:20.211 2 RasSrv.cxx(1303) RAS GRQ is not meant for
this gatekeeper
2005/10/02 04:30:20.732 2 RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30317
2005/10/02 04:30:20.732 3 RasSrv.cxx(219) RAS
gatekeeperRequest {
requestSeqNum = 840
protocolIdentifier = 0.0.8.2250.0.2
rasAddress = ipAddress {
ip = 4 octets {
c0 a8 00 02 ....
}
port = 1739
}
endpointType = {
vendor = {
vendor = {
t35CountryCode = 181
t35Extension = 0
manufacturerCode = 18
}
productId = 13 octets {
43 69 73 63 6f 20 41 54 41 20 31 38 36 Cisco ATA 186
}
versionId = 25 octets {
76 3a 30 78 30 34 30 30 30 33 30 31 20 66 3a 20 v:0x04000301 f:
62 3a 30 34 30 32 31 39 41 b:040219A
}
}
mc = FALSE
undefinedNode = FALSE
}
gatekeeperIdentifier = 10 characters {
0067 0061 0074 0065 006b 0065 0065 0070 gatekeep
0065 0072 er
}
endpointAlias = 2 entries {
[0]=h323_ID 1 characters {
0030 0
}
[1]=dialedDigits "1231"
}
}
2005/10/02 04:30:20.732 1 RasSrv.cxx(343) RAS GRQ Received
2005/10/02 04:30:20.732 2 RasSrv.cxx(1303) RAS GRQ is not meant for
this gatekeeper
2005/10/02 04:30:25.198 2 RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30315
2005/10/02 04:30:25.198 3 RasSrv.cxx(219) RAS
gatekeeperRequest {
requestSeqNum = 1817
protocolIdentifier = 0.0.8.2250.0.2
rasAddress = ipAddress {
ip = 4 octets {
c0 a8 00 02 ....
}
port = 1719
}
endpointType = {
vendor = {
vendor = {
t35CountryCode = 181
t35Extension = 0
manufacturerCode = 18
}
productId = 13 octets {
43 69 73 63 6f 20 41 54 41 20 31 38 36 Cisco ATA 186
}
versionId = 25 octets {
76 3a 30 78 30 34 30 30 30 33 30 31 20 66 3a 20 v:0x04000301 f:
62 3a 30 34 30 32 31 39 41 b:040219A
}
}
mc = FALSE
undefinedNode = FALSE
}
endpointAlias = 2 entries {
[0]=h323_ID 6 characters {
006d 006d 006b 0074 0030 0032 abcduser
}
[1]=h323_ID 6 characters {
006d 006d 006b 0074 0030 0032 abcduser
}
}
}
2005/10/02 04:30:25.198 1 RasSrv.cxx(343) RAS GRQ Received
2005/10/02 04:30:25.198 3 gkauth.h(830) GKAUTH default GRQ check ok
2005/10/02 04:30:25.198 2 RasSrv.cxx(388)
GCF|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|unknown;
2005/10/02 04:30:25.198 3 RasSrv.cxx(231) RAS Send to
aa.bb.cc.dd:30315
gatekeeperConfirm {
requestSeqNum = 1817
protocolIdentifier = 0.0.8.2250.0.2
gatekeeperIdentifier = 12 characters {
0067 006b 0073 006b 0079 0068 0069 0067 gkskyhig
0068 005f 0030 0031 h_01
}
rasAddress = ipAddress {
ip = 4 octets {
cb 4c 72 3a .Lr:
}
port = 1719
}
}
2005/10/02 04:30:25.749 2 RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30317
2005/10/02 04:30:25.749 3 RasSrv.cxx(219) RAS
gatekeeperRequest {
requestSeqNum = 841
protocolIdentifier = 0.0.8.2250.0.2
rasAddress = ipAddress {
ip = 4 octets {
c0 a8 00 02 ....
}
port = 1739
}
endpointType = {
vendor = {
vendor = {
t35CountryCode = 181
t35Extension = 0
manufacturerCode = 18
}
productId = 13 octets {
43 69 73 63 6f 20 41 54 41 20 31 38 36 Cisco ATA 186
}
versionId = 25 octets {
76 3a 30 78 30 34 30 30 30 33 30 31 20 66 3a 20 v:0x04000301 f:
62 3a 30 34 30 32 31 39 41 b:040219A
}
}
mc = FALSE
undefinedNode = FALSE
}
endpointAlias = 2 entries {
[0]=h323_ID 1 characters {
0030 0
}
[1]=dialedDigits "1231"
}
}
2005/10/02 04:30:25.759 1 RasSrv.cxx(343) RAS GRQ Received
2005/10/02 04:30:25.759 3 gkauth.h(830) GKAUTH default GRQ check ok
2005/10/02 04:30:25.759 2 RasSrv.cxx(388)
GCF|aa.bb.cc.dd|0:h323_ID=1231:dialedDigits|unknown;
2005/10/02 04:30:25.759 3 RasSrv.cxx(231) RAS Send to
aa.bb.cc.dd:30317
gatekeeperConfirm {
requestSeqNum = 841
protocolIdentifier = 0.0.8.2250.0.2
gatekeeperIdentifier = 12 characters {
0067 006b 0073 006b 0079 0068 0069 0067 gkskyhig
0068 005f 0030 0031 h_01
}
rasAddress = ipAddress {
ip = 4 octets {
cb 4c 72 3a .Lr:
}
port = 1719
}
}
2005/10/02 04:30:26.160 2 RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30315
2005/10/02 04:30:26.160 3 RasSrv.cxx(219) RAS
registrationRequest {
requestSeqNum = 1818
protocolIdentifier = 0.0.8.2250.0.2
discoveryComplete = TRUE
callSignalAddress = 1 entries {
[0]=ipAddress {
ip = 4 octets {
c0 a8 00 02 ....
}
port = 1720
}
}
rasAddress = 1 entries {
[0]=ipAddress {
ip = 4 octets {
c0 a8 00 02 ....
}
port = 1719
}
}
terminalType = {
vendor = {
vendor = {
t35CountryCode = 0
t35Extension = 0
manufacturerCode = 0
}
}
terminal = {
}
mc = FALSE
undefinedNode = FALSE
}
terminalAlias = 2 entries {
[0]=h323_ID 6 characters {
006d 006d 006b 0074 0030 0032 abcduser
}
[1]=h323_ID 6 characters {
006d 006d 006b 0074 0030 0032 abcduser
}
}
gatekeeperIdentifier = 12 characters {
0067 006b 0073 006b 0079 0068 0069 0067 gkskyhig
0068 005f 0030 0031 h_01
}
endpointVendor = {
vendor = {
t35CountryCode = 181
t35Extension = 0
manufacturerCode = 18
}
productId = 13 octets {
43 69 73 63 6f 20 41 54 41 20 31 38 36 Cisco ATA 186
}
versionId = 25 octets {
76 3a 30 78 30 34 30 30 30 33 30 31 20 66 3a 20 v:0x04000301 f:
62 3a 30 34 30 32 31 39 41 b:040219A
}
}
timeToLive = 300
keepAlive = FALSE
willSupplyUUIEs = FALSE
maintainConnection = FALSE
}
2005/10/02 04:30:26.160 1 RasSrv.cxx(343) RAS RRQ Received
2005/10/02 04:30:26.160 3 gkauth.cxx(968) GKAUTH SimplePasswordAuth
RRQ check failed
2005/10/02 04:30:26.160 2 RasSrv.cxx(388)
RRJ|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|terminal|securityDenial;
2005/10/02 04:30:26.160 3 RasSrv.cxx(231) RAS Send to
aa.bb.cc.dd:30315
registrationReject {
requestSeqNum = 1818
protocolIdentifier = 0.0.8.2250.0.2
rejectReason = securityDenial <<null>>
gatekeeperIdentifier = 12 characters {
0067 006b 0073 006b 0079 0068 0069 0067 gkskyhig
0068 005f 0030 0031 h_01
}
}
2005/10/02 04:30:26.761 2 RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30317
2005/10/02 04:30:26.761 3 RasSrv.cxx(219) RAS
registrationRequest {
requestSeqNum = 842
protocolIdentifier = 0.0.8.2250.0.2
discoveryComplete = TRUE
callSignalAddress = 1 entries {
[0]=ipAddress {
ip = 4 octets {
c0 a8 00 02 ....
}
port = 1721
}
}
rasAddress = 1 entries {
[0]=ipAddress {
ip = 4 octets {
c0 a8 00 02 ....
}
port = 1739
}
}
terminalType = {
vendor = {
vendor = {
t35CountryCode = 0
t35Extension = 0
manufacturerCode = 0
}
}
terminal = {
}
mc = FALSE
undefinedNode = FALSE
}
terminalAlias = 2 entries {
[0]=h323_ID 1 characters {
0030 0
}
[1]=dialedDigits "1231"
}
gatekeeperIdentifier = 12 characters {
0067 006b 0073 006b 0079 0068 0069 0067 gkskyhig
0068 005f 0030 0031 h_01
}
endpointVendor = {
vendor = {
t35CountryCode = 181
t35Extension = 0
manufacturerCode = 18
}
productId = 13 octets {
43 69 73 63 6f 20 41 54 41 20 31 38 36 Cisco ATA 186
}
versionId = 25 octets {
76 3a 30 78 30 34 30 30 30 33 30 31 20 66 3a 20 v:0x04000301 f:
62 3a 30 34 30 32 31 39 41 b:040219A
}
}
timeToLive = 300
keepAlive = FALSE
willSupplyUUIEs = FALSE
maintainConnection = FALSE
}
2005/10/02 04:30:26.761 1 RasSrv.cxx(343) RAS RRQ Received
2005/10/02 04:30:26.771 3 gkauth.cxx(968) GKAUTH SimplePasswordAuth
RRQ check failed
2005/10/02 04:30:26.771 2 RasSrv.cxx(388)
RRJ|aa.bb.cc.dd|0:h323_ID=1231:dialedDigits|terminal|securityDenial;
2005/10/02 04:30:26.771 3 RasSrv.cxx(231) RAS Send to
aa.bb.cc.dd:30317
registrationReject {
requestSeqNum = 842
protocolIdentifier = 0.0.8.2250.0.2
rejectReason = securityDenial <<null>>
gatekeeperIdentifier = 12 characters {
0067 006b 0073 006b 0079 0068 0069 0067 gkskyhig
0068 005f 0030 0031 h_01
}
}
2005/10/02 04:30:40.240 2 RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30315
2005/10/02 04:30:40.240 3 RasSrv.cxx(219) RAS
registrationRequest {
requestSeqNum = 1819
protocolIdentifier = 0.0.8.2250.0.2
discoveryComplete = TRUE
callSignalAddress = 1 entries {
[0]=ipAddress {
ip = 4 octets {
c0 a8 00 02 ....
}
port = 1720
}
}
rasAddress = 1 entries {
[0]=ipAddress {
ip = 4 octets {
c0 a8 00 02 ....
}
port = 1719
}
}
terminalType = {
vendor = {
vendor = {
t35CountryCode = 0
t35Extension = 0
manufacturerCode = 0
}
}
terminal = {
}
mc = FALSE
undefinedNode = FALSE
}
terminalAlias = 2 entries {
[0]=h323_ID 6 characters {
006d 006d 006b 0074 0030 0032 abcduser
}
[1]=h323_ID 6 characters {
006d 006d 006b 0074 0030 0032 abcduser
}
}
gatekeeperIdentifier = 12 characters {
0067 006b 0073 006b 0079 0068 0069 0067 gkskyhig
0068 005f 0030 0031 h_01
}
endpointVendor = {
vendor = {
t35CountryCode = 181
t35Extension = 0
manufacturerCode = 18
}
productId = 13 octets {
43 69 73 63 6f 20 41 54 41 20 31 38 36 Cisco ATA 186
}
versionId = 25 octets {
76 3a 30 78 30 34 30 30 30 33 30 31 20 66 3a 20 v:0x04000301 f:
62 3a 30 34 30 32 31 39 41 b:040219A
}
}
timeToLive = 300
keepAlive = FALSE
willSupplyUUIEs = FALSE
maintainConnection = FALSE
}
2005/10/02 04:30:40.240 1 RasSrv.cxx(343) RAS RRQ Received
2005/10/02 04:30:40.240 3 gkauth.cxx(968) GKAUTH SimplePasswordAuth
RRQ check failed
2005/10/02 04:30:40.240 2 RasSrv.cxx(388)
RRJ|aa.bb.cc.dd|abcduser:h323_ID=abcduser:h323_ID|terminal|securityDenial;
2005/10/02 04:30:40.240 3 RasSrv.cxx(231) RAS Send to
aa.bb.cc.dd:30315
registrationReject {
requestSeqNum = 1819
protocolIdentifier = 0.0.8.2250.0.2
rejectReason = securityDenial <<null>>
gatekeeperIdentifier = 12 characters {
0067 006b 0073 006b 0079 0068 0069 0067 gkskyhig
0068 005f 0030 0031 h_01
}
}
2005/10/02 04:30:40.761 2 RasSrv.cxx(173) RAS Read from
aa.bb.cc.dd:30317
2005/10/02 04:30:40.761 3 RasSrv.cxx(219) RAS
registrationRequest {
requestSeqNum = 843
protocolIdentifier = 0.0.8.2250.0.2
discoveryComplete = TRUE
callSignalAddress = 1 entries {
[0]=ipAddress {
ip = 4 octets {
c0 a8 00 02 ....
}
port = 1721
}
}
rasAddress = 1 entries {
[0]=ipAddress {
ip = 4 octets {
c0 a8 00 02 ....
}
port = 1739
}
}
terminalType = {
vendor = {
vendor = {
t35CountryCode = 0
t35Extension = 0
manufacturerCode = 0
}
}
terminal = {
}
mc = FALSE
undefinedNode = FALSE
}
terminalAlias = 2 entries {
[0]=h323_ID 1 characters {
0030 0
}
[1]=dialedDigits "1231"
}
gatekeeperIdentifier = 12 characters {
0067 006b 0073 006b 0079 0068 0069 0067 gkskyhig
0068 005f 0030 0031 h_01
}
endpointVendor = {
vendor = {
t35CountryCode = 181
t35Extension = 0
manufacturerCode = 18
}
productId = 13 octets {
43 69 73 63 6f 20 41 54 41 20 31 38 36 Cisco ATA 186
}
versionId = 25 octets {
76 3a 30 78 30 34 30 30 30 33 30 31 20 66 3a 20 v:0x04000301 f:
62 3a 30 34 30 32 31 39 41 b:040219A
}
}
timeToLive = 300
keepAlive = FALSE
willSupplyUUIEs = FALSE
maintainConnection = FALSE
}
2005/10/02 04:30:40.771 1 RasSrv.cxx(343) RAS RRQ Received
2005/10/02 04:30:40.771 3 gkauth.cxx(968) GKAUTH SimplePasswordAuth
RRQ check failed
2005/10/02 04:30:40.771 2 RasSrv.cxx(388)
RRJ|aa.bb.cc.dd|0:h323_ID=1231:dialedDigits|terminal|securityDenial;
2005/10/02 04:30:40.771 3 RasSrv.cxx(231) RAS Send to
aa.bb.cc.dd:30317
registrationReject {
requestSeqNum = 843
protocolIdentifier = 0.0.8.2250.0.2
rejectReason = securityDenial <<null>>
gatekeeperIdentifier = 12 characters {
0067 006b 0073 006b 0079 0068 0069 0067 gkskyhig
0068 005f 0030 0031 h_01
}
}
-------------------------------------------------------
This SF.Net email is sponsored by:
Power Architecture Resource Center: Free content, downloads, discussions,
and more. http://solutions.newsforge.com/ibmarch.tmpl
_______________________________________________________
Posting: mailto:Openh323gk-users@xxxxxxxxxxxxxxxxxxxxx
Archive: http://sourceforge.net/mailarchive/forum.php?forum_id=8549
Unsubscribe: http://lists.sourceforge.net/lists/listinfo/openh323gk-users
Homepage: http://www.gnugk.org/
-------------------------------------------------------
This SF.Net email is sponsored by:
Power Architecture Resource Center: Free content, downloads, discussions,
and more. http://solutions.newsforge.com/ibmarch.tmpl
_______________________________________________________
Posting: mailto:Openh323gk-users@xxxxxxxxxxxxxxxxxxxxx
Archive: http://sourceforge.net/mailarchive/forum.php?forum_id=8549
Unsubscribe: http://lists.sourceforge.net/lists/listinfo/openh323gk-users
Homepage: http://www.gnugk.org/