You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
198 lines
5.9 KiB
198 lines
5.9 KiB
## |
|
## opensips.cfg -- OpenSIPS server configuration |
|
## |
|
|
|
# |
|
# GLOBAL CONFIGURATION PARAMETERS |
|
# |
|
|
|
# process configuration |
|
debug=1 |
|
log_stderror=no |
|
fork=yes |
|
check_via=no |
|
dns=no |
|
rev_dns=no |
|
children=4 |
|
user="@l_rusr@" |
|
group="@l_rgrp@" |
|
fifo="@l_prefix@/var/opensips/opensips.fifo" |
|
workdir="@l_prefix@/var/opensips" |
|
|
|
# network configuration |
|
alias="sip.example.com" |
|
listen="127.0.0.1" |
|
port=5060 |
|
|
|
# |
|
# EXTENSION MODULE LOADING |
|
# |
|
|
|
#loadmodule "@l_prefix@/lib/opensips/modules/dbtext.so" |
|
|
|
loadmodule "@l_prefix@/lib/opensips/modules/sl.so" |
|
loadmodule "@l_prefix@/lib/opensips/modules/tm.so" |
|
loadmodule "@l_prefix@/lib/opensips/modules/rr.so" |
|
loadmodule "@l_prefix@/lib/opensips/modules/maxfwd.so" |
|
loadmodule "@l_prefix@/lib/opensips/modules/usrloc.so" |
|
loadmodule "@l_prefix@/lib/opensips/modules/registrar.so" |
|
loadmodule "@l_prefix@/lib/opensips/modules/textops.so" |
|
|
|
#loadmodule "@l_prefix@/lib/opensips/modules/auth.so" |
|
#loadmodule "@l_prefix@/lib/opensips/modules/auth_db.so" |
|
|
|
#loadmodule "@l_prefix@/lib/opensips/modules/nathelper.so" |
|
|
|
# |
|
# EXTENSION MODULE CONFIGURATION |
|
# |
|
|
|
# module rr: |
|
modparam("rr", "enable_full_lr", 1) |
|
|
|
# module usrloc: |
|
modparam("usrloc", "db_mode", 0) |
|
#modparam("usrloc", "db_mode", 2) |
|
#modparam("usrloc|auth_db", "db_url", "dbtext://@l_prefix@/var/opensips/db") |
|
|
|
# module auth: |
|
#modparam("auth_db", "calculate_ha1", 1) |
|
#modparam("auth_db", "password_column", "password") |
|
#modparam("auth_db", "user_column", "username") |
|
#modparam("auth_db", "domain_column", "domain") |
|
|
|
# module nathelper: |
|
#modparam("registrar", "nat_flag", 6) |
|
#modparam("nathelper", "natping_interval", 30) |
|
#modparam("nathelper", "ping_nated_only", 1) |
|
#modparam("nathelper", "rtpproxy_sock", "unix:@l_prefix@/var/opensips/opensips_rtpproxy.sock") |
|
#modparam("nathelper", "rtpproxy_disable", 0) |
|
#modparam("nathelper", "rtpproxy_disable_tout", 20) |
|
#modparam("nathelper", "sipping_from", "sip:pinger@sip.example.com") |
|
|
|
# |
|
# MAIN ROUTING LOGIC |
|
# |
|
|
|
route{ |
|
# initial sanity checks -- messages with |
|
# max_forwards==0, or excessively long requests |
|
if (!mf_process_maxfwd_header("10")) { |
|
sl_send_reply("483", "Too Many Hops"); |
|
exit; |
|
}; |
|
if (msg:len >= max_len) { |
|
sl_send_reply("513", "Message too big"); |
|
exit; |
|
}; |
|
|
|
#if (method == "INVITE" && uri != myself) { |
|
# sl_send_reply("403", "No relaying"); |
|
# exit; |
|
#}; |
|
|
|
# NAT: special handling for NAT'ed clients; first, NAT test is |
|
# executed: it looks for via!=received and RFC1918 addresses in |
|
# Contact (may fail if line-folding is used); also, the received |
|
# test should, if completed, should check all vias for presence of |
|
# received. |
|
#if (nat_uac_test("3")) { |
|
# # allow RR-ed requests, as these may indicate that NAT-enabled |
|
# # aproxy takes care of it; unless it is REGISTER |
|
# if (method == "REGISTER" || ! search("^Record-Route:")) { |
|
# log("LOG: Someone trying to register from private IP, rewriting\n"); |
|
# fix_nated_contact(); # rewrite contact with source IP of signalling |
|
# if (method == "INVITE") { |
|
# fix_nated_sdp("1"); # add direction=active to SDP |
|
# }; |
|
# force_rport(); # add rport parameter to topmost Via |
|
# setflag(6); # mark as NAT'ed |
|
# }; |
|
#}; |
|
|
|
# we record-route all messages -- to make sure that |
|
# subsequent messages will go through our proxy; that's |
|
# particularly good if upstream and downstream entities |
|
# use different transport protocol |
|
if (method != "REGISTER") { |
|
record_route(); |
|
}; |
|
|
|
# subsequent messages withing a dialog should take the |
|
# path determined by record-routing |
|
if (loose_route()) { |
|
# mark routing logic in request |
|
append_hf("P-hint: rr-enforced\r\n"); |
|
route(1); |
|
}; |
|
|
|
if (uri != myself) { |
|
# mark routing logic in request |
|
append_hf("P-hint: outbound\r\n"); |
|
route(1); |
|
}; |
|
|
|
# if the request is for other domain use USRLOC |
|
# (in case, it does not work, use the following command |
|
# with proper names and addresses in it) |
|
if (uri == myself) { |
|
if (method == "REGISTER") { |
|
# uncomment this if you want to use digest authentication |
|
#if (!www_authorize("sip.example.com", "subscriber")) { |
|
# www_challenge("sip.example.com", "0"); |
|
# exit; |
|
#}; |
|
save("location"); |
|
exit; |
|
}; |
|
|
|
lookup("aliases"); |
|
if (uri != myself) { |
|
append_hf("P-hint: outbound alias\r\n"); |
|
route(1); |
|
}; |
|
|
|
# native SIP destinations are handled using our USRLOC DB |
|
if (!lookup("location")) { |
|
sl_send_reply("404", "Not Found"); |
|
exit; |
|
}; |
|
append_hf("P-hint: usrloc applied\r\n"); |
|
}; |
|
|
|
route(1); |
|
} |
|
|
|
route[1] { |
|
# disable RFC1918 peers |
|
if (uri =~ "[@:](192\.168\.|10\.|172\.(1[6-9]|2[0-9]|3[0-1])\.)" && !search("^Route:")) { |
|
sl_send_reply("479", "We don't forward to RFC 1918 IPv4 addresses"); |
|
exit; |
|
}; |
|
|
|
# NAT: if client or server know to be behind a NAT, enable relay |
|
#if (isflagset(6)) { |
|
# force_rtp_proxy(); |
|
#}; |
|
|
|
# NAT: processing of replies; apply to all transactions |
|
#t_on_reply("1"); |
|
|
|
# send it out now; use stateful forwarding as it works reliably even for UDP2TCP |
|
if (!t_relay()) { |
|
sl_reply_error(); |
|
}; |
|
} |
|
|
|
#onreply_route[1] { |
|
# NAT: is it a NAT'ed transaction ? |
|
# otherwise, is it a transaction behind a NAT and we did not |
|
# know at time of request processing ? (RFC1918 contacts) |
|
#if (isflagset(6) && status =~ "(183)|2[0-9][0-9]") { |
|
# fix_nated_contact(); |
|
# force_rtp_proxy(); |
|
#} else if (nat_uac_test("1")) { |
|
# fix_nated_contact(); |
|
#}; |
|
#} |
|
|
|
|