[LCS]启用WindowsMessenger5.0的调试日志功能来诊断登录LCS服务器

编写者:郑昀@UltraPower

摘要:Windows Messenger 5.0有一个注册表项设置,可以用来启用日志文件,该文件中记录了Windows Messenger 5.0登录LCS Server的详细来往包,可从其中得到通讯细节,从而作troubleshooting。

MS KB
文章详见《http://support.microsoft.com/default.aspx?scid=kb;EN-US;871023

 

步骤是:

第一步,运行regedit

第二步,找到注册表项:

    HKEY_CURRENT_USER\

        Software\

            Microsoft\

                Tracing\

                    RTCDLL

 

第三步,在该项下,找到名为EnableFileTracingDWORD项,将其原来的数值0改为1,表明启动文件日志;

第四步,重新启动Windows Messenger 5.0/5.1,登录LCS 2005服务器;

第五步,到%USERPROFILE%\Tracing文件夹下察看日志,比如说我的日志文件在“C:\Documents and Settings\VictorZheng\Tracing”文件夹下的一个“RTCDLL0.log”文件。

这个文件中记录了WinMsg登录SIP Server的详细来往包,可从其中得到通讯细节,从而作troubleshooting

 

第六步,最后要将EnableFileTracing项数值改回为0

 

从该日志文件可以看出:
具体的包体示范如下:
登录请求(第一次握手):
10:38:58.520 33C:B00 INFO  :: REGISTER sip:add.com.cn SIP/2.0
 
Via: SIP/2.0/TCP 192.168.511.39:7519
 
Max-Forwards: 70
 
From: <sip:yun.zheng@add.com.cn>;tag=8688ecc2f3dc4391b7e8685694782624;epid=8aecaf3d1e
 
To: <sip:yun.zheng@add.com.cn>
 
Call-ID: 48bbcb49bf9e4e5cbff05e1711dd829f@192.168.511.39
 
CSeq: 1 REGISTER


服务器打回请求:
10:38:58.520 33C:B00 INFO  :: SIP/2.0 401 Unauthorized
 
Date: Thu, 21 Apr 2005 02:38:50 GMT
 
WWW-Authenticate: NTLM realm="SIP Communications Service", targetname="helen.add.com.cn"
 
WWW-Authenticate: Kerberos realm="SIP Communications Service", targetname="sip/helen.add.com.cn"
 
Via: SIP/2.0/TCP 192.168.511.39:7519;ms-received-port=1129;ms-received-cid=6c00
 
From: <sip:yun.zheng@add.com.cn>;tag=8688ecc2f3dc4391b7e8685694782624;epid=8aecaf3d1e
 
To: <sip:yun.zheng@add.com.cn>;tag=EB19D8FDF171B11E64D2FC51A4E2CDE2
 
Call-ID: 48bbcb49bf9e4e5cbff05e1711dd829f@192.168.511.39
 
CSeq: 1 REGISTER


第二次握手:
10:38:59.231 33C:B00 INFO  :: REGISTER sip:add.com.cn SIP/2.0
 
Via: SIP/2.0/TCP 192.168.511.39:7519
 
Max-Forwards: 70
 
From: <sip:yun.zheng@add.com.cn>;tag=8688ecc2f3dc4391b7e8685694782624;epid=8aecaf3d1e
 
To: <sip:yun.zheng@add.com.cn>
 
Call-ID: 48bbcb49bf9e4e5cbff05e1711dd829f@192.168.511.39
 
CSeq: 2 REGISTER

 
第三次握手,登录成功:
10:38:59.372 33C:B00 INFO  :: SIP/2.0 200 OK
 
Authentication-Info: Kerberos rspauth="602306092A864886F71201020201011100FFFFFFFF504E32397263D69A54A5F6078116BE2D",
srand="04BA1FD9", snum="1",
opaque="0378BD56", qop="auth", targetname="sip/helen.add.com.cn", realm="SIP Communications Service"
 
Via: SIP/2.0/TCP 192.168.511.39:7519;ms-received-port=1129;ms-received-cid=6c00
 
From: <sip:yun.zheng@add.com.cn>;tag=8688ecc2f3dc4391b7e8685694782624;epid=8aecaf3d1e
 
To: <sip:yun.zheng@add.com.cn>;tag=EB19D8FDF171B11E64D2FC51A4E2CDE2
 
Call-ID: 48bbcb49bf9e4e5cbff05e1711dd829f@192.168.511.39
 
CSeq: 2 REGISTER
 
Contact: <sip:192.168.511.39:7519;transport=tcp>;methods="INVITE, MESSAGE, INFO, SUBSCRIBE,
 OPTIONS, BYE, CANCEL, NOTIFY, ACK, REFER";expires=600
 
Expires: 600

编写者:郑昀@UltraPower

 

原文地址:https://www.cnblogs.com/zhengyun_ustc/p/142656.html